Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe

Overview

General Information

Sample name:SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
Analysis ID:1522188
MD5:e3c955967b61afd68ffdf50f9d4e085a
SHA1:76ca40cb78f2d155217464072bd29f453bce16c3
SHA256:c3caf1714085fbbc73fecccbd68193c2ac033833cef055e8e8948f28e62b89f4
Tags:exe
Infos:

Detection

Score:26
Range:0 - 100
Whitelisted:false
Confidence:0%

Signatures

Creates HTA files
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
File is packed with WinRar
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Searches for the Microsoft Outlook file path
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe (PID: 2296 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe" MD5: E3C955967B61AFD68FFDF50F9D4E085A)
    • mshta.exe (PID: 2220 cmdline: "C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\start.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} MD5: 06B02D5C097C7DB1F109749C45F3F505)
      • Xr5XVue.exe (PID: 7148 cmdline: "C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exe" -O o9iQbd0.exe https://download.yandex.ru/yandex-pack/downloader/downloader.exe MD5: E314B40A188DE73B6A16A8197F80EE68)
        • conhost.exe (PID: 7136 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\start.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} , CommandLine: "C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\start.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\mshta.exe, NewProcessName: C:\Windows\SysWOW64\mshta.exe, OriginalFileName: C:\Windows\SysWOW64\mshta.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe, ParentProcessId: 2296, ParentProcessName: SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe, ProcessCommandLine: "C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\start.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} , ProcessId: 2220, ProcessName: mshta.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\start.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} , CommandLine: "C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\start.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\mshta.exe, NewProcessName: C:\Windows\SysWOW64\mshta.exe, OriginalFileName: C:\Windows\SysWOW64\mshta.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe, ParentProcessId: 2296, ParentProcessName: SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe, ProcessCommandLine: "C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\start.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} , ProcessId: 2220, ProcessName: mshta.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: Xr5XVue.exe, 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_63f5faab-4
Source: SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeStatic PE information: certificate valid
Source: unknownHTTPS traffic detected: 5.45.205.243:443 -> 192.168.2.5:49707 version: TLS 1.2
Source: unknownHTTPS traffic detected: 5.45.200.105:443 -> 192.168.2.5:49710 version: TLS 1.2
Source: Binary string: wextract.pdb source: setup.exe
Source: Binary string: wextract.pdbU source: setup.exe
Source: Binary string: d:\Projects\WinRAR\SFX\build\sfxzip32\Release\sfxzip.pdb source: SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
Source: Binary string: C:\BuildAgent\work\4a73c29f3c4e6ac\downloader\Release\downloader.pdb source: o9iQbd0.exe.4.dr
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeCode function: 0_2_00404492 FindFirstFileW,GetLastError,FindNextFileW,GetLastError,FindFirstFileA,GetLastError,FindNextFileA,GetLastError,0_2_00404492
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeCode function: 0_2_004097ED SendDlgItemMessageA,DestroyIcon,EndDialog,SetDlgItemTextA,SetDlgItemTextA,SHGetFileInfoA,SendDlgItemMessageA,FindFirstFileA,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatA,GetDateFormatA,wsprintfA,wsprintfA,SetDlgItemTextA,FindClose,wsprintfA,SetDlgItemTextA,SendDlgItemMessageA,DosDateTimeToFileTime,FileTimeToSystemTime,GetTimeFormatA,GetDateFormatA,wsprintfA,SetDlgItemTextA,wsprintfA,SetDlgItemTextA,0_2_004097ED
Source: C:\Windows\SysWOW64\mshta.exeFile opened: C:\Users\user\AppData\Local\Temp\RarSFX0\img\Jump to behavior
Source: C:\Windows\SysWOW64\mshta.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
Source: C:\Windows\SysWOW64\mshta.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: C:\Windows\SysWOW64\mshta.exeFile opened: C:\Users\user\Jump to behavior
Source: C:\Windows\SysWOW64\mshta.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
Source: C:\Windows\SysWOW64\mshta.exeFile opened: C:\Users\user\AppData\Local\Temp\RarSFX0\Jump to behavior
Source: Joe Sandbox ViewIP Address: 5.45.205.243 5.45.205.243
Source: Joe Sandbox ViewJA3 fingerprint: 0c9457ab6f0d6a14fc8a3d1d149547fb
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_00468EC9 _errno,recv,4_2_00468EC9
Source: global trafficHTTP traffic detected: GET /yandex-pack/downloader/downloader.exe HTTP/1.1User-Agent: Wget/1.19.2 (mingw32)Accept: */*Accept-Encoding: gzipHost: download.yandex.ruConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /download.yandex.ru/yandex-pack/downloader/downloader.exe?lid=299 HTTP/1.1User-Agent: Wget/1.19.2 (mingw32)Accept: */*Accept-Encoding: gzipHost: cachev2-fra-02.cdn.yandex.netConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: download.yandex.ru
Source: global trafficDNS traffic detected: DNS query: cachev2-fra-02.cdn.yandex.net
Source: Xr5XVue.exeString found in binary or memory: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
Source: Xr5XVue.exe, 00000004.00000002.2130542848.0000000000F61000.00000004.00000020.00020000.00000000.sdmp, Xr5XVue.exe, 00000004.00000003.2129424844.0000000000F5F000.00000004.00000020.00020000.00000000.sdmp, Xr5XVue.exe, 00000004.00000003.2129424844.0000000000F57000.00000004.00000020.00020000.00000000.sdmp, o9iQbd0.exe.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: Xr5XVue.exe, 00000004.00000003.2129424844.0000000000F5F000.00000004.00000020.00020000.00000000.sdmp, Xr5XVue.exe, 00000004.00000003.2129424844.0000000000F57000.00000004.00000020.00020000.00000000.sdmp, o9iQbd0.exe.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: Xr5XVue.exe, 00000004.00000003.2129424844.0000000000F5F000.00000004.00000020.00020000.00000000.sdmp, Xr5XVue.exe, 00000004.00000003.2129424844.0000000000F57000.00000004.00000020.00020000.00000000.sdmp, o9iQbd0.exe.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: Xr5XVue.exeString found in binary or memory: http://crl.comodoca.com/COMODOCodeSigningCA2.crl0r
Source: Xr5XVue.exeString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
Source: Xr5XVue.exeString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
Source: SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
Source: SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe, o9iQbd0.exe.4.drString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
Source: SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe, o9iQbd0.exe.4.drString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0
Source: SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
Source: Xr5XVue.exe, 00000004.00000002.2130542848.0000000000F61000.00000004.00000020.00020000.00000000.sdmp, Xr5XVue.exe, 00000004.00000003.2129424844.0000000000F5F000.00000004.00000020.00020000.00000000.sdmp, Xr5XVue.exe, 00000004.00000003.2129424844.0000000000F57000.00000004.00000020.00020000.00000000.sdmp, o9iQbd0.exe.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: Xr5XVue.exe, 00000004.00000003.2129424844.0000000000F5F000.00000004.00000020.00020000.00000000.sdmp, Xr5XVue.exe, 00000004.00000003.2129424844.0000000000F57000.00000004.00000020.00020000.00000000.sdmp, o9iQbd0.exe.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: Xr5XVue.exe, 00000004.00000003.2129424844.0000000000F5F000.00000004.00000020.00020000.00000000.sdmp, Xr5XVue.exe, 00000004.00000003.2129424844.0000000000F57000.00000004.00000020.00020000.00000000.sdmp, o9iQbd0.exe.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: o9iQbd0.exe.4.drString found in binary or memory: http://downloader.yandex.net/yandex-pack/YandexPackSetup.exeYandexSearch.exedownloader.yandex.netdow
Source: Xr5XVue.exeString found in binary or memory: http://netpreserve.org/warc/1.0/revisit/identical-payload-digest
Source: Xr5XVue.exeString found in binary or memory: http://netpreserve.org/warc/1.0/revisit/identical-payload-digestWARC-ProfilelengthWARC-Truncatedappl
Source: Xr5XVue.exeString found in binary or memory: http://ocsp.comodoca.com0
Source: Xr5XVue.exe, 00000004.00000003.2129424844.0000000000F5F000.00000004.00000020.00020000.00000000.sdmp, Xr5XVue.exe, 00000004.00000003.2129424844.0000000000F57000.00000004.00000020.00020000.00000000.sdmp, o9iQbd0.exe.4.drString found in binary or memory: http://ocsp.digicert.com0A
Source: Xr5XVue.exe, 00000004.00000002.2130542848.0000000000F61000.00000004.00000020.00020000.00000000.sdmp, Xr5XVue.exe, 00000004.00000003.2129424844.0000000000F5F000.00000004.00000020.00020000.00000000.sdmp, Xr5XVue.exe, 00000004.00000003.2129424844.0000000000F57000.00000004.00000020.00020000.00000000.sdmp, o9iQbd0.exe.4.drString found in binary or memory: http://ocsp.digicert.com0C
Source: Xr5XVue.exe, 00000004.00000003.2129424844.0000000000F5F000.00000004.00000020.00020000.00000000.sdmp, Xr5XVue.exe, 00000004.00000003.2129424844.0000000000F57000.00000004.00000020.00020000.00000000.sdmp, o9iQbd0.exe.4.drString found in binary or memory: http://ocsp.digicert.com0X
Source: SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
Source: SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe, o9iQbd0.exe.4.drString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
Source: SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe, o9iQbd0.exe.4.drString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
Source: SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeString found in binary or memory: http://ocsp2.globalsign.com/rootr606
Source: SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe, o9iQbd0.exe.4.drString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
Source: SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe, o9iQbd0.exe.4.drString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
Source: SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
Source: Xr5XVue.exeString found in binary or memory: http://www.gnu.org/licenses/gpl.html
Source: Xr5XVue.exeString found in binary or memory: http://www.metalinker.org/
Source: Xr5XVue.exeString found in binary or memory: http://www.metalinker.org/typedynamicoriginurn:ietf:params:xml:ns:metalinktagsidentityfilesfilenames
Source: mshta.exe, 00000002.00000002.3324628787.0000000003274000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://download.yF
Source: Xr5XVue.exe, 00000004.00000003.2129598773.0000000000F2B000.00000004.00000020.00020000.00000000.sdmp, Xr5XVue.exe, 00000004.00000002.2130499484.0000000000F2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dr.yandex.net/strm
Source: Xr5XVue.exe, 00000004.00000003.2129598773.0000000000F2B000.00000004.00000020.00020000.00000000.sdmp, Xr5XVue.exe, 00000004.00000002.2130499484.0000000000F2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dr2.yandex.net/strm
Source: gam-page.html, last-page.html, start.hta, ya-page.htmlString found in binary or memory: https://openbox.su/app1/
Source: mshta.exe, 00000002.00000002.3324628787.00000000032C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://openbox.su/app1/K
Source: SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe, o9iQbd0.exe.4.drString found in binary or memory: https://www.globalsign.com/repository/0
Source: Xr5XVue.exeString found in binary or memory: https://www.openssl.org/docs/faq.html
Source: Xr5XVue.exe, 00000004.00000003.2129424844.0000000000F5F000.00000004.00000020.00020000.00000000.sdmp, Xr5XVue.exe, 00000004.00000003.2129424844.0000000000F57000.00000004.00000020.00020000.00000000.sdmp, o9iQbd0.exe.4.drString found in binary or memory: https://yandex.com0
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: unknownHTTPS traffic detected: 5.45.205.243:443 -> 192.168.2.5:49707 version: TLS 1.2
Source: unknownHTTPS traffic detected: 5.45.200.105:443 -> 192.168.2.5:49710 version: TLS 1.2

System Summary

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0\start.htaJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeCode function: 0_2_004020110_2_00402011
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeCode function: 0_2_0040621D0_2_0040621D
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeCode function: 0_2_0040168A0_2_0040168A
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeCode function: 0_2_00405D4D0_2_00405D4D
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_004253D04_2_004253D0
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_0041C4B74_2_0041C4B7
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_005CF16C4_2_005CF16C
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_005CF1004_2_005CF100
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_0040724D4_2_0040724D
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_004DF2704_2_004DF270
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_005CE2C04_2_005CE2C0
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_0053E3604_2_0053E360
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_004E74704_2_004E7470
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_0053F4004_2_0053F400
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_004415954_2_00441595
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_006706704_2_00670670
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_004D48E04_2_004D48E0
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_004258F64_2_004258F6
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_004258934_2_00425893
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_004DB8B04_2_004DB8B0
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_005CE9E04_2_005CE9E0
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_004449914_2_00444991
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_00447A684_2_00447A68
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_00425A724_2_00425A72
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_0044BACC4_2_0044BACC
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_00425A984_2_00425A98
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_00425B434_2_00425B43
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_00425B624_2_00425B62
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_00425B094_2_00425B09
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_00425B1C4_2_00425B1C
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_0052EB204_2_0052EB20
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_00425BD04_2_00425BD0
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_00425BF24_2_00425BF2
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_00425B8C4_2_00425B8C
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_00425BAE4_2_00425BAE
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_00425C144_2_00425C14
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_0042AC1D4_2_0042AC1D
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_00425CD54_2_00425CD5
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_00443CFC4_2_00443CFC
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_00467D614_2_00467D61
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_004FAD604_2_004FAD60
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_0065AD204_2_0065AD20
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_004D7DD04_2_004D7DD0
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_004CFDE04_2_004CFDE0
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_00425D864_2_00425D86
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_0053EE504_2_0053EE50
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_0044AE6F4_2_0044AE6F
Source: setup.exe.0.drStatic PE information: Resource name: RT_RCDATA type: Microsoft Cabinet archive data, many, 224531 bytes, 5 files, at 0x2c "dsetup.dll" "dsetup32.dll", ID 5930, number 1, 69 datablocks, 0x1503 compression
Source: SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe, 00000000.00000002.3325630626.00000000006FA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMSHTA.EXE.MUID vs SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
Source: SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe, 00000000.00000002.3325630626.00000000006FA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMSHTA.EXED vs SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
Source: SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: sus26.winEXE@6/23@2/2
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_0043F831 CertOpenSystemStoreA,GetProcAddress,CertOpenSystemStoreA,CertOpenSystemStoreA,CertOpenSystemStoreA,4_2_0043F831
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_00672100 _get_osfhandle,GetFileType,_telli64,GetFileSizeEx,SetFilePointer,SetEndOfFile,_lseeki64,GetFileInformationByHandle,calloc,calloc,FindFirstVolumeW,FindNextVolumeW,GetVolumeInformationW,FindVolumeClose,free,GetDiskFreeSpaceExW,free,GetLastError,FindVolumeClose,free,4_2_00672100
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeCode function: 0_2_00404AB5 CLSIDFromString,CoCreateInstance,0_2_00404AB5
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeCode function: 0_2_0040879E GetModuleHandleA,FindResourceA,0_2_0040879E
Source: C:\Windows\SysWOW64\mshta.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\MSIMGSIZ.DATJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7136:120:WilError_03
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0Jump to behavior
Source: SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeFile read: C:\Windows\win.iniJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeString found in binary or memory: OOO DIGITAL-START1
Source: SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeString found in binary or memory: OOO DIGITAL-START1#0!
Source: 7z.exeString found in binary or memory: Check charset encoding and -scs switch.*BLEDARVUANAXAIXIWOMPYTBDBA-HELPHasut0-SSCSSWSLTSCSSLPADSEMLAOSOSISFXPQRXYZW0123cannot find archivethere is no such archiveCannot use absolute pathnames for this commandReading archives from stdin is not implementedstdout mode and email mode cannot be combineddata errorIncorrect mapping dataMapViewOfFile errorCan not open mappingIncorrect volume size
Source: Xr5XVue.exeString found in binary or memory: bind-address
Source: Xr5XVue.exeString found in binary or memory: Try `%s --help' for more options.
Source: Xr5XVue.exeString found in binary or memory: Try `%s --help' for more options.
Source: Xr5XVue.exeString found in binary or memory: WARC output does not work with --continue or --start-pos, they will be disabled.
Source: Xr5XVue.exeString found in binary or memory: Compression does not work with --continue or --start-pos, they will be disabled.
Source: Xr5XVue.exeString found in binary or memory: Specifying both --start-pos and --continue is not recommended; --continue will be disabled.
Source: Xr5XVue.exeString found in binary or memory: acceptaccept-regexacceptregexadjust-extensionadjustextensionappend-outputask-passwordaskpasswordauth-no-challengeauthnochallengebackgroundbackup-convertedbackupconvertedbackupsbasebind-addressbindaddressbody-databodydatabody-filebodyfileca-certificatecacertificateca-directorycadirectorycachecertificatecertificate-typecertificatetypecheck-certificatecheckcertificateclobbercompressionconfigchooseconfigconnect-timeoutconnecttimeoutcontinueconvert-file-onlyconvertfileonlyconvert-linksconvertlinkscontent-dispositioncontentdispositioncontent-on-errorcontentonerrorcookiescrl-filecrlfilecut-dirscutdirsdebugdefault-pagedefaultpagedelete-afterdeleteafterdirectoriesdirstructdirectory-prefixdirprefixdns-cachednscachedns-timeoutdnstimeoutdomainsdont-remove-listingdot-styledotstyleegd-fileegdfileexclude-directoriesexcludedirectoriesexclude-domainsexcludedomainsexecutefollow-ftpfollowftpfollow-tagsfollowtagsforce-directoriesforce-htmlforcehtmlftp-passwordftppasswordftp-userftpuserftps-clear-data-connectionftpscleardataconnectionftps-fallback-to-ftpftpsfallbacktoftpftps-implicitftpsimplicitftps-resume-sslftpsresumesslglobheaderhelphost-directoriesaddhostdirhstshsts-filehstsfilehtml-extensionhtmlifyhttp-keep-alivehttpkeepalivehttp-passwdhttppasswordhttp-passwordhttp-userhttpuserhttps-onlyhttpsonlyignore-caseignorecaseignore-lengthignorelengthignore-tagsignoretagsinclude-directoriesincludedirectoriesinet4-onlyinet4onlyinet6-onlyinet6onlyinput-fileinputinput-metalinkinputmetalinkirikeep-badhashkeepbadhashkeep-session-cookieskeepsessioncookieslevelreclevellimit-ratelimitrateload-cookiesloadcookieslocal-encodinglocalencodingrejected-logrejectedlogmax-redirectmaxredirectmetalink-indexmetalinkindexmetalink-over-httpmetalinkoverhttpmethodmirrornetrcnono-clobbernoclobberno-confignoconfigno-parentnoparentoutput-documentoutputdocumentoutput-filelogfilepage-requisitespagerequisitesparentpassive-ftppassiveftppasswordpinnedpubkeypost-datapostdatapost-filepostfileprefer-familypreferfamilypreferred-locationpreferredlocationpreserve-permissionspreservepermissionsprivate-keyprivatekeyprivate-key-typeprivatekeytypeprogressshow-progressshowprogressprotocol-directoriesprotocoldirectoriesproxyuseproxyproxy__compatproxy-passwdproxypasswordproxy-passwordproxy-userproxyuserquietquotarandom-filerandomfilerandom-waitrandomwaitread-timeoutreadtimeoutrecursiverefererregex-typeregextyperejectreject-regexrejectregexrelativerelativeonlyremote-encodingremoteencodingremove-listingremovelistingreport-speedreportspeedrestrict-file-namesrestrictfilenamesretr-symlinksretrsymlinksretry-connrefusedretryconnrefusedretry-on-http-errorretryonhttperrorsave-cookiessavecookiessave-headerssaveheaderssecure-protocolsecureprotocolserver-responseserverresponsespan-hostsspanhostsspiderstart-posstartposstrict-commentsstrictcommentstimeouttimestampingif-modified-sinceifmodifiedsincetriesunlinktrust-server-namestrustservernamesuse-askpassuseaskpassuse-server-timestampsuseservertimestampsuseruser-agentuseragentverbo
Source: Xr5XVue.exeString found in binary or memory: dotCompression does not work with --continue or --start-pos, they will be disabled.
Source: Xr5XVue.exeString found in binary or memory: -h, --help print this help
Source: Xr5XVue.exeString found in binary or memory: -h, --help print this help
Source: Xr5XVue.exeString found in binary or memory: --start-pos=OFFSET start downloading from zero-based position OFFSET
Source: Xr5XVue.exeString found in binary or memory: --bind-address=ADDRESS bind to ADDRESS (hostname or IP) on local host
Source: Xr5XVue.exeString found in binary or memory: WARC-IP-Address
Source: Xr5XVue.exeString found in binary or memory: WARC-DateWARC-IP-Addresssha1:WARC-Block-DigestWARC-Payload-Digest%Y-%m-%dT%H:%M:%SZRpcrt4.dllUuidCreateUuidToStringARpcStringFreeA<urn:uuid:%s><urn:uuid:%02x%02x%02x%02x-%02x%02x-%02x%02x-%02x%02x-%02x%02x%02x%02x%02x%02x>warcinfoWARC-Typeapplication/warc-fieldsContent-TypeWARC-Record-IDWARC-Filenamemingw32software: Wget/%s (%s)
Source: Xr5XVue.exeString found in binary or memory: id-cmc-addExtensions
Source: Xr5XVue.exeString found in binary or memory: set-addPolicy
Source: Xr5XVue.exeString found in binary or memory: 3http://crl.usertrust.com/AddTrustExternalCARoot.crl05
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe "C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeProcess created: C:\Windows\SysWOW64\mshta.exe "C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\start.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exe" -O o9iQbd0.exe https://download.yandex.ru/yandex-pack/downloader/downloader.exe
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeProcess created: C:\Windows\SysWOW64\mshta.exe "C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\start.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} Jump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exe" -O o9iQbd0.exe https://download.yandex.ru/yandex-pack/downloader/downloader.exeJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: iconcodecservice.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: riched32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mshtml.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msiso.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msimtf.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: jscript9.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dataexchange.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windowscodecsext.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mscms.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coloradapterclient.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iconcodecservice.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: icm32.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d2d1.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msls31.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mlang.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ieframe.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeSection loaded: explorerframe.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SettingsJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeWindow found: window name: RichEditJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeFile opened: C:\Windows\SysWOW64\riched32.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeStatic PE information: certificate valid
Source: SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeStatic file information: File size 2685976 > 1048576
Source: SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: wextract.pdb source: setup.exe
Source: Binary string: wextract.pdbU source: setup.exe
Source: Binary string: d:\Projects\WinRAR\SFX\build\sfxzip32\Release\sfxzip.pdb source: SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
Source: Binary string: C:\BuildAgent\work\4a73c29f3c4e6ac\downloader\Release\downloader.pdb source: o9iQbd0.exe.4.dr
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeCode function: 0_2_0040CC30 LoadLibraryA,LoadLibraryA,LoadLibraryA,#17,LoadLibraryA,GetProcAddress,FreeLibrary,SHGetMalloc,0_2_0040CC30
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0\__tmp_rar_sfx_access_check_6327046Jump to behavior
Source: Xr5XVue.exe.0.drStatic PE information: section name: /4
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_004E37B0 push eax; mov dword ptr [esp], ebx4_2_004E3803
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0\7z.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0\7z.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0\setup.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0\o9iQbd0.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\RarSFX0\7z.dllJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\RarSFX0\7z.exeJump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\RarSFX0\setup.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\RarSFX0\o9iQbd0.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeAPI coverage: 5.5 %
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeCode function: 0_2_00404492 FindFirstFileW,GetLastError,FindNextFileW,GetLastError,FindFirstFileA,GetLastError,FindNextFileA,GetLastError,0_2_00404492
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeCode function: 0_2_004097ED SendDlgItemMessageA,DestroyIcon,EndDialog,SetDlgItemTextA,SetDlgItemTextA,SHGetFileInfoA,SendDlgItemMessageA,FindFirstFileA,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatA,GetDateFormatA,wsprintfA,wsprintfA,SetDlgItemTextA,FindClose,wsprintfA,SetDlgItemTextA,SendDlgItemMessageA,DosDateTimeToFileTime,FileTimeToSystemTime,GetTimeFormatA,GetDateFormatA,wsprintfA,SetDlgItemTextA,wsprintfA,SetDlgItemTextA,0_2_004097ED
Source: C:\Windows\SysWOW64\mshta.exeFile opened: C:\Users\user\AppData\Local\Temp\RarSFX0\img\Jump to behavior
Source: C:\Windows\SysWOW64\mshta.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
Source: C:\Windows\SysWOW64\mshta.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: C:\Windows\SysWOW64\mshta.exeFile opened: C:\Users\user\Jump to behavior
Source: C:\Windows\SysWOW64\mshta.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
Source: C:\Windows\SysWOW64\mshta.exeFile opened: C:\Users\user\AppData\Local\Temp\RarSFX0\Jump to behavior
Source: SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe, 00000000.00000002.3325630626.00000000006A0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}ya
Source: mshta.exe, 00000002.00000002.3324628787.00000000032B2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll%
Source: Xr5XVue.exe, 00000004.00000002.2130409199.0000000000A2E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeAPI call chain: ExitProcess graph end nodegraph_0-7534
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeAPI call chain: ExitProcess graph end nodegraph_0-8493
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeCode function: 0_2_0040CC30 LoadLibraryA,LoadLibraryA,LoadLibraryA,#17,LoadLibraryA,GetProcAddress,FreeLibrary,SHGetMalloc,0_2_0040CC30
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeCode function: 0_2_00408A5F GetProcessHeap,RtlAllocateHeap,0_2_00408A5F
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_004011FD SetUnhandledExceptionFilter,_acmdln,malloc,strlen,malloc,memcpy,__initenv,_cexit,_amsg_exit,_initterm,exit,4_2_004011FD
Source: C:\Windows\SysWOW64\mshta.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeProcess created: C:\Windows\SysWOW64\mshta.exe "C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\start.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} Jump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exe" -O o9iQbd0.exe https://download.yandex.ru/yandex-pack/downloader/downloader.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_005974A0 cpuid 4_2_005974A0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeCode function: GetLocaleInfoA,0_2_004091C2
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeQueries volume information: C:\Users\user\AppData\Local\Temp\RarSFX0\o9iQbd0.exe VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_0066F740 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,4_2_0066F740
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_00670C30 GetTimeZoneInformation,GetSystemTimeAsFileTime,4_2_00670C30
Source: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exeCode function: 0_2_004050C9 lstrlenA,GlobalAlloc,GetVersionExA,MultiByteToWideChar,WideCharToMultiByte,CreateStreamOnHGlobal,0_2_004050C9
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_00461409 _errno,bind,4_2_00461409
Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeCode function: 4_2_00466CC5 _errno,listen,4_2_00466CC5
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
11
Process Injection
1
Masquerading
OS Credential Dumping2
System Time Discovery
Remote Services1
Email Collection
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
Boot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory11
Security Software Discovery
Remote Desktop Protocol11
Archive Collected Data
2
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager3
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Mshta
NTDS36
System Information Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Install Root Certificate
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Software Packing
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe3%ReversingLabs
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\RarSFX0\7z.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\RarSFX0\7z.exe0%ReversingLabs
C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exe2%ReversingLabs
C:\Users\user\AppData\Local\Temp\RarSFX0\o9iQbd0.exe8%ReversingLabs
C:\Users\user\AppData\Local\Temp\RarSFX0\setup.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
cdn.yandex.net
5.45.205.243
truefalse
    unknown
    cachev2-fra-02.cdn.yandex.net
    5.45.200.105
    truefalse
      unknown
      download.yandex.ru
      unknown
      unknownfalse
        unknown
        NameMaliciousAntivirus DetectionReputation
        https://cachev2-fra-02.cdn.yandex.net/download.yandex.ru/yandex-pack/downloader/downloader.exe?lid=299false
          unknown
          https://download.yandex.ru/yandex-pack/downloader/downloader.exefalse
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            https://download.yFmshta.exe, 00000002.00000002.3324628787.0000000003274000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              https://dr.yandex.net/strmXr5XVue.exe, 00000004.00000003.2129598773.0000000000F2B000.00000004.00000020.00020000.00000000.sdmp, Xr5XVue.exe, 00000004.00000002.2130499484.0000000000F2D000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                https://openbox.su/app1/Kmshta.exe, 00000002.00000002.3324628787.00000000032C6000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  https://www.openssl.org/docs/faq.htmlXr5XVue.exefalse
                    unknown
                    https://dr2.yandex.net/strmXr5XVue.exe, 00000004.00000003.2129598773.0000000000F2B000.00000004.00000020.00020000.00000000.sdmp, Xr5XVue.exe, 00000004.00000002.2130499484.0000000000F2D000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      https://yandex.com0Xr5XVue.exe, 00000004.00000003.2129424844.0000000000F5F000.00000004.00000020.00020000.00000000.sdmp, Xr5XVue.exe, 00000004.00000003.2129424844.0000000000F57000.00000004.00000020.00020000.00000000.sdmp, o9iQbd0.exe.4.drfalse
                        unknown
                        http://www.gnu.org/licenses/gpl.htmlXr5XVue.exefalse
                          unknown
                          http://netpreserve.org/warc/1.0/revisit/identical-payload-digestXr5XVue.exefalse
                            unknown
                            http://www.metalinker.org/typedynamicoriginurn:ietf:params:xml:ns:metalinktagsidentityfilesfilenamesXr5XVue.exefalse
                              unknown
                              http://www.metalinker.org/Xr5XVue.exefalse
                                unknown
                                http://netpreserve.org/warc/1.0/revisit/identical-payload-digestWARC-ProfilelengthWARC-TruncatedapplXr5XVue.exefalse
                                  unknown
                                  http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdfXr5XVue.exefalse
                                    unknown
                                    https://openbox.su/app1/gam-page.html, last-page.html, start.hta, ya-page.htmlfalse
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      5.45.200.105
                                      cachev2-fra-02.cdn.yandex.netRussian Federation
                                      13238YANDEXRUfalse
                                      5.45.205.243
                                      cdn.yandex.netRussian Federation
                                      13238YANDEXRUfalse
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1522188
                                      Start date and time:2024-09-29 14:18:06 +02:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 5m 42s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:8
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
                                      Detection:SUS
                                      Classification:sus26.winEXE@6/23@2/2
                                      EGA Information:
                                      • Successful, ratio: 66.7%
                                      HCA Information:
                                      • Successful, ratio: 92%
                                      • Number of executed functions: 142
                                      • Number of non-executed functions: 146
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                      • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                      • Execution Graph export aborted for target mshta.exe, PID 2220 because it is empty
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                      • VT rate limit hit for: SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
                                      No simulations
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      5.45.205.2439pPxhYpKVN.exeGet hashmaliciousUnknownBrowse
                                      • download.yandex.ru/yandex-pack/downloader/downloader.exe
                                      $RDBZ32V.exeGet hashmaliciousUnknownBrowse
                                      • downloader.yandex.net/yandex-pack/11000/YandexPackSetup.exe
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      cdn.yandex.net9ytcSfQVR6.exeGet hashmaliciousUnknownBrowse
                                      • 5.45.192.142
                                      wHtiaQ7bcs.exeGet hashmaliciousUnknownBrowse
                                      • 149.5.241.42
                                      B0aVuWY5pd.exeGet hashmaliciousUnknownBrowse
                                      • 185.70.202.15
                                      NCkAC6yIng.exeGet hashmaliciousUnknownBrowse
                                      • 185.70.202.13
                                      XpafLMpvHT.exeGet hashmaliciousUnknownBrowse
                                      • 149.5.241.43
                                      MewexCfLwT.exeGet hashmaliciousUnknownBrowse
                                      • 185.70.202.15
                                      MMmchy1Kjl.exeGet hashmaliciousUnknownBrowse
                                      • 185.70.202.15
                                      WJu022GU7T.exeGet hashmaliciousUnknownBrowse
                                      • 149.5.241.42
                                      y1tgNJbpEA.exeGet hashmaliciousUnknownBrowse
                                      • 149.5.241.43
                                      Tmpsy49V8c.exeGet hashmaliciousUnknownBrowse
                                      • 185.70.202.13
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      YANDEXRUhttp://www.goo.su/c1Rnox/Get hashmaliciousUnknownBrowse
                                      • 87.250.250.58
                                      https://jbrizuelablplegal.taplink.ws/Get hashmaliciousHTMLPhisherBrowse
                                      • 87.250.251.119
                                      http://instagram.totalh.net/Get hashmaliciousUnknownBrowse
                                      • 87.250.250.119
                                      http://cl41155.tw1.ru/clients/Get hashmaliciousUnknownBrowse
                                      • 77.88.21.179
                                      https://uhcdenal.com/Get hashmaliciousUnknownBrowse
                                      • 87.250.251.119
                                      http://clck.ru/3DSS5HGet hashmaliciousUnknownBrowse
                                      • 213.180.204.232
                                      https://www.google.com.ai/amp/clck.ru/3DSSCz?hghghghHGVGvbbgffGFHGJdgddghfhghfgdgdgdgfhgg?sdfsewsrewrettfgGet hashmaliciousUnknownBrowse
                                      • 213.180.204.221
                                      http://bk.ruGet hashmaliciousHTMLPhisherBrowse
                                      • 77.88.21.179
                                      https://sucursal-virtual03.w3spaces.com/Get hashmaliciousUnknownBrowse
                                      • 77.88.21.90
                                      xBneIooWzQjjOOg.exeGet hashmaliciousAgentTeslaBrowse
                                      • 77.88.21.158
                                      YANDEXRUhttp://www.goo.su/c1Rnox/Get hashmaliciousUnknownBrowse
                                      • 87.250.250.58
                                      https://jbrizuelablplegal.taplink.ws/Get hashmaliciousHTMLPhisherBrowse
                                      • 87.250.251.119
                                      http://instagram.totalh.net/Get hashmaliciousUnknownBrowse
                                      • 87.250.250.119
                                      http://cl41155.tw1.ru/clients/Get hashmaliciousUnknownBrowse
                                      • 77.88.21.179
                                      https://uhcdenal.com/Get hashmaliciousUnknownBrowse
                                      • 87.250.251.119
                                      http://clck.ru/3DSS5HGet hashmaliciousUnknownBrowse
                                      • 213.180.204.232
                                      https://www.google.com.ai/amp/clck.ru/3DSSCz?hghghghHGVGvbbgffGFHGJdgddghfhghfgdgdgdgfhgg?sdfsewsrewrettfgGet hashmaliciousUnknownBrowse
                                      • 213.180.204.221
                                      http://bk.ruGet hashmaliciousHTMLPhisherBrowse
                                      • 77.88.21.179
                                      https://sucursal-virtual03.w3spaces.com/Get hashmaliciousUnknownBrowse
                                      • 77.88.21.90
                                      xBneIooWzQjjOOg.exeGet hashmaliciousAgentTeslaBrowse
                                      • 77.88.21.158
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      0c9457ab6f0d6a14fc8a3d1d149547fbSecuriteInfo.com.Trojan.Siggen21.26224.12889.14076.exeGet hashmaliciousUnknownBrowse
                                      • 5.45.205.243
                                      • 5.45.200.105
                                      SecuriteInfo.com.Trojan.Siggen21.26224.12889.14076.exeGet hashmaliciousUnknownBrowse
                                      • 5.45.205.243
                                      • 5.45.200.105
                                      SecuriteInfo.com.Trojan.Siggen19.8867.11258.22969.exeGet hashmaliciousUnknownBrowse
                                      • 5.45.205.243
                                      • 5.45.200.105
                                      SecuriteInfo.com.Trojan.Siggen19.8867.11258.22969.exeGet hashmaliciousUnknownBrowse
                                      • 5.45.205.243
                                      • 5.45.200.105
                                      W0ICYWz3Jx.exeGet hashmaliciousUnknownBrowse
                                      • 5.45.205.243
                                      • 5.45.200.105
                                      swarow.dllGet hashmaliciousBumbleBeeBrowse
                                      • 5.45.205.243
                                      • 5.45.200.105
                                      swarow.dllGet hashmaliciousBumbleBeeBrowse
                                      • 5.45.205.243
                                      • 5.45.200.105
                                      rustam.dllGet hashmaliciousBumbleBeeBrowse
                                      • 5.45.205.243
                                      • 5.45.200.105
                                      rustam.dllGet hashmaliciousBumbleBeeBrowse
                                      • 5.45.205.243
                                      • 5.45.200.105
                                      swarow.dllGet hashmaliciousBumbleBeeBrowse
                                      • 5.45.205.243
                                      • 5.45.200.105
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      C:\Users\user\AppData\Local\Temp\RarSFX0\7z.exeSecuriteInfo.com.Adware.Downware.20477.7420.2049.exeGet hashmaliciousUnknownBrowse
                                        SecuriteInfo.com.Application.Generic.3599906.6358.27359.exeGet hashmaliciousUnknownBrowse
                                          C:\Users\user\AppData\Local\Temp\RarSFX0\7z.dllSecuriteInfo.com.Adware.Downware.20477.7420.2049.exeGet hashmaliciousUnknownBrowse
                                            SecuriteInfo.com.Application.Generic.3599906.6358.27359.exeGet hashmaliciousUnknownBrowse
                                              C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exeSecuriteInfo.com.Application.Generic.3599906.6358.27359.exeGet hashmaliciousUnknownBrowse
                                                Process:C:\Windows\SysWOW64\mshta.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):49120
                                                Entropy (8bit):0.0017331682157558962
                                                Encrypted:false
                                                SSDEEP:3:Ztt:T
                                                MD5:0392ADA071EB68355BED625D8F9695F3
                                                SHA1:777253141235B6C6AC92E17E297A1482E82252CC
                                                SHA-256:B1313DD95EAF63F33F86F72F09E2ECD700D11159A8693210C37470FCB84038F7
                                                SHA-512:EF659EEFCAB16221783ECB258D19801A1FF063478698CF4FCE3C9F98059CA7B1D060B0449E6FD89D3B70439D9735FA1D50088568FF46C9927DE45808250AEC2E
                                                Malicious:false
                                                Reputation:high, very likely benign file
                                                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):599552
                                                Entropy (8bit):6.472768244081584
                                                Encrypted:false
                                                SSDEEP:12288:iIlGEaNP38Fk/Pai5LJC8NCnrNeqMO7APj5HBv:LkE2PMF/AJC8NCnrNeqP7Adhv
                                                MD5:AACD9B8E5E5E369C3518B86486CFC9D4
                                                SHA1:5DD895158C2EED2ECE1D5E0EA4C7B8BCAE32A511
                                                SHA-256:E876CAB250EB2B0AAB976FF9922A3945E2B4724166B0EFB64690B46FE470CD3C
                                                SHA-512:6E07165C3EB4FE5532F87D693E309F872925A21C08F1CBCDA3FDBDA3A803C5BAFCD4146B2DFBA5E1E0DCE13AB8B8E274AD4BEFF3FE3F9ADC2FA4C074C8088D51
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 0%
                                                Joe Sandbox View:
                                                • Filename: SecuriteInfo.com.Adware.Downware.20477.7420.2049.exe, Detection: malicious, Browse
                                                • Filename: SecuriteInfo.com.Application.Generic.3599906.6358.27359.exe, Detection: malicious, Browse
                                                Reputation:low
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............q...q...q..z...q.@.....q..{...q..u...q.M.....q...p..q.@.,...q...z...q.......q...{...q...w...q.<.u...q.Rich..q.................PE..L....WG...........!.................}.............................................................................. ....... ...d....p.......................p...G...................................................... ............................text............................... ..`.rdata..............................@..@.data...p........2..................@....rsrc........p......................@..@.reloc...U...p...V..................@..B................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
                                                File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):147968
                                                Entropy (8bit):6.253072345314039
                                                Encrypted:false
                                                SSDEEP:3072:IyWefGKx1iHMBBclb8BNNNTLEF+6PP2Up4YgZ:IyBkQc98BBIF9204L
                                                MD5:2D1C72072FEC74FB0ECA850EF8F9F93E
                                                SHA1:53B09AD4E564F9D392F3B781033404D92581F6D0
                                                SHA-256:B93149E44239DBDD5E6705C73AE14EE11285923E963E41E8D142E4171F20F4EB
                                                SHA-512:1D936DB9B5D85098298A05717BEA012BE696398A88177D5D0BBF7AB2BFD22BF449240B34205B64E52F1BEF34783C13DEF5F2E8D4CA0767FE8300AC5FC161CC26
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 0%
                                                Joe Sandbox View:
                                                • Filename: SecuriteInfo.com.Adware.Downware.20477.7420.2049.exe, Detection: malicious, Browse
                                                • Filename: SecuriteInfo.com.Application.Generic.3599906.6358.27359.exe, Detection: malicious, Browse
                                                Reputation:low
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........NDWL/*.L/*.L/*.73&.N/*.#0!.O/*..3$.D/*.#0 .G/*.#0..N/*..'u.M/*.L/+../*..'w.E/*.z.!.p/*.k.W.M/*.z. .O/*..),.M/*.RichL/*.........................PE..L.....WG............................6.............@.........................................................................@...x....................................................................................................................text...R........................... ..`.rdata...X.......Z..................@..@.data...lB...0..."..................@....rsrc................>..............@..@................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
                                                File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):3501408
                                                Entropy (8bit):6.5144557104886704
                                                Encrypted:false
                                                SSDEEP:98304:+FWNUq6wVUCTWmTRugpAVa7mZjJPMOBQUHodMwQjZoL6nGeWv:+FKUpwVU4WmTRugpAVa7mZjJPDKmod/n
                                                MD5:E314B40A188DE73B6A16A8197F80EE68
                                                SHA1:1123817BA6CA46873ACE186DE35D0AEE3D6075BC
                                                SHA-256:D6E2656521CA76AD47AD2C503C9F71B3D00820E8B05275D048F7DEA0C9C30BEB
                                                SHA-512:2EA6A95111F0B5EB0AAF044DAC811C1D5F0E04605D048A5B861D8BA1D15D3B02B5DDA39FD704A67320B06AE89C1C54847B6CE8DC589B5DBCE5D82B8C0CA14E3D
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 2%
                                                Joe Sandbox View:
                                                • Filename: SecuriteInfo.com.Application.Generic.3599906.6358.27359.exe, Detection: malicious, Browse
                                                Reputation:low
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.........5.P.............'...4...............'...@...........................5......O6....... ...............................5.p"...................>5.......................................5.......................5..............................text...X.'.......'.................`..`.data.........'.......'.............@.`..rdata...:....(..<....(.............@.p@.bss..........4.......................`..idata..p"....5..$....4.............@.0..CRT....4.....5.......5.............@.0..tls.... .....5.......5.............@.0./4............5.......5.............@.0B................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
                                                File Type:GIF image data, version 89a, 500 x 27
                                                Category:dropped
                                                Size (bytes):15241
                                                Entropy (8bit):7.747098926005111
                                                Encrypted:false
                                                SSDEEP:384:hj9U2idIHG5qlDmnFAtB50tJb3Js+/uqsviRS:hj2SsqlmFyB5+ds+/5S
                                                MD5:7E62AEBA4E8BD8A4D1C5C33F1961DCDB
                                                SHA1:DC04FD14C679059E9422ABA2E7950D95C83C7FFE
                                                SHA-256:BAD6F9186B0DBA551360CC446EEC00CEB73B244F635BF0D30BECF541E2C3F8CE
                                                SHA-512:FD037F6CB439B9BFB6D4F66ECD730DD4777B23529496CC8FDBF2E50E56813ED7AD90DD9CF72AA4F64FF6259955188E9912840B193148E66DF2193BD08D37309A
                                                Malicious:false
                                                Preview:GIF89a.......6.x..........b..P...u............).t..p..g.........t....T..>........6.......'...........}....s...v........l...._..........j...................:.. ...................................................................................................................................J..............].........................?.{..............,...............................................................D..[...........4..$...l....................M.........V.....................................................................................^..........L......................D.}...................................X..................r...............n........................................................!..NETSCAPE2.0.....!..XMP DataXMP<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.3-c011 66.145661, 2012/02/06-14:56:27 "> <rdf:RDF xmlns:rdf="ht
                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
                                                File Type:HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):4981
                                                Entropy (8bit):5.789649011305478
                                                Encrypted:false
                                                SSDEEP:48:d3saNY9YvvL0mXIdCZHdHWAjh44PpPRzPnhBeQPcJBZ55G7JagcmA3y1ru+NiwTi:29qIYIAcWC4bzPn/bPaBgNpimggwgxk3
                                                MD5:A067948794DB9574F0621DFC7636082E
                                                SHA1:1A923819120B0E2CF16264F191096B7248F9FD0E
                                                SHA-256:D4B7FBA81AF4C531E4C64C07C986B6333263329E5B66DCB954675F3B3857B906
                                                SHA-512:216D6007F6ACEBD34E6199A04A931B3249ACD10FAF636D00A8064090998476D7886806CF927DB9932337189A2E4931C70C95A21B5932858E82E57F256AF1F233
                                                Malicious:false
                                                Preview:.<html>..<head>..<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">..<title>OpenBox - DirectX 12</title>..<style>...selPage {background: #fff;width: 100%;height: 86%;display: block;}...Logo2 {position: absolute;z-index: 99;width: 64px;height: 64px;margin-left: 503px;}...text {width: 555px;background: #fff;padding-left: 20px;padding-top: 16px;font-size: 14px;}...border {width: 372px;height: 175px;float: left;}...windo {position: absolute;z-index: 98;height: 86%;background: #eeeeee;font-size: 14px;width: 100%;padding-top: 10px;border-top: 1px solid #b6b6b6;}...license {width: 546px;padding-top: 3px;padding-bottom: 5px;padding-left: 35px;}...foter {position: absolute;z-index: 99;display: block;width: 100%;height: 14%;background: #eeeeee;border-top: 1px solid #b6b6b6;}...button {background-color: #e1e1e1;width: 18%;height: 29px;cursor: pointer;font-size: 15px;border: 1px solid #b9b9b9;outline: none;box-shadow: none;color: #000000;margin-left: 15px;float: right;}...button
                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
                                                File Type:Unicode text, UTF-8 text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):837
                                                Entropy (8bit):5.361946331258647
                                                Encrypted:false
                                                SSDEEP:12:ky97ahl3vAGThYX/Qc3K/ycaHM7B2ISj/ceo8PkJVfFR8Zk81M2F3Y690MmfHpBR:3hav/AEK/LZHgy/lnOfH8vxjuMmvpkTG
                                                MD5:AE3CA246EE2FED14750C4EE3CD393F73
                                                SHA1:753C4434F233D28943957110F5A1CAD4BD01D780
                                                SHA-256:BE7E73448F59EE005A18A7EE8262C13FAE998693A2BEECA64A26E3922C2A6010
                                                SHA-512:09C71DE6F1796034D692DD8E13FD73B873DC057B51EC2EEA628E224568E7E142E59C258A494719ACBFC65BA1CDC3D23724B9350A68BC1298598B9FED64281AEA
                                                Malicious:false
                                                Preview:Option Explicit....Dim WshShell, RetCode, objWMIService, Running, colItems, objItem, Progress, k....Set WshShell = CreateObject("WScript.Shell")....Set objWMIService = GetObject("winmgmts:\\.\root\cimv2")..k = 1..Do.. Running = False.. Set colItems = objWMIService.ExecQuery("Select * from Win32_Process").. For Each objItem in colItems.. If objItem.Name = "browser.exe" Then.. Running = True.. Exit For.. End If.. Next.. If Not Running Then.. WScript.Sleep 4175.. k = k + 1.. If k = 800 Then Exit Do ' .... 800 .... .. 5 ... = 66 ..., .. ..... .. ....... End If..Loop While Not Running....RetCode = WshShell.Run("o9iQbd0.exe --partner 42966 --distr /quiet /msicl ""YAHOMEPAGE=y YAQSEARCH=y VID=31""", 0, False)....Set WshShell = Nothing..WScript.Quit
                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
                                                File Type:Unicode text, UTF-8 text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):812
                                                Entropy (8bit):5.29031611826752
                                                Encrypted:false
                                                SSDEEP:12:ky97ahl3vAGThYX/Qc3K/ycaHM7B2ISj/ceo8PkJVfFR8Zk81M2F3Y690MmgLHpr:3hav/AEK/LZHgy/lnOfH8vxjuMm8pkTG
                                                MD5:C4E879015718C781663012BE2F2F887D
                                                SHA1:865194450151F8B202FC9152E100FADB0EC29E1C
                                                SHA-256:1702E48476565B4FC6790FA5D166E3DBC4FFC45D31A321C47D129ECA2D6FC3EC
                                                SHA-512:A83A1BA81CEFDF8FDD4C4A7B45A4F571F5051D679E926FC48BA7AFAB88D22944089CD6CA8A7F3643B1D9744C3DCFAF142EA59318D705246614E5917B7DDD36BA
                                                Malicious:false
                                                Preview:Option Explicit....Dim WshShell, RetCode, objWMIService, Running, colItems, objItem, Progress, k....Set WshShell = CreateObject("WScript.Shell")....Set objWMIService = GetObject("winmgmts:\\.\root\cimv2")..k = 1..Do.. Running = False.. Set colItems = objWMIService.ExecQuery("Select * from Win32_Process").. For Each objItem in colItems.. If objItem.Name = "browser.exe" Then.. Running = True.. Exit For.. End If.. Next.. If Not Running Then.. WScript.Sleep 4175.. k = k + 1.. If k = 800 Then Exit Do ' .... 800 .... .. 5 ... = 66 ..., .. ..... .. ....... End If..Loop While Not Running....RetCode = WshShell.Run("o9iQbd0.exe --partner 42966 --distr /quiet /msicl ""VID=31""", 0, False)....Set WshShell = Nothing..WScript.Quit
                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
                                                File Type:Unicode text, UTF-8 text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):846
                                                Entropy (8bit):5.376679260256603
                                                Encrypted:false
                                                SSDEEP:12:ky97ahl3vAGThYX/Qc3K/ycaHM7B2ISj/ceo8PkJVfFR8Zk81M2F3Y690Mm+1Hpr:3hav/AEK/LZHgy/lnOfH8vxjuMmypkTG
                                                MD5:7DADC31D1FEA3B71C7CED456FE086A92
                                                SHA1:3D2B52BB6327A989EFD3BB5CEF8D48C40CA3C49D
                                                SHA-256:52502DEE343AD85F7E20FC8E1990E19F611A0AA3E48286CF97144C4B6F807DAD
                                                SHA-512:66AF2447B91E154188279B56017DDFB54B059C1BC0559862A4EC0DA1E96FF458D167FC5982BE34B74F706FE39B4FB8DE41966560D67BECC206C484531EFC33BA
                                                Malicious:false
                                                Preview:Option Explicit....Dim WshShell, RetCode, objWMIService, Running, colItems, objItem, Progress, k....Set WshShell = CreateObject("WScript.Shell")....Set objWMIService = GetObject("winmgmts:\\.\root\cimv2")..k = 1..Do.. Running = False.. Set colItems = objWMIService.ExecQuery("Select * from Win32_Process").. For Each objItem in colItems.. If objItem.Name = "browser.exe" Then.. Running = True.. Exit For.. End If.. Next.. If Not Running Then.. WScript.Sleep 4175.. k = k + 1.. If k = 800 Then Exit Do ' .... 800 .... .. 5 ... = 66 ..., .. ..... .. ....... End If..Loop While Not Running....RetCode = WshShell.Run("o9iQbd0.exe --partner 42966 --distr /quiet /msicl ""YAHOMEPAGE=y YAQSEARCH=y ILIGHT=1 VID=31""", 0, False)....Set WshShell = Nothing..WScript.Quit
                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
                                                File Type:MS Windows icon resource - 7 icons, 16x16 with PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, 24x24 with PNG image data, 24 x 24, 8-bit/color RGBA, non-interlaced, 32 bits/pixel
                                                Category:dropped
                                                Size (bytes):19845
                                                Entropy (8bit):7.934612446295257
                                                Encrypted:false
                                                SSDEEP:384:ZX7H7GlB9+MWyLpqW1K9Go38QiVME/cyKfKahZTFbK565QfY/:Zb7u9kyLZAKME/cmaDFbSTA/
                                                MD5:B325F7303BD23599C800A9C709E306D7
                                                SHA1:EB5DA5533A14B4CFD10CEEB44EBAD9138795E598
                                                SHA-256:9E7F76EC0B09AB6D2614D085776F0D6245BFCD012BC310578F73BD2BC6D38CD8
                                                SHA-512:18937F0C4BC50FD23BB891041FB64E15DBFBF850A1A2F9337B66A7C0B6B205AE8FBC73F6C365155D12B74C7BD0469CECBA27222924D0658680B4C2CE921A0A55
                                                Malicious:false
                                                Preview:............ .....v......... .....E... .... .m.......00.... .....v...@@.... ............... ......"........ ......4...PNG........IHDR................a....IDATx.}..nSW......c._.;.(.h.QHH!A...D.VU...>M;./..7`...H ...PnJ "..0!.....e...Fm.k....O.Z.....9.....hQD._*E.:.z.9w.K..G....pB......SXQ..Y\.....~........ .t.[Z)....&...k..&..jE...e(M..1(...K.y.U.Y..-..-.I...i.0m.16.+.........wy....../.....I.T...wbP.p...>..1..0.....).%..1.c.c....z...6..w".]n.n&D..-XN..r..1.+).......6y..7.x..q.T...\...`9..(.##....|...bc.C....|..Z.z.*8....8|..cv9Gy*......gYZ)2...Sj.=.V..O...r.v#&I.....d..?....Q..B.^o..i.c...J...}z.Gen......s....w/B..D...,....a...*.......j...f.sx..%....n.k;.6.t.Y.r...&./Y^..l?..OUw.f^.u.....w..+..2G'RD.....z% _...........^j...j7bj[=.SiIe.d..er.......\A..b~..>....'.t9.1...:....../.-'.V..I....IEND.B`..PNG........IHDR..............w=.....IDATx....n\....U...wl......-.."..... 8..1s.o.. $$^..L@.1B.(.....|.8.c...{.j1.i.q.`I.`.J...U........$0../"..PJ.m.~..zcy9
                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
                                                File Type:PNG image data, 128 x 128, 8-bit colormap, non-interlaced
                                                Category:dropped
                                                Size (bytes):1708
                                                Entropy (8bit):7.276947516168709
                                                Encrypted:false
                                                SSDEEP:48:vQ5Z4dsjk4eZ0Ib91TeXPqFNywL0ZyyFUIam:v/dsjkVt76XyFNyaSXFt
                                                MD5:8287BD736F2F5CFBAFB4A3C4DD0A2D88
                                                SHA1:12458D9A239F6E8335B9AA79C3EE867D111BBFE3
                                                SHA-256:DDE526182580315F4197E1576BD00516C2D17EFD0DEAA4BFCEDFD823B5025971
                                                SHA-512:DB6E6FD9B5E447CDF79577022E127F4C26F7494379CCAF3282CF72A5E5963A6E6084D9E10CFE33099114B8D8C66BBB70F66D73123A29EB922103F612AD34021B
                                                Malicious:false
                                                Preview:.PNG........IHDR.....................PLTE.........U..333+++$$$ 9.....+++'''$$$(((1$$...,,,)))/&&..$+++)))(((.''+++))).''--&+++-((+++***-((,,',,(++'+++))),))++(,,(+++,)),,(***,))+)),))+))++(,**,))+)),))++)++(**(,))+))++)+))++)+**+))**(+))++)++)**(,*(+**++)**)+))**)+**++)++)+**+**+)),*)+**+))+))+*)+))+*)+*),*)+*)+*(+))+*)+*)+**+*)+*)+**+*)+*)+*)+*)+*(++)+*)+*)+*)+*(+*)+*)+*)+*)+*)+*)++)+*)+*)+*)+*)+*)+*),+),,),,*--)..*//*/0+01+12+23+34+35+46,57,58,69,7;,8<-9<-9=-:>.;@.<A.<B/=B.=B/=C.>D/?E/?F/?F0AG/BI0CJ0EM1FN2GO1GQ2HQ2KU3LW3MX4NY4P\5Q]4Tb5Vd6Wf6Wg7Yg7\l8]o8^o9_p9_q9_r9bt:bu9bv:cv:fz;gz;g{<h};j.<l.=m.=n.=p.>q.>u.@w.A{.B{.A..B..C..E..E..F..G..F..G..H..H..J..J..J..K..L..L....0'b...ytRNS...................... !$%'(*-/134:;<DEGLNQRVWXcdfhijoqrsuvw|}...........................................................=V.e....bKGD........VIDATx...[La..O..&..o...^..d)!!.d.....".Z...B....R...J.;3...f...y??....t.gf......_XT.6.1...`_.....X.'+'...._...fG..R..|=jA..&.GlE...`\.j6jH.8...Q[..d....5.d..
                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
                                                File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                Category:dropped
                                                Size (bytes):50973
                                                Entropy (8bit):7.9867854885130996
                                                Encrypted:false
                                                SSDEEP:1536:coxB7ECE7ex2Orm00hOAXvWvWT9BbB93fAoDG:c87Q7iRrmyAXeeJ17nC
                                                MD5:8E19D23C6D6FE77B8DF29A016BC949A9
                                                SHA1:AF61E7B7D9E070C1237DD5C65B8C339FBD72DF6D
                                                SHA-256:EB569E329EF77A425D7EC5E5CE36D4BEB1659E10DCA76731A863DBAE52DA1EBC
                                                SHA-512:7DCD3C6C9BA7E1FE4D75E10802367B61B3480F6B679ADFC2884AFA2D5C4ECCAF6658522CD599F3CA7086CBAD984CDE44224BB3132643FD6E2A3713A2DC7384EB
                                                Malicious:false
                                                Preview:PK........i..V...}....>.......icons.ico..X.[....0....I....A...........EE@BQBZ.S.NE..g..`.T..7.....n.-13.o...1..!......F..3...A_;9}.'...X.a0q..}.I..S........0.......>......;|.C..&..Z......7G.~...v]]Un?.1.tW...!....:tcp..,.f. -...3yr.g..:(>.Np.]15.....^1.........w...87fn.439{...z.e..8y..P2..TU...u.U...ih`]....a....J...xD.w....3..$.^..bU..$.T...{W......./.b<*5..mG ......v[=..M..@..-e...'...&>kB..t....Z..k.h....ln.')....p.....-U|G.J.Z..M.YU.>.Q^.w..".<...W,..h.5...6.....c?f.xaOk..!....i.q...E....F..P1]..6`X,u...G.E.$N.....;.A.&..xk.2...b.....A.+.#.+..(9x}.x?...fv.......L....#..G1.F.M.X'9...*C..._......D.<.P'p....5.j..6....2i.&...!o..&._c..rU)}."-.j..T.?..p...9.'...LsF.....>4...".;a..|.$f|.Z&Wr#...,..p<...{......R.GL_j.......I5.=3..j....S....=..r..@.....A1.Cb-.b.T.T......Y.K.8..x....2..x..4y...{..]B......8$x.IP..t.l'q..l...`..C.B.K.....n...0....q,...L^....kS...0/....r...~.....g................=..A92.43}?..+.....8.5......x.+m...Ol..>P.z.~fs.
                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
                                                File Type:PNG image data, 171 x 33, 8-bit/color RGBA, non-interlaced
                                                Category:dropped
                                                Size (bytes):4108
                                                Entropy (8bit):7.918365556983603
                                                Encrypted:false
                                                SSDEEP:96:E3Sw+dWeu3vXLMO91ipdUTHTL/kUguslvkJEUZrW:E3SwQWemD21uMvlUA
                                                MD5:0FD141306E06EF59CABCE6F76D4F3D7E
                                                SHA1:1CB2189EBA8E7146C068B4670458EB350644EDD7
                                                SHA-256:F19B0E9FEFD718789D8316566AED028B13F43955071F2A4C422EA5C09FBDBEFA
                                                SHA-512:6FEDEAE61D50673BC4E52B2C991C0667A7E12FBAE3C57E36D75C8A4FFE590FE45F594BFB2579363B01886AFE71A94A3D5CDC47DDE2A4BCF9DFD328B9E771F04A
                                                Malicious:false
                                                Preview:.PNG........IHDR.......!.......[.....pHYs................6iCCPPhotoshop ICC profile..x...J.P.@...P+.qpx.((..`.-E...!...Ji.^^.~..[..w...QpP...@q...!........r...u.a.a.k.n:..|9...S.....n....$....+..y.;...|.*.L..n.. *@.B....0.~.A...:i.@<..^./@)...()..A|.f..|0..3.}.0ut..jI:Rg.S-..eI....<.e:.dr?...&........b..n:r.jY{..3.......Xz,ZA8T..*......x..oazR..+....V...../..O..ZOb... cHRM..z%..............R....X..:....o.Z.....PIDATx..{p\.}.?..jW..,.z.-.m.ml......@...N)..<...R..4$qH..`b.%SR .fB..I..O...8....6X.1~..e.......?.\..rW.A.0......sV..s...........}....A..`.[..`.[..y.[..y...X8W.R*?:..9......I$..#.aA9.h..B)}....j..I@.h..V..5...&...! ...;M.q.....G.<Y{N.i..*...a.._...T. ..%.#Dq..."......:x".g=.+....a/.#@*.....#...nE. ....<...\D.E.2......r8.2.....>.4.M.*g..<...........1.... ..E.mhu..FDN......5h.... .Z.j..E..A7{..k....K.....s5..k...[..@a>Y....PhQ/kW..= ....Y0j..e.P..K..j-d\..Q.gJ...#..%..q........Q..W....`..x.,....,....U..$.........Q.<..KD4..$.P....).9.].T...........
                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
                                                File Type:PNG image data, 171 x 211, 8-bit/color RGB, non-interlaced
                                                Category:dropped
                                                Size (bytes):18280
                                                Entropy (8bit):7.949056459897015
                                                Encrypted:false
                                                SSDEEP:384:2JXE05D0ZMF5TNd1DBFCOZ0chJIc2Q8xQWm:G35DyC5TNnDfZ0Zc2QJd
                                                MD5:072679C20456E6B83EA3707A7C4E7B6F
                                                SHA1:EAD8FCDD16976C9220E289A1D666349D0EB4A72F
                                                SHA-256:8A0087C2D38FA04F54E2F8A39310EB6FBDC8849C61A55AE235D4B121052A2E6A
                                                SHA-512:C7EEDB48D3E2B186C49D2CA95D9B444B73BBC393BF4279EEEAA5EFF0FE5FB6754166EAB7DE01EF2FD7AC286BFC211B0D7D8F92C56048753E20D1DF46E2120963
                                                Malicious:false
                                                Preview:.PNG........IHDR.............q.t.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
                                                File Type:PNG image data, 191 x 422, 8-bit/color RGBA, non-interlaced
                                                Category:dropped
                                                Size (bytes):24154
                                                Entropy (8bit):7.9763836300607585
                                                Encrypted:false
                                                SSDEEP:384:Vwg33+QHoWa5vUP9oOf5/Es9mmROevxAKlW0kpmfZ9Fom9WDC/+iHYd2IP7lj5E2:1H+dW9S4BEs9lROevxipmh9OjDC2i49F
                                                MD5:22DA1EB67A59553F524C6099F1ACC6D6
                                                SHA1:BE42B06D5189FD1CB99DB84F506908732540239E
                                                SHA-256:6F17CF57C88B6D08344231094E10B4B1B689FA05EB26A89323FCE43ABA7322F6
                                                SHA-512:D4FE413FDD1DF644F1FC2AD3FB13679B7CE70C548C7EBCCB34ABE9394E853C2D83854279F93B4703558484B282E2FD576E5BF9ADCCF9A7ED5B70A462BCBBC5E9
                                                Malicious:false
                                                Preview:.PNG........IHDR.............-DU.....pHYs................6iCCPPhotoshop ICC profile..x...J.P.@...P+.qpx.((..`.-E...!...Ji.^^.~..[..w...QpP...@q...!........r...u.a.a.k.n:..|9...S.....n....$....+..y.;...|.*.L..n.. *@.B....0.~.A...:i.@<..^./@)...()..A|.f..|0..3.}.0ut..jI:Rg.S-..eI....<.e:.dr?...&........b..n:r.jY{..3.......Xz,ZA8T..*......x..oazR..+....V...../..O..ZOb... cHRM..z%..............R....X..:....o.Z....\.IDATx..w...y/.;.m.kU..........c.t.fL\.....c_.77qL...g......4..c..L.`.cz. !$.^@Bmw%m...s.....3...3...<......s~O'.c.H.2......!@.PJA)-."xd.!d..C..I.!`..ql$.)....o2.:nb.O..l?..#..;'e.B.(! Y........(@)...`.C..(6..... .z.,.~).\....#..EQ..*....$..6T.~)...A.@).!..}...."Ii.%......d=)./......9....2.~).-B.._...@z{.4...1...,.K./....~A.@.Jr././..7.@.>...$..48.=.C.....2H.K...'..M._Jc..L...w.2h.J.Kil.....g.:].E:...w.B!h.&.Pb..9.....Y.9.....Ji...w&...yB..f..8N..m....c,.14.....ct2.F|kf.(..<..z.5.d2HI.s..u%.jL....<.....PU5x..3..fC@(..nE.i~.v$.jh.v.gT.\Mj.Y...B.4..Z...
                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
                                                File Type:PNG image data, 1125 x 586, 8-bit colormap, non-interlaced
                                                Category:dropped
                                                Size (bytes):225104
                                                Entropy (8bit):7.9850008295885475
                                                Encrypted:false
                                                SSDEEP:3072:MvR5U30D4hcL5p0unLQwfJBcxDpNBbZlWaGy04p24UHVUe8ugV9yaxijlmnwvD:8LO7cdznUAGd/bHWY24CUe895xiFvD
                                                MD5:BAB614B92E1F655D29F6418FC9BC2651
                                                SHA1:AD9F36A962AFD70410C0020FE45F71F48D979E88
                                                SHA-256:328DA045E0E974CA57385C137D54ADA72FF0DE8D1DC3661326D6D80F3014968B
                                                SHA-512:B0C0504B315201BABE7B44C57547328514FF834E618728655E5E5DCF735B0B788705BA92ADA3D290557052B98A53C85C6BA8AC040A42419982DF73A06FFBFD38
                                                Malicious:false
                                                Preview:.PNG........IHDR...e...J.............gAMA......a.....sRGB.........pHYs...t...t..f.x....PLTE................................................................................... ........SQJ...........................xul......{yq...mkc...JIF*+,srm&&'rog..../0223hg`VUQ........$...ec\OMF......................DDC............BOc...llkZWN~|tfgg$(/........abca_X@@?...IG@uus.........)-5DB;MMM[ZU........N\r......""#HVk.....|..566.#*..|yyy99:...>=;...27?...SZf]]^......$-O...86/.3;.....w...~..WX[ *9...31+MUcCFLW_l=AHQRU~}{><5..._[QIP\8<C...x...........\do...?IZr{.984FKTcjs.,&;CRn|.$,Hcn|...........v..|~....gu.......%/A...nu}...........mot...Vex......3;K............$....~..1......................4......4.*......9..N...2x..H.=.($....... ...Y...h....@...z....&_...........X.?..N.9.../.......b..8g-K}?.!.I.4...}....u._.};.$&.b.O./L.{].^5....H4..k.IDATx..}L.g./Z.sL.....Rk..(..n.r"..@.....Z.......`t....p..........cp.fm.8$.D..8...8g..R...Z...D7..............V....L.N..........z
                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
                                                File Type:HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):6869
                                                Entropy (8bit):5.538532237704157
                                                Encrypted:false
                                                SSDEEP:96:+U7J/U1jQIkzACBF/Nuck7kryZNMGiFLkUCsbrpiigxkM:8HCBlEB7kGu2UCsbrp12kM
                                                MD5:1A5F5C559FAB7519D0EE43B1EA928AD2
                                                SHA1:6180D0CE153894D843B5CE5A25B0DD2B33328CFC
                                                SHA-256:D2218AE1B51426685188830C897BEDF51DAFF8DC57163374D57C8261DDC6BE19
                                                SHA-512:CBD7C760AD40EA92452989361019AC2FD2E4DFF530472513F02626EB2C90730DCA91C56B1C40CC772CDC972D7A5B3FF4CB6A0205E945FC4FA7480746BBE4F5EA
                                                Malicious:false
                                                Preview:.<html>..<head>....<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">......<title>OpenBox - DirectX 12</title>......<style>...selPage {background: #fff;width: 100%;height: 86%;display: block;}.....text {width: 470px;padding-left: 20px;padding-top: 16px;font-size: 14px;}.....border {/*border: 1px solid #8b8b8b;*/width: 372px;height: 180px;/*background-color: #fff;*/float: left;}.....jot li {padding-top: 5px;padding-buttom: 5px;}...jot2 li {list-style-type: none;padding-top: 5px;padding-right: 0px;padding-bottom: 5px;padding-left: 0px;width: 440px;}...jot2 {padding-left: 0px;margin-top: 5px;margin-right: 0px;margin-bottom: 5px;margin-left: 20px;}...content {height: 180px;}...jot{margin-top: 10px;}...second {font-size: 13px;padding-left: 10px;margin-top: 7px;margin-bottom: 5px;}...first {font-size: 13px;padding-left: 30px;margin-top: 5px;margin-bottom: 5px;}.....Logo2 {position: absolute;z-index: 99;width: 64px;height: 64px;margin-left: 503px;}.....windo {position: abso
                                                Process:C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exe
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):208544
                                                Entropy (8bit):6.614980777339889
                                                Encrypted:false
                                                SSDEEP:3072:IWF1Sss2XaOvu+v7QC2mCAbtoJOBW0rArwrkut57cIrDjy6Hy2BKbY64IrHLzMxI:IWF0+XaOvuyycWNrwrk6y2ZJIrrzr
                                                MD5:B9314504E592D42CB36534415A62B3AF
                                                SHA1:059D2776F68BCC4D074619A3614A163D37DF8B62
                                                SHA-256:C60C3A7D20B575FDEEB723E12A11C2602E73329DC413FC6D88F72E6F87E38B49
                                                SHA-512:E50ADB690E2F6767001031E83F40CC067C9351D466051E45A40A9E7FF49049E35609F1E70DD7BB4A4721A112479F79090DECCA6896DEAC2680E7D107E3355DAE
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 8%
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......G.............z,.....z......z/....8.....8.....8../....N.................."......J..........Rich...................PE..L...p.~d.................:...................P....@..........................p............@..........................................@..(................(...P..0.......p...............................@............P...............................text....8.......:.................. ..`.rdata......P.......>..............@..@.data....6..........................@....gfids..4....0......................@..@.rsrc...(....@......................@..@.reloc..0....P......................@..B........................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows, MS CAB-Installer self-extracting archive
                                                Category:dropped
                                                Size (bytes):295320
                                                Entropy (8bit):7.749011498049896
                                                Encrypted:false
                                                SSDEEP:6144:kWK8fc2liXmrLxcdRDLiH1vVRGVOhMp421/7YQV:VcvgLARDI1KIOzO0
                                                MD5:2CBD6AD183914A0C554F0739069E77D7
                                                SHA1:7BF35F2AFCA666078DB35CA95130BEB2E3782212
                                                SHA-256:2CF71D098C608C56E07F4655855A886C3102553F648DF88458DF616B26FD612F
                                                SHA-512:FF1AF2D2A883865F2412DDDCD68006D1907A719FE833319C833F897C93EE750BAC494C0991170DC1CF726B3F0406707DAA361D06568CD610EEB4ED1D9C0FBB10
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 0%
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......->..i_.i_.i_..|.d_.i_.._..|..h_..|.q_..|.h_.Richi_.........PE..L...!.};............................^Z...............................................J...............................................................^...#...........................................................................................text............................... ..`.data...............................@....rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
                                                File Type:HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):3621
                                                Entropy (8bit):5.780862584035253
                                                Encrypted:false
                                                SSDEEP:48:WVgm7WVQHviMsE6DioJEYZWdHWAwXcTU+Zahqi4I6waG7FcOFi+lmxRevf:9IobExivdLXcTUcCqjI6wP9i+gxk3
                                                MD5:EA6F841C0422F623A1CD5A41F0247E81
                                                SHA1:D4908CFE3AF2BB07F3F03FA73EB2ABB91A4C1AF6
                                                SHA-256:93EF3B613EF2BC8B3224409488BDCA649758A25FAE3254519C027A545589A07C
                                                SHA-512:15FB353DFCE76384B3EB0701419D39BC109793E73639205CF52A9360667F633027C78ED5D6AEAECDBFDB2773E8C8BA7AF8171442800A992E2E0ACFF0CC3FD371
                                                Malicious:true
                                                Preview:.<html>..<script language=javascript>..var winWidth=596;..var winHeight=489;..window.resizeTo(winWidth, winHeight);..var winPosX=screen.width/2-winWidth/2;..var winPosY=screen.height/2.109-winHeight/2.109;..window.moveTo(winPosX, winPosY);..</script>..<head>..<hta:application..applicationName="O-DirectX12-W1"..border="dialog"..borderStyle="static"..minimizeButton="yes"..maximizeButton="no"..windowState="sunken"..caption="yes"..innerBorder="no"..selection="yes"..scroll="no"..sysMenu="yes"..contextmenu="no"..icon="icon.ico"..singleInstance="yes"..navigable="yes"../>..<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">..<title>OpenBox - DirectX 12</title>..<style>...selPage { background: #fff;width: 100%;height: 86%;display: block; }...Logo {width: 191px;}...text {padding-left: 210px;position: absolute;padding-top: 60px;padding-right: 20px;padding-bottom: 20px;font-size: 15px;}...foter {position: absolute;z-index: 99;background: #eeeeee;border-top: 1px solid #b6b6b6;wid
                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):2
                                                Entropy (8bit):1.0
                                                Encrypted:false
                                                SSDEEP:3:Tn:T
                                                MD5:C16A5320FA475530D9583C34FD356EF5
                                                SHA1:632667547E7CD3E0466547863E1207A8C0C0C549
                                                SHA-256:EB1E33E8A81B697B75855AF6BFCDBCBF7CBBDE9F94962CEAEC1ED8AF21F5A50F
                                                SHA-512:5305F867C631E8335813A103A4942A93037C3D3B1982EAB342FB495047DCC79E13299AB65B5F4A34400F15AF384EDA2ED7144671E83996334C0669FC8377A130
                                                Malicious:false
                                                Preview:31
                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
                                                File Type:HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):7620
                                                Entropy (8bit):5.879682557619017
                                                Encrypted:false
                                                SSDEEP:96:29SIYOAFWC4bzPXgWp/9RQ3anRWFv4mDam6mBm2mECmGmpyi9gxke:maW5gWp7RWFvjxlwBGxQs2ke
                                                MD5:AF11A6D72D4B302C88D38DE717E2B770
                                                SHA1:6ABD03BCB4088C6A06467C1DE21AED77685BFC9A
                                                SHA-256:9A54C65A5D59DE5372601D8A82F0335C99E379EA5ABCC3102F25E857D22C0F0A
                                                SHA-512:F018734FD9DCEE6F5941943AE55AFF7BC9EFCE66EFE00D95168F1BEA2763C10442705F4710679C5AE64B62D10F78F9FBB418883E5D890A7025E125B8E39DC0A9
                                                Malicious:false
                                                Preview:.<html>..<head>..<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">..<title>OpenBox - DirectX 12</title>..<style>...selPage {background: #fff;width: 100%;height: 86%;display: block;}...Logo2 {position: absolute;z-index: 99;width: 64px;height: 64px;margin-left: 503px;}...text {width: 555px;background: #fff;padding-left: 20px;padding-top: 16px;font-size: 14px;}...border {width: 372px;height: 180px;float: left;}...windo {position: absolute;z-index: 98;height: 86%;background: #eeeeee;font-size: 14px;width: 100%;padding-top: 10px;border-top: 1px solid #b6b6b6;}...license {width: 546px;padding-top: 0px;padding-bottom: 15px;padding-left: 35px;}...foter {position: absolute;z-index: 99;display: block;width: 100%;height: 14%;background: #eeeeee;border-top: 1px solid #b6b6b6;}...button {background-color: #e1e1e1;width: 18%;height: 29px;cursor: pointer;font-size: 15px;border: 1px solid #b9b9b9;outline: none;box-shadow: none;color: #000000;margin-left: 15px;float: right;}...butto
                                                Process:C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exe
                                                File Type:ASCII text, with CRLF, CR line terminators
                                                Category:dropped
                                                Size (bytes):1344
                                                Entropy (8bit):4.929565013787063
                                                Encrypted:false
                                                SSDEEP:24:x2NGXxePnx7ovS/xPHLxePgWlIedgeRNJgjIJgfPkOc:kNqsZxPLfiQTfjc
                                                MD5:08D5E9F3327E308A13609731A1132614
                                                SHA1:457EEB6723D167AD5AE281FA8D54A7EB07E0B4B7
                                                SHA-256:E6B52563196567CBE26B5298D2051869C6327AC0EB97F81E215692BCE639B698
                                                SHA-512:3CA558763622EEDBF07A9DCE0A3279D718CDDCD2A6BA941B14F40C9117948D256CAA0BC62DFEAAA8A1272CF1E4A0ABDB945B78024BAD27EAA84E6C076D7604FB
                                                Malicious:false
                                                Preview:--2024-09-29 08:19:01-- https://download.yandex.ru/yandex-pack/downloader/downloader.exe..Resolving download.yandex.ru (download.yandex.ru)... 5.45.205.243, 5.45.205.244, 5.45.205.245, .....Connecting to download.yandex.ru (download.yandex.ru)|5.45.205.243|:443... connected...HTTP request sent, awaiting response... 302 Found..Location: https://cachev2-fra-02.cdn.yandex.net/download.yandex.ru/yandex-pack/downloader/downloader.exe?lid=299 [following]..--2024-09-29 08:19:03-- https://cachev2-fra-02.cdn.yandex.net/download.yandex.ru/yandex-pack/downloader/downloader.exe?lid=299..Resolving cachev2-fra-02.cdn.yandex.net (cachev2-fra-02.cdn.yandex.net)... 5.45.200.105..Connecting to cachev2-fra-02.cdn.yandex.net (cachev2-fra-02.cdn.yandex.net)|5.45.200.105|:443... connected...HTTP request sent, awaiting response... 200 OK..Length: 208544 (204K) [application/octet-stream]..Saving to: 'o9iQbd0.exe'.....o9iQbd0.exe 0%[ ]
                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Entropy (8bit):7.9946933298924625
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
                                                File size:2'685'976 bytes
                                                MD5:e3c955967b61afd68ffdf50f9d4e085a
                                                SHA1:76ca40cb78f2d155217464072bd29f453bce16c3
                                                SHA256:c3caf1714085fbbc73fecccbd68193c2ac033833cef055e8e8948f28e62b89f4
                                                SHA512:f500465c89dd3c2b9e326d4a08693c4387e8d8b2a85664609d55046c3140a085177a974ae5913fc53cd815c752dd10d83f6c9c62a874f8278cf4bf5b21bed4bc
                                                SSDEEP:49152:qVIZfUzAOOaeAnn3grmYl3SKB5HfzhovA/nGFDll1+KAP7bCY:mI5UzAxdQ3gr1Jf5VucQt+uY
                                                TLSH:1AC533176AE811B3D7C1BA706D7C7304E87E9818E7FCB405EB1106299F76216A89DB83
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}zQ.9.?U9.?U9.?U..RU1.?U..DU*.?U9.>U..?U'I.U?.?U0c.U8.?U0c.U..?U0c.U8.?U'I.U8.?U0c.U8.?URich9.?U........PE..L......J...........
                                                Icon Hash:45cccc70f8cccc41
                                                Entrypoint:0x40912e
                                                Entrypoint Section:.text
                                                Digitally signed:true
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                DLL Characteristics:NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                Time Stamp:0x4A87E807 [Sun Aug 16 11:05:43 2009 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:5
                                                OS Version Minor:0
                                                File Version Major:5
                                                File Version Minor:0
                                                Subsystem Version Major:5
                                                Subsystem Version Minor:0
                                                Import Hash:e731a0eb5a871c8e2bac936ab9cfdd3d
                                                Signature Valid:true
                                                Signature Issuer:CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE
                                                Signature Validation Error:The operation completed successfully
                                                Error Number:0
                                                Not Before, Not After
                                                • 20/06/2023 17:36:07 20/06/2025 17:36:07
                                                Subject Chain
                                                • E=digitalstart@mail.ru, CN=OOO DIGITAL-START, O=OOO DIGITAL-START, L=Tulun, S=Irkutsk Oblast, C=RU, OID.1.3.6.1.4.1.311.60.2.1.2=Irkutsk Oblast, OID.1.3.6.1.4.1.311.60.2.1.3=RU, SERIALNUMBER=1213800011622, OID.2.5.4.15=Private Organization
                                                Version:3
                                                Thumbprint MD5:A133A50531B977F623CBD8834B723F3E
                                                Thumbprint SHA-1:12DE85094A43566B446946E3ED71ABA2844282E9
                                                Thumbprint SHA-256:F93A445F360F91ED81BD07C6B241D8409063906CD121CE032818DAFD6578D686
                                                Serial:07302D716DA7520EA65D6C48
                                                Instruction
                                                call 00007FDE888BE183h
                                                xor eax, eax
                                                push eax
                                                push eax
                                                push eax
                                                push eax
                                                call 00007FDE888C0CBAh
                                                ret
                                                push esi
                                                push edi
                                                mov edi, dword ptr [esp+0Ch]
                                                mov esi, ecx
                                                mov ecx, edi
                                                mov dword ptr [esi], edi
                                                call 00007FDE888B8072h
                                                mov dword ptr [esi+08h], eax
                                                mov dword ptr [esi+0Ch], edx
                                                mov eax, dword ptr [edi+00000C1Ch]
                                                mov dword ptr [esi+10h], eax
                                                pop edi
                                                mov eax, esi
                                                pop esi
                                                retn 0004h
                                                mov eax, ecx
                                                mov ecx, dword ptr [eax]
                                                mov edx, dword ptr [eax+10h]
                                                cmp edx, dword ptr [ecx+00000C1Ch]
                                                jne 00007FDE888BE26Fh
                                                push 00000000h
                                                push dword ptr [eax+0Ch]
                                                push dword ptr [eax+08h]
                                                call 00007FDE888B84D9h
                                                ret
                                                push ebp
                                                mov ebp, esp
                                                sub esp, 1Ch
                                                push esi
                                                xor esi, esi
                                                push esi
                                                push esi
                                                push esi
                                                push esi
                                                lea eax, dword ptr [ebp-1Ch]
                                                push eax
                                                call dword ptr [0040D208h]
                                                test eax, eax
                                                je 00007FDE888BE283h
                                                push esi
                                                push esi
                                                push esi
                                                lea eax, dword ptr [ebp-1Ch]
                                                push eax
                                                call dword ptr [0040D20Ch]
                                                lea eax, dword ptr [ebp-1Ch]
                                                push eax
                                                call dword ptr [0040D210h]
                                                lea eax, dword ptr [ebp-1Ch]
                                                push eax
                                                call dword ptr [0040D258h]
                                                pop esi
                                                leave
                                                ret
                                                push ebp
                                                mov ebp, esp
                                                sub esp, 64h
                                                push 00000064h
                                                lea eax, dword ptr [ebp-64h]
                                                push eax
                                                push 0000000Fh
                                                push 00000400h
                                                call dword ptr [0040D14Ch]
                                                movsx eax, byte ptr [ebp-64h]
                                                leave
                                                ret
                                                push ebp
                                                mov ebp, esp
                                                sub esp, 34h
                                                push ebx
                                                xor ebx, ebx
                                                push esi
                                                push edi
                                                cmp dword ptr [0040F028h], ebx
                                                jne 00007FDE888BE27Ch
                                                call 00007FDE888BE32Eh
                                                Programming Language:
                                                • [ C ] VS2005 build 50727
                                                • [IMP] VS2005 build 50727
                                                • [ASM] VS2008 build 21022
                                                • [ C ] VS2008 SP1 build 30729
                                                • [C++] VS2008 SP1 build 30729
                                                • [EXP] VS2008 SP1 build 30729
                                                • [RES] VS2008 build 21022
                                                • [LNK] VS2008 SP1 build 30729
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0xe7500x33.rdata
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xd9dc0xb4.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x2a0000x79ec.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x28d2e80x2930
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0xd2800x1c.rdata
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0xd0000x278.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000xbdb70xbe0014e0e667d420ec1a3ff4a7622469c762False0.6052631578947368data6.5462226527058744IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rdata0xd0000x17d50x1800cfc3d62e1d5821e2defe2196840909eaFalse0.4817708333333333data5.384019730141905IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0xf0000x19cb80x2000fdd92fffc3dedd0d6504bffc2229aa1False0.197265625data1.2979945737040552IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .CRT0x290000x100x200d9f91643921952c7bc8c7ea02a29dd4fFalse0.044921875data0.21310128450968063IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .rsrc0x2a0000x79ec0x7a00b46b582f743a69594d02fe80dc871b2eFalse0.7465099897540983data7.147346224646645IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_BITMAP0x2a51c0xbb6Device independent bitmap graphic, 93 x 302 x 4, 2 compression, image size 2894, resolution 2835 x 2835 px/mEnglishUnited States0.2581721147431621
                                                RT_ICON0x2b0d40x2cfPNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced1.015299026425591
                                                RT_ICON0x2b3a40x4c4PNG image data, 24 x 24, 8-bit/color RGBA, non-interlaced1.009016393442623
                                                RT_ICON0x2b8680x66dPNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced1.0066869300911854
                                                RT_ICON0x2bed80x98bPNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced1.004502660663119
                                                RT_ICON0x2c8640xa14PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced1.004263565891473
                                                RT_ICON0x2d2780x12b8PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced0.9995826377295493
                                                RT_ICON0x2e5300x18b8PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.938685208596713
                                                RT_DIALOG0x2fde80x282dataEnglishUnited States0.5062305295950156
                                                RT_DIALOG0x3006c0x136dataEnglishUnited States0.6064516129032258
                                                RT_DIALOG0x301a40xe8dataEnglishUnited States0.6939655172413793
                                                RT_DIALOG0x3028c0x12adataEnglishUnited States0.587248322147651
                                                RT_DIALOG0x303b80x334dataEnglishUnited States0.43414634146341463
                                                RT_DIALOG0x306ec0x21edataEnglishUnited States0.5645756457564576
                                                RT_STRING0x3090c0x22cdataEnglishUnited States0.420863309352518
                                                RT_STRING0x30b380x3b2dataEnglishUnited States0.3964059196617336
                                                RT_STRING0x30eec0x212dataEnglishUnited States0.4339622641509434
                                                RT_STRING0x311000x27edataEnglishUnited States0.4122257053291536
                                                RT_STRING0x313800x4cdataEnglishUnited States0.631578947368421
                                                RT_GROUP_ICON0x313cc0x68data0.7403846153846154
                                                RT_MANIFEST0x314340x5b8XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.44193989071038253
                                                DLLImport
                                                COMCTL32.dll
                                                KERNEL32.dllSetFileAttributesW, GetFullPathNameA, MoveFileA, DeleteFileA, DeleteFileW, CreateDirectoryA, CreateDirectoryW, FindClose, FindNextFileA, FindFirstFileA, FindNextFileW, FindFirstFileW, GetTickCount, WideCharToMultiByte, MultiByteToWideChar, GetVersionExA, GlobalAlloc, lstrlenA, GetModuleFileNameA, FindResourceA, GetModuleHandleA, HeapAlloc, GetProcessHeap, HeapFree, HeapReAlloc, CompareStringA, ExitProcess, SetFileAttributesA, GetNumberFormatA, lstrcmpiA, GetProcAddress, DosDateTimeToFileTime, GetDateFormatA, GetTimeFormatA, FileTimeToSystemTime, FileTimeToLocalFileTime, ExpandEnvironmentStringsA, WaitForSingleObject, SetCurrentDirectoryA, Sleep, GetTempPathA, MoveFileExA, GetModuleFileNameW, SetEnvironmentVariableA, GetCommandLineA, LocalFileTimeToFileTime, SystemTimeToFileTime, IsDBCSLeadByte, GetCPInfo, FreeLibrary, LoadLibraryA, GetCurrentDirectoryA, GetFileAttributesW, GetFileAttributesA, WriteFile, SetFileTime, GetStdHandle, ReadFile, SetLastError, CreateFileW, CreateFileA, GetFileType, SetFilePointer, CloseHandle, SetEndOfFile, GetLastError, GetLocaleInfoA
                                                USER32.dllOemToCharBuffA, CharLowerA, wvsprintfA, FindWindowExA, GetClassNameA, ReleaseDC, GetDC, SendMessageA, wsprintfA, SetDlgItemTextA, EndDialog, DestroyIcon, SendDlgItemMessageA, GetDlgItemTextA, DialogBoxParamA, IsWindowVisible, WaitForInputIdle, GetSysColor, PostMessageA, SetMenu, SetFocus, LoadBitmapA, CharToOemBuffA, CharToOemA, OemToCharA, MapWindowPoints, CreateWindowExA, UpdateWindow, SetWindowTextA, LoadCursorA, RegisterClassExA, SetWindowLongA, GetWindowLongA, DefWindowProcA, PeekMessageA, GetMessageA, TranslateMessage, DestroyWindow, GetClientRect, CopyRect, IsWindow, MessageBoxA, ShowWindow, GetDlgItem, LoadStringA, SetWindowPos, GetWindowTextA, GetSystemMetrics, GetWindow, CharUpperA, GetWindowRect, LoadIconA, GetParent, EnableWindow, DispatchMessageA
                                                GDI32.dllGetDeviceCaps, CreateCompatibleDC, GetObjectA, CreateCompatibleBitmap, SelectObject, StretchBlt, DeleteObject, DeleteDC
                                                ADVAPI32.dllRegCloseKey, RegOpenKeyExA, RegQueryValueExA, RegCreateKeyExA, RegSetValueExA
                                                SHELL32.dllShellExecuteExA, SHFileOperationA, SHGetFileInfoA, SHGetSpecialFolderLocation, SHGetMalloc, SHBrowseForFolderA, SHGetPathFromIDListA, SHChangeNotify
                                                ole32.dllCreateStreamOnHGlobal, OleInitialize, CoCreateInstance, OleUninitialize, CLSIDFromString
                                                OLEAUT32.dllVariantInit
                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishUnited States
                                                TimestampSource PortDest PortSource IPDest IP
                                                Sep 29, 2024 14:19:03.181365013 CEST49707443192.168.2.55.45.205.243
                                                Sep 29, 2024 14:19:03.181420088 CEST443497075.45.205.243192.168.2.5
                                                Sep 29, 2024 14:19:03.181550026 CEST49707443192.168.2.55.45.205.243
                                                Sep 29, 2024 14:19:03.185308933 CEST49707443192.168.2.55.45.205.243
                                                Sep 29, 2024 14:19:03.185324907 CEST443497075.45.205.243192.168.2.5
                                                Sep 29, 2024 14:19:03.915730000 CEST443497075.45.205.243192.168.2.5
                                                Sep 29, 2024 14:19:03.915817976 CEST49707443192.168.2.55.45.205.243
                                                Sep 29, 2024 14:19:03.917654991 CEST49707443192.168.2.55.45.205.243
                                                Sep 29, 2024 14:19:03.917665958 CEST443497075.45.205.243192.168.2.5
                                                Sep 29, 2024 14:19:03.918000937 CEST443497075.45.205.243192.168.2.5
                                                Sep 29, 2024 14:19:03.919110060 CEST49707443192.168.2.55.45.205.243
                                                Sep 29, 2024 14:19:03.959441900 CEST443497075.45.205.243192.168.2.5
                                                Sep 29, 2024 14:19:04.277251005 CEST443497075.45.205.243192.168.2.5
                                                Sep 29, 2024 14:19:04.277400970 CEST443497075.45.205.243192.168.2.5
                                                Sep 29, 2024 14:19:04.277755022 CEST49707443192.168.2.55.45.205.243
                                                Sep 29, 2024 14:19:04.281090021 CEST49707443192.168.2.55.45.205.243
                                                Sep 29, 2024 14:19:04.281125069 CEST443497075.45.205.243192.168.2.5
                                                Sep 29, 2024 14:19:04.332137108 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:04.332185984 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:04.332290888 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:04.333626032 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:04.333642960 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.142306089 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.142411947 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.143887043 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.143898964 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.144320011 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.147196054 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.191402912 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.567442894 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.567465067 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.567490101 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.567563057 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.567589998 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.567676067 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.671494961 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.671523094 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.671669960 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.671689987 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.671710014 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.671761990 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.725737095 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.725764036 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.725894928 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.725913048 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.725960970 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.780508041 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.780531883 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.780694008 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.780710936 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.780818939 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.815164089 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.815207005 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.815287113 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.815296888 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.815336943 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.815337896 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.832767963 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.841720104 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.841766119 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.841808081 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.841821909 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.841866016 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.841866016 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.874455929 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.874511003 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.874552965 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.874562979 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.874572992 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.874607086 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.904558897 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.904604912 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.904675007 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.904683113 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.904697895 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.904738903 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.926418066 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.926460981 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.926526070 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.926534891 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.926557064 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.926597118 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.944030046 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.944082022 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.944158077 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.944165945 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.944201946 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.944226027 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.960299969 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.960355043 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.960438967 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.960445881 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.960522890 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.975621939 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.975691080 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.975747108 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.975758076 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.975804090 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.975812912 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.985487938 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.985542059 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.985609055 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.985615969 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.985661030 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.985661983 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.985730886 CEST443497105.45.200.105192.168.2.5
                                                Sep 29, 2024 14:19:05.985816956 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.989145041 CEST49710443192.168.2.55.45.200.105
                                                Sep 29, 2024 14:19:05.989161015 CEST443497105.45.200.105192.168.2.5
                                                TimestampSource PortDest PortSource IPDest IP
                                                Sep 29, 2024 14:19:02.561244011 CEST6013453192.168.2.51.1.1.1
                                                Sep 29, 2024 14:19:02.608131886 CEST53601341.1.1.1192.168.2.5
                                                Sep 29, 2024 14:19:04.293725014 CEST5186153192.168.2.51.1.1.1
                                                Sep 29, 2024 14:19:04.329056025 CEST53518611.1.1.1192.168.2.5
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Sep 29, 2024 14:19:02.561244011 CEST192.168.2.51.1.1.10x6e0dStandard query (0)download.yandex.ruA (IP address)IN (0x0001)false
                                                Sep 29, 2024 14:19:04.293725014 CEST192.168.2.51.1.1.10x4929Standard query (0)cachev2-fra-02.cdn.yandex.netA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Sep 29, 2024 14:19:02.608131886 CEST1.1.1.1192.168.2.50x6e0dNo error (0)download.yandex.rucdn.yandex.netCNAME (Canonical name)IN (0x0001)false
                                                Sep 29, 2024 14:19:02.608131886 CEST1.1.1.1192.168.2.50x6e0dNo error (0)cdn.yandex.net5.45.205.243A (IP address)IN (0x0001)false
                                                Sep 29, 2024 14:19:02.608131886 CEST1.1.1.1192.168.2.50x6e0dNo error (0)cdn.yandex.net5.45.205.244A (IP address)IN (0x0001)false
                                                Sep 29, 2024 14:19:02.608131886 CEST1.1.1.1192.168.2.50x6e0dNo error (0)cdn.yandex.net5.45.205.245A (IP address)IN (0x0001)false
                                                Sep 29, 2024 14:19:02.608131886 CEST1.1.1.1192.168.2.50x6e0dNo error (0)cdn.yandex.net5.45.205.241A (IP address)IN (0x0001)false
                                                Sep 29, 2024 14:19:02.608131886 CEST1.1.1.1192.168.2.50x6e0dNo error (0)cdn.yandex.net5.45.205.242A (IP address)IN (0x0001)false
                                                Sep 29, 2024 14:19:04.329056025 CEST1.1.1.1192.168.2.50x4929No error (0)cachev2-fra-02.cdn.yandex.net5.45.200.105A (IP address)IN (0x0001)false
                                                • download.yandex.ru
                                                • cachev2-fra-02.cdn.yandex.net
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.5497075.45.205.2434437148C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exe
                                                TimestampBytes transferredDirectionData
                                                2024-09-29 12:19:03 UTC176OUTGET /yandex-pack/downloader/downloader.exe HTTP/1.1
                                                User-Agent: Wget/1.19.2 (mingw32)
                                                Accept: */*
                                                Accept-Encoding: gzip
                                                Host: download.yandex.ru
                                                Connection: Keep-Alive
                                                2024-09-29 12:19:04 UTC527INHTTP/1.1 302 Found
                                                Server: nginx/1.17.9
                                                Date: Sun, 29 Sep 2024 12:19:04 GMT
                                                Content-Length: 0
                                                Connection: close
                                                Location: https://cachev2-fra-02.cdn.yandex.net/download.yandex.ru/yandex-pack/downloader/downloader.exe?lid=299
                                                X-Request-Id: 1727612344168658-15258422541223674988
                                                X-Strm-Request-Id: 1727612344168658-15258422541223674988
                                                X_h: strm-cacto-production-3.sas.yp-c.yandex.net
                                                Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                Cache-Control: no-cache
                                                Cache-Control: no-store,no-cache,must-revalidate
                                                Pragma: no-cache


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                1192.168.2.5497105.45.200.1054437148C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exe
                                                TimestampBytes transferredDirectionData
                                                2024-09-29 12:19:05 UTC214OUTGET /download.yandex.ru/yandex-pack/downloader/downloader.exe?lid=299 HTTP/1.1
                                                User-Agent: Wget/1.19.2 (mingw32)
                                                Accept: */*
                                                Accept-Encoding: gzip
                                                Host: cachev2-fra-02.cdn.yandex.net
                                                Connection: Keep-Alive
                                                2024-09-29 12:19:05 UTC907INHTTP/1.1 200 OK
                                                Server: nginx
                                                Date: Sun, 29 Sep 2024 12:19:05 GMT
                                                Content-Type: application/octet-stream
                                                Content-Length: 208544
                                                Connection: close
                                                Etag: "b9314504e592d42cb36534415a62b3af"
                                                Last-Modified: Mon, 22 Jul 2024 09:35:20 GMT
                                                X-Amz-Meta-Origin-Date-Iso8601: 2024-07-22T09:04:09.431Z
                                                X-Amz-Request-Id: 756b0a3c97fef450
                                                Access-Control-Allow-Origin: *
                                                X-Robots-Tag: noindex, noarchive, nofollow
                                                X-Strm-Log-Split: 6
                                                X_h: cachev2-fra-02.cdn.yandex.net
                                                X-Strm-Request-Id: b6da3bd147178737
                                                X-Request-Id: b6da3bd147178737
                                                Report-To: {"group": "network-errors", "max_age": 1200, "include_subdomains": true, "endpoints": [ {"url": "https://dr.yandex.net/strm", "priority": 1}, {"url": "https://dr2.yandex.net/strm", "priority": 2} ]}
                                                NEL: {"report_to": "network-errors", "max_age": 1200, "success_fraction": 0.005, "failure_fraction": 0.05, "include_subdomains": true}
                                                Accept-Ranges: bytes
                                                2024-09-29 12:19:05 UTC15477INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 47 87 b3 f5 03 e6 dd a6 03 e6 dd a6 03 e6 dd a6 b7 7a 2c a6 09 e6 dd a6 b7 7a 2e a6 88 e6 dd a6 b7 7a 2f a6 1a e6 dd a6 38 b8 de a7 17 e6 dd a6 38 b8 d9 a7 10 e6 dd a6 38 b8 d8 a7 2f e6 dd a6 0a 9e 4e a6 1a e6 dd a6 03 e6 dc a6 98 e6 dd a6 a9 b8 d4 a7 07 e6 dd a6 a9 b8 22 a6 02 e6 dd a6 03 e6 4a a6 02 e6 dd a6 a9 b8 df a7 02 e6 dd a6 52 69 63 68 03 e6 dd a6 00 00 00 00 00 00 00
                                                Data Ascii: MZ@!L!This program cannot be run in DOS mode.$Gz,z.z/888/N"JRich
                                                2024-09-29 12:19:05 UTC16384INData Raw: 05 c9 ff ff 59 6b 45 08 18 5f 03 c3 89 46 08 6b 45 f8 18 03 c3 89 46 04 89 1e 5e 5b 8b e5 5d c2 04 00 55 8b ec 53 56 57 33 d2 8b f1 51 8b 4d 08 42 e8 86 c8 ff ff 8b 4e 04 8b f8 2b 0e 51 ff 36 57 e8 95 3d 00 00 8b 0e 83 c4 10 8b 5e 04 2b d9 85 c9 74 0d 8b 56 08 6a 01 2b d1 e8 a9 c8 ff ff 59 8b 45 08 03 c7 89 46 08 8d 04 3b 89 46 04 89 3e 5f 5e 5b 5d c2 04 00 55 8b ec 8b 41 10 3b 45 08 72 04 5d c2 04 00 68 dc bb 42 00 e8 0b 2c 00 00 cc 55 8b ec 8b 55 08 85 d2 74 2c 83 79 14 08 72 04 8b 01 eb 02 8b c1 3b d0 72 1c 83 79 14 08 56 72 04 8b 31 eb 02 8b f1 8b 41 10 8d 04 46 5e 3b c2 76 04 b0 01 eb 02 32 c0 5d c2 04 00 55 8b ec 56 8b 75 08 81 fe fe ff ff 7f 77 4b 39 71 14 73 0b ff 71 10 56 e8 59 06 00 00 eb 31 80 7d 0c 00 74 17 83 fe 08 73 12 8b 41 10 3b f0 0f 42
                                                Data Ascii: YkE_FkEF^[]USVW3QMBN+Q6W=^+tVj+YEF;F>_^[]UA;Er]hB,UUt,yr;ryVr1AF^;v2]UVuwK9qsqVY1}tsA;B
                                                2024-09-29 12:19:05 UTC16384INData Raw: ff e0 f7 c7 03 00 00 00 74 13 8a 06 88 07 49 83 c6 01 83 c7 01 f7 c7 03 00 00 00 75 ed 8b d1 83 f9 20 0f 82 ae 02 00 00 c1 e9 02 f3 a5 83 e2 03 ff 24 95 b4 88 40 00 ff 24 8d c4 88 40 00 90 c4 88 40 00 cc 88 40 00 d8 88 40 00 ec 88 40 00 8b 44 24 0c 5e 5f c3 90 8a 06 88 07 8b 44 24 0c 5e 5f c3 90 8a 06 88 07 8a 46 01 88 47 01 8b 44 24 0c 5e 5f c3 8d 49 00 8a 06 88 07 8a 46 01 88 47 01 8a 46 02 88 47 02 8b 44 24 0c 5e 5f c3 90 8d 34 31 8d 3c 39 83 f9 20 0f 82 51 01 00 00 0f ba 25 2c f0 42 00 01 0f 82 94 00 00 00 f7 c7 03 00 00 00 74 14 8b d7 83 e2 03 2b ca 8a 46 ff 88 47 ff 4e 4f 83 ea 01 75 f3 83 f9 20 0f 82 1e 01 00 00 8b d1 c1 e9 02 83 e2 03 83 ee 04 83 ef 04 fd f3 a5 fc ff 24 95 60 89 40 00 90 70 89 40 00 78 89 40 00 88 89 40 00 9c 89 40 00 8b 44 24 0c
                                                Data Ascii: tIu $@$@@@@@D$^_D$^_FGD$^_IFGFGD$^_41<9 Q%,Bt+FGNOu $`@p@x@@@D$
                                                2024-09-29 12:19:05 UTC16384INData Raw: eb 02 33 c9 8b 45 0c 0f b6 84 c8 d8 5b 42 00 c1 e8 04 5d c2 08 00 8b ff 55 8b ec 8a 4d 08 8d 41 e0 3c 5a 77 0f 0f be c1 0f b6 80 18 5c 42 00 83 e0 0f eb 02 33 c0 6b c8 09 8b 45 0c 0f b6 84 01 38 5c 42 00 c1 e8 04 5d c2 08 00 8b ff 55 8b ec 8b 4d 08 8d 41 e0 66 83 f8 5a 77 0f 0f b7 c1 0f b6 88 b8 5b 42 00 83 e1 0f eb 02 33 c9 8b 45 0c 0f b6 84 c8 d8 5b 42 00 c1 e8 04 5d c2 08 00 8b ff 55 8b ec 8b 4d 08 8d 41 e0 66 83 f8 5a 77 0f 0f b7 c1 0f b6 80 18 5c 42 00 83 e0 0f eb 02 33 c0 6b c8 09 8b 45 0c 0f b6 84 01 38 5c 42 00 c1 e8 04 5d c2 08 00 8b ff 55 8b ec 56 8b 75 08 0f be 06 50 e8 92 a9 00 00 83 f8 65 eb 0c 46 0f b6 06 50 e8 a8 a7 00 00 85 c0 59 75 f1 0f be 06 50 e8 75 a9 00 00 59 83 f8 78 75 03 83 c6 02 8b 45 0c 8a 0e 8b 00 8b 80 88 00 00 00 8b 00 8a 00
                                                Data Ascii: 3E[B]UMA<Zw\B3kE8\B]UMAfZw[B3E[B]UMAfZw\B3kE8\B]UVuPeFPYuPuYxuE
                                                2024-09-29 12:19:05 UTC16384INData Raw: 4a ea ff ff 32 c0 e9 32 01 00 00 8b 06 83 e0 01 83 c8 00 74 0b 8d 41 04 89 46 64 8b 78 fc eb 03 83 cf ff 85 ff 75 2a 8b 06 83 e0 04 0b c7 74 14 ff 76 08 e8 84 88 00 00 59 83 f8 ff 74 03 ff 46 0c c6 03 00 e8 6e ed ff ff c7 00 0c 00 00 00 eb b3 83 7d 08 00 8b 46 28 89 45 f0 8b 46 2c 89 45 ec 89 5d e8 89 7d fc 74 0b 83 ff ff 74 06 8d 47 ff 89 45 fc 33 d2 33 c9 8b 45 f0 0b 45 ec 89 4d f8 89 55 f4 74 0a 3b 55 f0 75 05 3b 4d ec 74 6e ff 76 08 e8 24 88 00 00 89 45 e4 59 83 f8 ff 74 03 ff 46 0c 50 ff 75 08 8b ce e8 71 2e 00 00 84 c0 74 39 80 7e 26 00 75 17 8b 4d fc 85 c9 74 1e 8b 55 e8 8b 45 e4 88 02 42 49 89 55 e8 89 4d fc 8b 55 f4 8b 4d f8 83 c2 01 83 d1 00 eb 9a 83 ff ff 0f 84 5d ff ff ff e9 55 ff ff ff 8b 45 e4 8d 4e 08 50 e8 a3 37 00 00 8b 4d f8 8b 55 f4 8b
                                                Data Ascii: J22tAFdxu*tvYtFn}F(EF,E]}ttGE33EEMUt;Uu;Mtnv$EYtFPuq.t9~&uMtUEBIUMUM]UENP7MU
                                                2024-09-29 12:19:05 UTC16384INData Raw: 10 c7 46 08 85 00 00 00 eb 07 c7 46 08 8a 00 00 00 ff 76 08 8b cf 6a 08 ff 15 14 52 42 00 ff d7 59 89 5e 08 eb 10 ff 71 04 89 59 08 8b cf ff 15 14 52 42 00 ff d7 8b 45 f8 59 89 46 04 83 c8 ff 5f 5b 8b 4d fc 33 cd 5e e8 23 30 ff ff 8b e5 5d c3 8b ff 55 8b ec 33 c0 81 7d 08 63 73 6d e0 0f 94 c0 5d c3 6a 0c 68 a8 d6 42 00 e8 4b d4 00 00 8b 75 10 85 f6 75 12 e8 d0 3a ff ff 84 c0 74 09 ff 75 08 e8 36 01 00 00 59 6a 02 e8 33 18 00 00 59 83 65 fc 00 80 3d b0 fe 42 00 00 0f 85 99 00 00 00 33 c0 40 b9 a8 fe 42 00 87 01 c7 45 fc 01 00 00 00 8b 7d 0c 85 ff 75 3c 8b 1d 24 f0 42 00 8b d3 83 e2 1f 6a 20 59 2b ca 33 c0 d3 c8 33 c3 8b 0d ac fe 42 00 3b c8 74 15 33 d9 33 c0 50 50 50 8b ca d3 cb 8b cb ff 15 14 52 42 00 ff d3 68 d4 00 43 00 eb 0a 83 ff 01 75 0b 68 e0 00 43
                                                Data Ascii: FFvjRBY^qYRBEYF_[M3^#0]U3}csm]jhBKuu:tu6Yj3Ye=B3@BE}u<$Bj Y+33B;t33PPPRBhCuhC
                                                2024-09-29 12:19:05 UTC16384INData Raw: 8b 4d 0c 8b f8 8b 49 0c f6 c1 06 75 21 e8 a5 6d ff ff c7 00 09 00 00 00 8b 45 0c 6a 10 59 83 c0 0c f0 09 08 b8 ff ff 00 00 e9 d5 00 00 00 8b 45 0c 8b 40 0c c1 e8 0c a8 01 74 0d e8 77 6d ff ff c7 00 22 00 00 00 eb d0 8b 45 0c 8b 40 0c a8 01 74 28 8b 45 0c 83 60 08 00 8b 45 0c 8b 40 0c c1 e8 03 a8 01 8b 45 0c 74 b2 8b 48 04 89 08 8b 45 0c 6a fe 59 83 c0 0c f0 21 08 8b 45 0c 53 56 6a 02 5b 83 c0 0c f0 09 18 8b 45 0c 6a f7 59 83 c0 0c f0 21 08 8b 45 0c 83 60 08 00 8b 45 0c 8b 40 0c a9 c0 04 00 00 75 31 8b 75 0c 6a 01 e8 35 bb ff ff 59 3b f0 74 0e 8b 75 0c 53 e8 27 bb ff ff 59 3b f0 75 0b 57 e8 bc 37 00 00 59 85 c0 75 09 ff 75 0c e8 26 51 00 00 59 ff 75 0c 8b 75 08 56 e8 ed 00 00 00 59 59 84 c0 75 13 8b 45 0c 6a 10 59 83 c0 0c f0 09 08 b8 ff ff 00 00 eb 03 0f
                                                Data Ascii: MIu!mEjYE@twm"E@t(E`E@EtHEjY!ESVj[EjY!E`E@u1uj5Y;tuS'Y;uW7Yuu&QYuuVYYuEjY
                                                2024-09-29 12:19:05 UTC16384INData Raw: ff ff 00 00 10 00 89 b5 8c fa ff ff 3b de 0f 85 00 02 00 00 33 c9 8b 84 0d 90 fa ff ff 3b 84 0d 30 fe ff ff 0f 85 ea 01 00 00 83 c1 04 83 f9 08 75 e4 8b 85 b4 f8 ff ff 33 d2 83 c0 02 8b f0 83 e0 1f 6a 20 59 2b c8 89 85 a4 f8 ff ff 33 c0 c1 ee 05 40 89 b5 b0 f8 ff ff 89 8d 90 f8 ff ff e8 37 53 00 00 83 a5 9c f8 ff ff 00 48 0f bd cf 89 85 a8 f8 ff ff f7 d0 89 85 8c f8 ff ff 74 03 41 eb 02 33 c9 6a 20 58 2b c1 8d 56 02 39 85 a4 f8 ff ff 89 95 ac f8 ff ff 0f 97 c0 83 fa 73 88 85 bb f8 ff ff 0f 97 c1 83 fa 73 75 08 84 c0 74 04 b0 01 eb 02 32 c0 84 c9 0f 85 ef 00 00 00 84 c0 0f 85 e7 00 00 00 6a 72 59 3b d1 72 08 8b d1 89 8d ac f8 ff ff 8b ca 89 8d a0 f8 ff ff 83 fa ff 0f 84 96 00 00 00 8b f2 8d 85 30 fe ff ff 8b 95 b0 f8 ff ff 2b f2 8d 04 b0 89 85 b4 f8 ff ff
                                                Data Ascii: ;3;0u3j Y+3@7SHtA3j X+V9ssut2jrY;r0+
                                                2024-09-29 12:19:05 UTC16384INData Raw: cc cc cc cc cc cc cc cc cc cc cc d9 c0 d9 fc dc e1 d9 c9 d9 e0 d9 f0 d9 e8 de c1 d9 fd dd d9 c3 8b 54 24 04 81 e2 00 03 00 00 83 ca 7f 66 89 54 24 06 d9 6c 24 06 c3 a9 00 00 08 00 74 06 b8 00 00 00 00 c3 dc 05 c0 a0 42 00 b8 00 00 00 00 c3 8b 42 04 25 00 00 f0 7f 3d 00 00 f0 7f 74 03 dd 02 c3 8b 42 04 83 ec 0a 0d 00 00 ff 7f 89 44 24 06 8b 42 04 8b 0a 0f a4 c8 0b c1 e1 0b 89 44 24 04 89 0c 24 db 2c 24 83 c4 0a a9 00 00 00 00 8b 42 04 c3 8b 44 24 08 25 00 00 f0 7f 3d 00 00 f0 7f 74 01 c3 8b 44 24 08 c3 66 81 3c 24 7f 02 74 03 d9 2c 24 5a c3 66 8b 04 24 66 3d 7f 02 74 1e 66 83 e0 20 74 15 9b df e0 66 83 e0 20 74 0c b8 08 00 00 00 e8 d9 00 00 00 5a c3 d9 2c 24 5a c3 83 ec 08 dd 14 24 8b 44 24 04 83 c4 08 25 00 00 f0 7f eb 14 83 ec 08 dd 14 24 8b 44 24 04 83
                                                Data Ascii: T$fT$l$tBB%=tBD$BD$$,$BD$%=tD$f<$t,$Zf$f=tf tf tZ,$Z$D$%$D$
                                                2024-09-29 12:19:05 UTC16384INData Raw: 8b 4a e8 33 c8 e8 66 30 fe ff b8 ec d1 42 00 e9 94 58 fe ff 8b 54 24 08 8d 42 0c 8b 4a bc 33 c8 e8 4b 30 fe ff b8 18 d2 42 00 e9 79 58 fe ff 8b 54 24 08 8d 42 0c 8b 4a ec 33 c8 e8 30 30 fe ff b8 e0 d4 42 00 e9 5e 58 fe ff cc 6a 00 6a 01 b9 28 f9 42 00 e8 ee f7 fd ff c3 cc 68 08 f0 42 00 ff 15 68 51 42 00 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                Data Ascii: J3f0BXT$BJ3K0ByXT$BJ300B^Xjj(BhBhQB


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:08:19:00
                                                Start date:29/09/2024
                                                Path:C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe"
                                                Imagebase:0x400000
                                                File size:2'685'976 bytes
                                                MD5 hash:E3C955967B61AFD68FFDF50F9D4E085A
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:low
                                                Has exited:false

                                                Target ID:2
                                                Start time:08:19:01
                                                Start date:29/09/2024
                                                Path:C:\Windows\SysWOW64\mshta.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\start.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
                                                Imagebase:0xcb0000
                                                File size:13'312 bytes
                                                MD5 hash:06B02D5C097C7DB1F109749C45F3F505
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:false

                                                Target ID:4
                                                Start time:08:19:01
                                                Start date:29/09/2024
                                                Path:C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exe" -O o9iQbd0.exe https://download.yandex.ru/yandex-pack/downloader/downloader.exe
                                                Imagebase:0x400000
                                                File size:3'501'408 bytes
                                                MD5 hash:E314B40A188DE73B6A16A8197F80EE68
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Antivirus matches:
                                                • Detection: 2%, ReversingLabs
                                                Reputation:low
                                                Has exited:true

                                                Target ID:5
                                                Start time:08:19:01
                                                Start date:29/09/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:21.9%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:11.3%
                                                  Total number of Nodes:1688
                                                  Total number of Limit Nodes:31
                                                  execution_graph 8909 40b382 8910 40178c 15 API calls 8909->8910 8911 40b3a2 8909->8911 8910->8911 8912 40b3e5 8911->8912 8913 40b3da SendMessageA 8911->8913 8916 40b3ac 8911->8916 8914 40b3fe 8912->8914 8915 40b3ee SendDlgItemMessageA 8912->8915 8913->8912 8918 40a3ac 28 API calls 8914->8918 8915->8914 8917 40b46b EndDialog 8916->8917 8926 40b3bd 8916->8926 8917->8926 8919 40b404 GetDlgItem SendMessageA GetSysColor SendMessageA 8918->8919 8920 40a886 47 API calls 8919->8920 8921 40b43f 8920->8921 8921->8916 8922 40b449 8921->8922 8923 4055bd 29 API calls 8922->8923 8924 40b45c 8923->8924 8925 408a78 ctype 2 API calls 8924->8925 8925->8926 8927 40cd83 8928 401628 4 API calls 8927->8928 8929 40cd8d 8928->8929 8615 40ae48 8643 408ac3 OemToCharBuffA CharUpperA CharToOemBuffA 8615->8643 8617 409f89 ExpandEnvironmentStringsA 8641 40a8ce 8617->8641 8618 40b345 8619 40a90e lstrcmpiA 8619->8641 8620 40a955 GetCurrentDirectoryA 8620->8641 8621 40abeb SetWindowTextA 8621->8641 8622 40a130 3 API calls 8622->8641 8623 40ad0b RegOpenKeyExA 8625 40ad27 RegQueryValueExA RegCloseKey 8623->8625 8623->8641 8624 408a97 4 API calls 8624->8641 8625->8641 8626 40445f MultiByteToWideChar 8626->8641 8627 408a78 ctype 2 API calls 8627->8641 8628 40a326 3 API calls 8631 40ac9c GetDlgItem SetWindowTextA SendMessageA 8628->8631 8629 40a9e2 SetFileAttributesA 8632 40aaa8 GetFileAttributesA 8629->8632 8629->8641 8630 40444c FindClose 8630->8641 8631->8641 8634 40aab6 DeleteFileA 8632->8634 8632->8641 8633 4069f0 GetVersionExA 8633->8641 8634->8641 8635 40acdb SendMessageA 8635->8641 8636 40482f 14 API calls 8636->8641 8637 40aad3 wsprintfA GetFileAttributesA 8638 40aaf5 MoveFileA 8637->8638 8637->8641 8638->8641 8639 406eb5 4 API calls 8639->8641 8640 40ab16 MoveFileExA 8640->8641 8641->8617 8641->8618 8641->8619 8641->8620 8641->8621 8641->8622 8641->8623 8641->8624 8641->8626 8641->8627 8641->8628 8641->8629 8641->8630 8641->8632 8641->8633 8641->8635 8641->8636 8641->8637 8641->8639 8641->8640 8642 40aa87 SHFileOperationA 8641->8642 8642->8632 8643->8641 7051 40ae8a 7052 40ae94 7051->7052 7065 40a8ce 7051->7065 7082 40a66d 7052->7082 7053 409f89 ExpandEnvironmentStringsA 7053->7065 7055 40b345 7056 40a90e lstrcmpiA 7056->7065 7057 40a955 GetCurrentDirectoryA 7057->7065 7058 40abeb SetWindowTextA 7058->7065 7059 40a130 3 API calls 7059->7065 7060 40ad0b RegOpenKeyExA 7062 40ad27 RegQueryValueExA RegCloseKey 7060->7062 7060->7065 7061 408a97 4 API calls 7061->7065 7062->7065 7063 40445f MultiByteToWideChar 7063->7065 7064 40482f 14 API calls 7064->7065 7065->7053 7065->7055 7065->7056 7065->7057 7065->7058 7065->7059 7065->7060 7065->7061 7065->7063 7065->7064 7066 408a78 ctype 2 API calls 7065->7066 7069 40444c FindClose 7065->7069 7080 40a9dd 7065->7080 7066->7065 7067 40a326 3 API calls 7070 40ac9c GetDlgItem SetWindowTextA SendMessageA 7067->7070 7068 40a9e2 SetFileAttributesA 7071 40aaa8 GetFileAttributesA 7068->7071 7068->7080 7069->7065 7070->7080 7073 40aab6 DeleteFileA 7071->7073 7071->7080 7072 4069f0 GetVersionExA 7072->7080 7073->7080 7074 40acdb SendMessageA 7074->7065 7075 40482f 14 API calls 7075->7080 7076 40aad3 wsprintfA GetFileAttributesA 7077 40aaf5 MoveFileA 7076->7077 7076->7080 7077->7080 7078 406eb5 4 API calls 7078->7080 7079 40ab16 MoveFileExA 7079->7080 7080->7065 7080->7067 7080->7068 7080->7071 7080->7072 7080->7074 7080->7075 7080->7076 7080->7078 7080->7079 7081 40aa87 SHFileOperationA 7080->7081 7081->7071 7084 40a67f 7082->7084 7083 40a87f 7083->7065 7084->7083 7085 40a732 7084->7085 7117 408f36 CompareStringA 7084->7117 7107 403525 7085->7107 7090 40a7a4 ShellExecuteExA 7091 40a7d6 7090->7091 7092 40a7b9 ShellExecuteExA 7090->7092 7093 40a823 CloseHandle 7091->7093 7094 40a7f5 IsWindowVisible 7091->7094 7095 40a80d WaitForInputIdle 7091->7095 7092->7083 7092->7091 7098 40a831 7093->7098 7099 40a83e 7093->7099 7094->7095 7096 40a800 ShowWindow 7094->7096 7113 40a060 WaitForSingleObject 7095->7113 7096->7095 7120 408f36 CompareStringA 7098->7120 7102 40a86a Sleep 7099->7102 7104 40a870 7099->7104 7101 40a75c 7101->7090 7103 403525 3 API calls 7101->7103 7102->7104 7105 40a79c 7103->7105 7104->7083 7106 40a875 ShowWindow 7104->7106 7105->7083 7105->7090 7106->7083 7121 4069f0 7107->7121 7110 403545 GetFileAttributesA 7111 40354f 7110->7111 7111->7101 7118 403611 GetFullPathNameA 7111->7118 7112 40353c GetFileAttributesW 7112->7111 7114 40a095 7113->7114 7115 40a099 7114->7115 7116 40a07c PeekMessageA WaitForSingleObject 7114->7116 7115->7093 7116->7114 7117->7085 7119 403639 7118->7119 7119->7101 7120->7099 7122 40352a 7121->7122 7123 406a03 GetVersionExA 7121->7123 7122->7110 7122->7112 7123->7122 8644 403f57 8645 403f65 8644->8645 8648 40165b 8645->8648 8647 403f86 8649 40a5d0 8648->8649 8650 40a605 8649->8650 8651 40a5fa IsWindowVisible 8649->8651 8653 40a5df 8649->8653 8652 40a60f DialogBoxParamA 8650->8652 8650->8653 8651->8650 8652->8653 8653->8647 8654 4054d8 8655 405531 GetWindowLongA 8654->8655 8656 4054e9 8654->8656 8665 405435 8655->8665 8658 4054ec 8656->8658 8659 40551f GetWindowLongA 8656->8659 8661 4054f1 8658->8661 8662 405503 GetWindowLongA 8658->8662 8663 40551d 8659->8663 8660 405542 DefWindowProcA 8661->8660 8664 4054f6 SetWindowLongA 8661->8664 8662->8663 8663->8660 8664->8660 8666 4069f0 GetVersionExA 8665->8666 8667 40543d 8666->8667 8668 4054d3 8667->8668 8669 409004 2 API calls 8667->8669 8668->8660 8670 405459 8669->8670 8670->8668 8674 404ab5 CLSIDFromString CoCreateInstance 8670->8674 8673 405480 8676 4050c9 8673->8676 8675 404ae8 8674->8675 8675->8673 8677 4050e8 8676->8677 8690 40526c 8676->8690 8678 405105 lstrlenA GlobalAlloc 8677->8678 8679 40512f GetVersionExA 8678->8679 8678->8690 8680 405146 8679->8680 8695 408f59 CompareStringA 8680->8695 8682 4051ab 8683 4051e6 8682->8683 8684 404e52 4 API calls 8682->8684 8685 40524d CreateStreamOnHGlobal 8683->8685 8696 408a5f GetProcessHeap RtlAllocateHeap 8683->8696 8684->8683 8686 40525e 8685->8686 8685->8690 8697 404d66 GetTickCount 8686->8697 8689 4051f4 8689->8685 8691 4051fb MultiByteToWideChar WideCharToMultiByte 8689->8691 8690->8668 8692 40522a 8691->8692 8693 408a78 ctype 2 API calls 8692->8693 8694 405235 8693->8694 8694->8685 8695->8682 8696->8689 8698 404d85 8697->8698 8699 404d98 GetTickCount 8698->8699 8702 404dd9 8698->8702 8700 404da4 PeekMessageA 8699->8700 8699->8702 8700->8698 8701 404db6 GetMessageA TranslateMessage DispatchMessageA 8700->8701 8701->8698 8702->8690 8703 401558 8704 4013b9 2 API calls 8703->8704 8705 401560 8704->8705 8706 4033da 8707 4033e2 ctype 8706->8707 8708 4033ef 8707->8708 8709 408ff7 ctype 2 API calls 8707->8709 8709->8708 8710 40b35e 8711 40178c 15 API calls 8710->8711 8712 40b3a2 8711->8712 8713 40b3e5 8712->8713 8714 40b3da SendMessageA 8712->8714 8717 40b3ac 8712->8717 8715 40b3fe 8713->8715 8716 40b3ee SendDlgItemMessageA 8713->8716 8714->8713 8719 40a3ac 28 API calls 8715->8719 8716->8715 8718 40b46b EndDialog 8717->8718 8727 40b3bd 8717->8727 8718->8727 8720 40b404 GetDlgItem SendMessageA GetSysColor SendMessageA 8719->8720 8721 40a886 47 API calls 8720->8721 8722 40b43f 8721->8722 8722->8717 8723 40b449 8722->8723 8724 4055bd 29 API calls 8723->8724 8725 40b45c 8724->8725 8726 408a78 ctype 2 API calls 8725->8726 8726->8727 6960 40aea6 6961 40aeb0 GetTempPathA 6960->6961 6976 40a8ce 6960->6976 6966 40aece 6961->6966 6963 40b345 6964 40aef8 GetFileAttributesA 6965 40af09 SetDlgItemTextA 6964->6965 6964->6966 6968 40af28 6965->6968 6965->6976 6966->6964 6967 40a90e lstrcmpiA 6967->6976 6971 40afc7 MessageBoxA 6968->6971 6968->6976 6969 40a955 GetCurrentDirectoryA 6969->6976 6970 40abeb SetWindowTextA 6970->6976 6972 40aff0 EndDialog 6971->6972 6971->6976 6972->6976 6974 40ad0b RegOpenKeyExA 6974->6976 6977 40ad27 RegQueryValueExA RegCloseKey 6974->6977 6976->6963 6976->6967 6976->6969 6976->6970 6976->6974 6979 40a9dd 6976->6979 6996 409f89 6976->6996 7000 40445f 6976->7000 7004 40482f 6976->7004 7013 40444c 6976->7013 7016 40a130 6976->7016 7022 408a97 6976->7022 7027 408a78 6976->7027 6977->6976 6979->6976 6983 40a9e2 SetFileAttributesA 6979->6983 6986 40aaa8 GetFileAttributesA 6979->6986 6988 40acdb SendMessageA 6979->6988 6989 40482f 14 API calls 6979->6989 6990 40aad3 wsprintfA GetFileAttributesA 6979->6990 6993 4069f0 GetVersionExA 6979->6993 6994 40ab16 MoveFileExA 6979->6994 6995 40aa87 SHFileOperationA 6979->6995 7008 406eb5 6979->7008 7030 40a326 6979->7030 6983->6979 6983->6986 6986->6979 6987 40aab6 DeleteFileA 6986->6987 6987->6979 6988->6976 6989->6979 6990->6979 6991 40aaf5 MoveFileA 6990->6991 6991->6979 6993->6979 6994->6979 6995->6986 6998 409f96 6996->6998 6997 40a04a 6997->6976 6998->6997 6999 40a024 ExpandEnvironmentStringsA 6998->6999 6999->6997 7002 40446c 7000->7002 7001 404487 7001->6976 7002->7001 7037 40c7d9 MultiByteToWideChar 7002->7037 7007 40483d 7004->7007 7005 4048ba 7005->6976 7006 404492 14 API calls 7006->7007 7007->7005 7007->7006 7039 406e90 7008->7039 7011 406edb 7011->6979 7014 404457 FindClose 7013->7014 7015 40445e 7013->7015 7014->7015 7015->6976 7017 40a13d 7016->7017 7049 408a5f GetProcessHeap RtlAllocateHeap 7017->7049 7019 409f89 ExpandEnvironmentStringsA 7021 40a149 7019->7021 7020 40a1e7 7020->6976 7021->7019 7021->7020 7023 408aa0 7022->7023 7024 408aaa GetProcessHeap HeapReAlloc 7022->7024 7050 408a5f GetProcessHeap RtlAllocateHeap 7023->7050 7026 408aa8 7024->7026 7026->6976 7028 408a81 GetProcessHeap RtlFreeHeap 7027->7028 7029 408a93 7027->7029 7028->7029 7029->6976 7031 40a3a8 GetDlgItem SetWindowTextA SendMessageA 7030->7031 7032 40a338 7030->7032 7031->6979 7033 40a347 RegOpenKeyExA 7032->7033 7033->7031 7034 40a364 RegQueryValueExA 7033->7034 7035 40a390 7034->7035 7036 40a39f RegCloseKey 7034->7036 7035->7036 7036->7031 7038 40c7f8 7037->7038 7038->7001 7044 40bde9 7039->7044 7042 408fac wvsprintfA 7043 408fd1 7042->7043 7043->7011 7045 406e9e 7044->7045 7046 40bdf4 7044->7046 7045->7011 7045->7042 7048 408ac3 OemToCharBuffA CharUpperA CharToOemBuffA 7046->7048 7048->7045 7049->7021 7050->7026 8957 4050a8 8958 4050c2 8957->8958 8959 4050b5 8957->8959 8960 408ff7 ctype 2 API calls 8959->8960 8960->8958 8728 409ae9 8729 40178c 15 API calls 8728->8729 8730 409b0b 8729->8730 8731 409b15 8730->8731 8732 409b47 SetDlgItemTextA SetDlgItemTextA 8730->8732 8733 409b22 8731->8733 8734 409b30 SendDlgItemMessageA 8731->8734 8735 409b1f 8731->8735 8732->8733 8736 409b27 EndDialog 8734->8736 8735->8733 8735->8736 8736->8733 8737 409b69 8738 40178c 15 API calls 8737->8738 8739 409b88 8738->8739 8740 409b92 8739->8740 8741 409bc5 SetDlgItemTextA 8739->8741 8742 409b9f 8740->8742 8743 409b9c 8740->8743 8744 409bae GetDlgItemTextA 8740->8744 8741->8742 8743->8742 8745 409ba5 EndDialog 8743->8745 8744->8745 8745->8742 8773 4097ed 8774 40178c 15 API calls 8773->8774 8775 409816 8774->8775 8776 409820 8775->8776 8777 409885 8775->8777 8778 40985d SendDlgItemMessageA 8776->8778 8783 409842 8776->8783 8779 4098b2 SetDlgItemTextA SHGetFileInfoA SendDlgItemMessageA FindFirstFileA 8777->8779 8780 409871 DestroyIcon 8778->8780 8781 409878 EndDialog 8778->8781 8782 40991a FileTimeToLocalFileTime FileTimeToSystemTime GetTimeFormatA GetDateFormatA 8779->8782 8779->8783 8780->8781 8781->8783 8784 4089e6 3 API calls 8782->8784 8785 409972 wsprintfA SetDlgItemTextA FindClose 8784->8785 8786 4099aa 8785->8786 8787 4099eb SendDlgItemMessageA DosDateTimeToFileTime FileTimeToSystemTime GetTimeFormatA GetDateFormatA 8785->8787 8799 4091e1 8786->8799 8788 4089e6 3 API calls 8787->8788 8790 409a67 wsprintfA SetDlgItemTextA 8788->8790 8793 409a9b 8790->8793 8791 4099bd 8792 4089e6 3 API calls 8791->8792 8794 4099c7 wsprintfA SetDlgItemTextA 8792->8794 8793->8783 8795 4091e1 2 API calls 8793->8795 8794->8787 8796 409aae 8795->8796 8797 4089e6 3 API calls 8796->8797 8798 409ab8 wsprintfA SetDlgItemTextA 8797->8798 8798->8783 8800 4091f4 8799->8800 8801 4091f9 8799->8801 8804 4091c2 GetLocaleInfoA 8800->8804 8803 40921d GetNumberFormatA 8801->8803 8803->8791 8804->8801 8450 40912e 8455 409051 8450->8455 8454 40913e 8456 409066 8455->8456 8458 409079 8456->8458 8496 40ca9c 8456->8496 8459 4090f4 8458->8459 8499 401628 8458->8499 8461 40bb93 OleInitialize 8459->8461 8462 40c9ea 2 API calls 8461->8462 8463 40bbaf GetCommandLineA 8462->8463 8464 40bbc1 8463->8464 8465 40bbcf GetModuleFileNameA SetEnvironmentVariableA 8463->8465 8556 409dfb 8464->8556 8466 4069f0 GetVersionExA 8465->8466 8469 40bbee 8466->8469 8470 40bbf2 GetModuleFileNameW 8469->8470 8471 40bc05 8469->8471 8472 40bc0d GetModuleHandleA LoadIconA LoadBitmapA 8470->8472 8471->8472 8560 40cc30 LoadLibraryA LoadLibraryA #17 LoadLibraryA 8472->8560 8474 40bc45 8565 4089cf 8474->8565 8476 40bc50 8477 4095f7 3 API calls 8476->8477 8478 40bc67 8477->8478 8479 4095f7 3 API calls 8478->8479 8480 40bc71 DialogBoxParamA 8479->8480 8570 404cf8 8480->8570 8483 404cf8 OleUninitialize 8484 40bcb9 8483->8484 8573 40cca8 8484->8573 8488 40bcf1 DeleteObject 8490 40bd08 DeleteObject 8488->8490 8492 40bd0b 8488->8492 8489 40bcce 8489->8488 8491 408a78 ctype 2 API calls 8489->8491 8490->8492 8491->8488 8493 40bd43 OleUninitialize ExitProcess 8492->8493 8494 40bd3d 8492->8494 8494->8492 8495 40a060 3 API calls 8494->8495 8495->8493 8503 40c9ea GetCPInfo 8496->8503 8500 401630 8499->8500 8506 401568 8500->8506 8504 40ca0e IsDBCSLeadByte 8503->8504 8504->8504 8505 40ca26 8504->8505 8505->8458 8529 4013b9 8506->8529 8509 409004 2 API calls 8510 40159f 8509->8510 8511 4015ab 8510->8511 8512 40c0f5 2 API calls 8510->8512 8513 409004 2 API calls 8511->8513 8512->8511 8514 4015bb 8513->8514 8515 4015c7 8514->8515 8516 40c0f5 2 API calls 8514->8516 8517 409004 2 API calls 8515->8517 8516->8515 8518 4015d7 8517->8518 8519 40c0f5 2 API calls 8518->8519 8520 4015e3 8518->8520 8519->8520 8521 409004 2 API calls 8520->8521 8522 4015f3 8521->8522 8523 4015ff 8522->8523 8524 40c0f5 2 API calls 8522->8524 8525 409004 2 API calls 8523->8525 8524->8523 8526 40160f 8525->8526 8527 40161b 8526->8527 8528 40c0f5 2 API calls 8526->8528 8527->8459 8528->8527 8530 4013cb 8529->8530 8542 4013d8 8529->8542 8531 40bfaa 2 API calls 8530->8531 8534 4013d2 8531->8534 8532 401408 8537 401420 8532->8537 8541 40bfaa 2 API calls 8532->8541 8533 4013f0 8533->8532 8536 40bfaa 2 API calls 8533->8536 8553 408ff7 8534->8553 8535 40bfaa 2 API calls 8539 4013ea 8535->8539 8540 401402 8536->8540 8543 40143a 8537->8543 8547 40bfaa 2 API calls 8537->8547 8544 408ff7 ctype 2 API calls 8539->8544 8545 408ff7 ctype 2 API calls 8540->8545 8546 40141a 8541->8546 8542->8533 8542->8535 8549 401571 8543->8549 8551 408a78 ctype 2 API calls 8543->8551 8544->8533 8545->8532 8548 408ff7 ctype 2 API calls 8546->8548 8550 401434 8547->8550 8548->8537 8549->8509 8552 408ff7 ctype 2 API calls 8550->8552 8551->8549 8552->8543 8554 408a78 ctype 2 API calls 8553->8554 8555 409002 8554->8555 8555->8542 8558 409e10 8556->8558 8557 409f82 SetEnvironmentVariableA 8557->8465 8558->8557 8559 408ac3 OemToCharBuffA CharUpperA CharToOemBuffA 8558->8559 8559->8558 8561 40cc97 SHGetMalloc 8560->8561 8562 40cc7a GetProcAddress 8560->8562 8561->8474 8563 40cc90 FreeLibrary 8562->8563 8564 40cc8a 8562->8564 8563->8561 8564->8563 8586 408382 8565->8586 8567 4089db 8603 40879e GetModuleHandleA FindResourceA 8567->8603 8569 4089e2 8569->8476 8571 404d04 8570->8571 8572 404cfe OleUninitialize 8570->8572 8571->8483 8572->8571 8574 40ccb8 FreeLibrary 8573->8574 8575 40ccbb 8573->8575 8574->8575 8576 40ccc2 FreeLibrary 8575->8576 8577 40bcc1 8575->8577 8576->8577 8577->8489 8578 40a09f GetCurrentDirectoryA 8577->8578 8579 40a0c3 8578->8579 8580 40a12e 8578->8580 8608 408f59 CompareStringA 8579->8608 8580->8489 8582 40a0dd 8582->8580 8583 40a0e1 SetCurrentDirectoryA 8582->8583 8584 40a0f8 8583->8584 8585 40a10d SHFileOperationA 8584->8585 8585->8580 8587 40838f 8586->8587 8588 4083a6 GetModuleFileNameA 8587->8588 8590 4083cb 8587->8590 8589 4083c2 8588->8589 8589->8590 8602 4083fc ctype 8589->8602 8591 403005 5 API calls 8590->8591 8600 4083f8 8591->8600 8592 4084e6 8593 4033f6 35 API calls 8592->8593 8592->8602 8595 40850b 8593->8595 8594 402f5d 33 API calls 8594->8600 8607 408a5f GetProcessHeap RtlAllocateHeap 8595->8607 8597 403460 39 API calls 8597->8600 8598 408519 8599 403460 39 API calls 8598->8599 8598->8602 8599->8602 8600->8592 8600->8594 8600->8597 8601 4033f6 35 API calls 8600->8601 8600->8602 8601->8600 8602->8567 8604 4087c6 8603->8604 8605 4087cc 8603->8605 8604->8569 8606 408642 wvsprintfA 8605->8606 8606->8604 8607->8598 8608->8582 8609 402eaf 8610 402ec1 8609->8610 8611 402ebb 8609->8611 8610->8611 8612 402ee1 8610->8612 8613 402ecf CloseHandle 8610->8613 8612->8611 8614 40185b 30 API calls 8612->8614 8613->8612 8614->8611 8961 40b032 8962 40b038 8961->8962 8990 40a8ce 8961->8990 8963 40b051 8962->8963 8964 40b041 SetWindowTextA 8962->8964 8965 40a130 3 API calls 8963->8965 8964->8963 8965->8990 8966 409f89 ExpandEnvironmentStringsA 8966->8990 8967 40b345 8968 40a90e lstrcmpiA 8968->8990 8969 40a955 GetCurrentDirectoryA 8969->8990 8970 40abeb SetWindowTextA 8970->8990 8971 40a130 3 API calls 8971->8990 8972 40ad0b RegOpenKeyExA 8974 40ad27 RegQueryValueExA RegCloseKey 8972->8974 8972->8990 8973 408a97 4 API calls 8973->8990 8974->8990 8975 40445f MultiByteToWideChar 8975->8990 8976 408a78 ctype 2 API calls 8976->8990 8977 40a326 3 API calls 8980 40ac9c GetDlgItem SetWindowTextA SendMessageA 8977->8980 8978 40a9e2 SetFileAttributesA 8981 40aaa8 GetFileAttributesA 8978->8981 8978->8990 8979 40444c FindClose 8979->8990 8980->8990 8983 40aab6 DeleteFileA 8981->8983 8981->8990 8982 4069f0 GetVersionExA 8982->8990 8983->8990 8984 40acdb SendMessageA 8984->8990 8985 40482f 14 API calls 8985->8990 8986 40aad3 wsprintfA GetFileAttributesA 8987 40aaf5 MoveFileA 8986->8987 8986->8990 8987->8990 8988 406eb5 4 API calls 8988->8990 8989 40ab16 MoveFileExA 8989->8990 8990->8966 8990->8967 8990->8968 8990->8969 8990->8970 8990->8971 8990->8972 8990->8973 8990->8975 8990->8976 8990->8977 8990->8978 8990->8979 8990->8981 8990->8982 8990->8984 8990->8985 8990->8986 8990->8988 8990->8989 8991 40aa87 SHFileOperationA 8990->8991 8991->8981 8805 4049f5 8806 404a0a GetClientRect CopyRect 8805->8806 8808 404a66 8806->8808 8992 4049b7 IsWindow 8993 4049c9 8992->8993 7124 40b47b 7125 40b488 7124->7125 7245 40178c 7125->7245 7128 40b4b4 7134 40b525 GetDlgItemTextA 7128->7134 7135 40b4be 7128->7135 7192 40b4c6 7128->7192 7129 40b8a6 7130 40b8ca 7129->7130 7131 40b8bb SendMessageA 7129->7131 7132 40b8e3 7130->7132 7133 40b8d3 SendDlgItemMessageA 7130->7133 7131->7130 7313 40a3ac 7132->7313 7133->7132 7137 40b4fe 7134->7137 7138 40b55f 7134->7138 7135->7137 7139 40b4c1 7135->7139 7146 40b556 EndDialog 7137->7146 7137->7192 7141 40b579 GetDlgItem 7138->7141 7242 40b567 7138->7242 7139->7192 7363 4089e6 7139->7363 7142 40b58d SendMessageA SendMessageA 7141->7142 7143 40b5ae SetFocus 7141->7143 7142->7143 7251 40379f 7143->7251 7144 40b962 SetWindowPos DestroyWindow SendMessageA 7151 40b993 SendMessageA 7144->7151 7152 40b99e SendMessageA 7144->7152 7145 40b959 SetMenu 7150 40b9b0 GetCurrentDirectoryA GetDlgItem 7145->7150 7146->7192 7156 40b9e1 SetWindowTextA 7150->7156 7157 40b9db 7150->7157 7151->7152 7152->7150 7155 40b855 7161 4089e6 3 API calls 7155->7161 7331 409452 7156->7331 7157->7156 7159 40b5e2 SetCurrentDirectoryA 7166 40b601 7159->7166 7167 40b5fa GetLastError 7159->7167 7160 40b5d2 GetLastError 7164 40b5d9 7160->7164 7165 40b862 SetDlgItemTextA 7161->7165 7163 40b4e6 SetDlgItemTextA 7163->7192 7164->7159 7170 40b875 7165->7170 7171 4069f0 GetVersionExA 7166->7171 7167->7166 7169 40a886 47 API calls 7187 40bb15 7169->7187 7174 4089e6 3 API calls 7170->7174 7175 40b60a 7171->7175 7173 40bb23 EnableWindow 7178 40bb2d 7173->7178 7181 40b892 7174->7181 7186 40b688 7175->7186 7188 40b61b GetTickCount wsprintfA 7175->7188 7219 40b66b ctype 7175->7219 7177 40a886 47 API calls 7215 40ba28 7177->7215 7179 40bb47 7178->7179 7401 40176e GetDlgItem KiUserCallbackDispatcher 7178->7401 7183 40bb72 7179->7183 7197 40bb64 SendMessageA 7179->7197 7198 40bb6c PostMessageA 7179->7198 7180 40ba8b 7180->7187 7194 40a886 47 API calls 7180->7194 7184 4089e6 3 API calls 7181->7184 7183->7192 7200 4089e6 3 API calls 7183->7200 7193 40b899 MessageBoxA 7184->7193 7185 40b7a4 7267 40a2a5 7185->7267 7201 40b6a6 GetModuleFileNameA wsprintfA ShellExecuteExA 7186->7201 7202 40b747 7186->7202 7187->7173 7187->7178 7189 40b642 7188->7189 7258 40311a 7189->7258 7190 40bb3e 7402 40176e GetDlgItem KiUserCallbackDispatcher 7190->7402 7193->7192 7195 40baa4 7194->7195 7204 40bad5 7195->7204 7211 40bab5 7195->7211 7197->7183 7198->7183 7209 40bb81 SetDlgItemTextA 7200->7209 7201->7202 7203 40b724 WaitForInputIdle Sleep 7201->7203 7206 4089e6 3 API calls 7202->7206 7210 40b797 EndDialog 7203->7210 7214 40bae0 DialogBoxParamA 7204->7214 7221 40bafc 7204->7221 7213 40b751 wsprintfA 7206->7213 7207 4089e6 3 API calls 7207->7215 7209->7192 7210->7192 7217 4055bd 29 API calls 7211->7217 7212 40b659 7218 40b660 GetLastError 7212->7218 7212->7219 7220 40b779 7213->7220 7214->7221 7215->7180 7215->7207 7228 40ba68 7215->7228 7216 40b7bf 7274 40176e GetDlgItem KiUserCallbackDispatcher 7216->7274 7223 40baca 7217->7223 7218->7219 7219->7185 7219->7186 7227 4089e6 3 API calls 7220->7227 7221->7169 7226 408a78 ctype 2 API calls 7223->7226 7224 40b7c8 7275 40176e GetDlgItem KiUserCallbackDispatcher 7224->7275 7226->7204 7230 40b782 MessageBoxA 7227->7230 7228->7180 7231 40ba70 7228->7231 7229 40b7d0 7276 40a886 7229->7276 7230->7210 7375 4055bd 7231->7375 7235 40a886 47 API calls 7236 40b7ec 7235->7236 7307 409c78 7236->7307 7239 40a886 47 API calls 7243 40b809 7239->7243 7240 40b82f 7374 40176e GetDlgItem KiUserCallbackDispatcher 7240->7374 7242->7155 7242->7221 7243->7240 7244 40a886 47 API calls 7243->7244 7244->7240 7246 401795 7245->7246 7247 4017b9 7245->7247 7248 4017b7 7246->7248 7403 4087fd 7246->7403 7420 40861b 7247->7420 7248->7128 7248->7129 7252 4037b0 7251->7252 7253 40382a 7252->7253 7256 403738 6 API calls 7252->7256 7440 40c7aa WideCharToMultiByte 7252->7440 7257 403854 7253->7257 7430 403738 7253->7430 7256->7252 7257->7159 7257->7160 7259 403129 7258->7259 7260 4069f0 GetVersionExA 7259->7260 7261 40313d 7260->7261 7262 403163 CreateFileA 7261->7262 7263 40314d CreateFileW 7261->7263 7264 403179 7262->7264 7263->7264 7265 40c7aa WideCharToMultiByte 7264->7265 7266 4031aa 7264->7266 7265->7266 7266->7212 7268 40a321 7267->7268 7269 40a2b9 7267->7269 7273 40176e GetDlgItem KiUserCallbackDispatcher 7268->7273 7269->7268 7270 40a2d2 RegCreateKeyExA 7269->7270 7270->7268 7271 40a2f8 7270->7271 7272 40a300 RegSetValueExA RegCloseKey 7271->7272 7272->7268 7273->7216 7274->7224 7275->7229 7277 40a893 7276->7277 7278 40b345 7277->7278 7279 409f89 ExpandEnvironmentStringsA 7277->7279 7278->7235 7290 40a8c1 7279->7290 7280 40a90e lstrcmpiA 7280->7290 7281 409f89 ExpandEnvironmentStringsA 7281->7290 7282 40a955 GetCurrentDirectoryA 7282->7290 7283 40abeb SetWindowTextA 7283->7290 7284 40a130 3 API calls 7284->7290 7285 40ad0b RegOpenKeyExA 7287 40ad27 RegQueryValueExA RegCloseKey 7285->7287 7285->7290 7286 408a97 4 API calls 7286->7290 7287->7290 7288 40445f MultiByteToWideChar 7288->7290 7289 40482f 14 API calls 7289->7290 7290->7278 7290->7280 7290->7281 7290->7282 7290->7283 7290->7284 7290->7285 7290->7286 7290->7288 7290->7289 7291 408a78 ctype 2 API calls 7290->7291 7294 40444c FindClose 7290->7294 7305 40a9dd 7290->7305 7291->7290 7292 40a326 3 API calls 7295 40ac9c GetDlgItem SetWindowTextA SendMessageA 7292->7295 7293 40a9e2 SetFileAttributesA 7296 40aaa8 GetFileAttributesA 7293->7296 7293->7305 7294->7290 7295->7305 7297 40aab6 DeleteFileA 7296->7297 7296->7305 7297->7305 7298 40acdb SendMessageA 7298->7290 7299 40482f 14 API calls 7299->7305 7300 40aad3 wsprintfA GetFileAttributesA 7301 40aaf5 MoveFileA 7300->7301 7300->7305 7301->7305 7302 406eb5 4 API calls 7302->7305 7303 4069f0 GetVersionExA 7303->7305 7304 40ab16 MoveFileExA 7304->7305 7305->7290 7305->7292 7305->7293 7305->7296 7305->7298 7305->7299 7305->7300 7305->7302 7305->7303 7305->7304 7306 40aa87 SHFileOperationA 7305->7306 7306->7296 7308 409c7d 7307->7308 7448 40c11d 7308->7448 7310 409c9c 7451 40cae8 7310->7451 7312 409d02 7312->7239 8396 40967d 7313->8396 7316 40a3c2 GetWindow 7317 40a498 GetDlgItem GetWindowRect MapWindowPoints SetMenu CreateWindowExA 7316->7317 7320 40a3df 7316->7320 7317->7144 7317->7145 7318 40a3f4 GetClassNameA 8401 40bda3 CompareStringA 7318->8401 7320->7317 7320->7318 7321 40a41c GetWindowLongA 7320->7321 7322 40a47d GetWindow 7320->7322 7321->7322 7323 40a42c SendMessageA 7321->7323 7322->7317 7322->7320 7323->7322 7324 40a43e GetObjectA 7323->7324 8402 40963a 7324->8402 7327 40a453 8406 4095f7 7327->8406 8410 409532 GetDC CreateCompatibleDC CreateCompatibleDC GetObjectA 7327->8410 7329 40a463 SendMessageA 7329->7322 7330 40a476 DeleteObject 7329->7330 7330->7322 7332 4069f0 GetVersionExA 7331->7332 7333 40945d 7332->7333 7334 4094e4 7333->7334 7335 4094ac GetClassNameA 7333->7335 7336 409478 GetModuleHandleA 7333->7336 7341 409d05 7334->7341 7335->7334 7337 4094c1 lstrcmpiA 7335->7337 7338 409487 GetProcAddress 7336->7338 7339 409498 7336->7339 7337->7334 7340 4094d6 FindWindowExA 7337->7340 7338->7339 7339->7334 7339->7335 7340->7334 8413 408afc 7341->8413 7344 409d3c 7344->7177 7344->7215 7346 409d30 7347 409d41 7346->7347 7348 409d36 7346->7348 8420 408c30 SetFilePointer 7347->8420 7350 408b77 3 API calls 7348->7350 7350->7344 7351 409d4b 8421 408c57 SetFilePointer 7351->8421 7353 409d51 8422 408c30 SetFilePointer 7353->8422 7355 409d67 8423 408bed ReadFile 7355->8423 7358 408b77 3 API calls 7360 409d7b 7358->7360 7359 408a78 ctype 2 API calls 7359->7344 7362 409db0 7360->7362 8425 408a5f GetProcessHeap RtlAllocateHeap 7360->8425 7362->7359 7364 4089f6 7363->7364 7365 408a29 LoadStringA 7364->7365 7366 408a3b LoadStringA 7364->7366 7365->7366 7367 408a49 7365->7367 7366->7367 7368 408642 wvsprintfA 7367->7368 7369 408a56 7368->7369 7370 4012eb SHGetMalloc 7369->7370 7371 401306 SHBrowseForFolderA 7370->7371 7373 401302 7370->7373 7372 401343 SHGetPathFromIDListA 7371->7372 7371->7373 7372->7373 7373->7163 7373->7192 7374->7242 7376 4055e0 ShowWindow 7375->7376 7377 4055ce OleInitialize #17 7375->7377 8427 405556 LoadCursorA RegisterClassExA 7376->8427 7377->7376 7379 4055fb GetWindowRect GetParent MapWindowPoints 7380 405636 GetParent CreateWindowExA 7379->7380 7381 40562f DestroyWindow 7379->7381 7382 405681 7380->7382 7383 405673 ShowWindow UpdateWindow 7380->7383 7381->7380 7384 405696 7382->7384 7385 405687 7382->7385 7383->7382 7387 4056a7 ShowWindow 7384->7387 7388 40569d DestroyWindow 7384->7388 7386 405694 7385->7386 8428 404f1c GetTickCount GetTickCount 7385->8428 7386->7180 7390 4056b6 7387->7390 7388->7387 8435 408a5f GetProcessHeap RtlAllocateHeap 7390->8435 7392 4056c4 7393 4056e3 7392->7393 8436 404e52 7392->8436 8442 405282 7393->8442 7397 408a78 ctype 2 API calls 7398 4056f3 7397->7398 7398->7386 7399 4056f7 SetWindowTextA 7398->7399 7400 408a78 ctype 2 API calls 7399->7400 7400->7386 7401->7190 7402->7179 7423 408726 7403->7423 7405 40881c GetWindowRect GetClientRect 7406 408857 7405->7406 7407 40888a 7405->7407 7408 4088ca GetSystemMetrics GetWindow 7406->7408 7409 40885d SetWindowPos 7406->7409 7407->7408 7410 408890 GetWindowTextA 7407->7410 7415 4088ee 7408->7415 7409->7407 7426 408642 7410->7426 7412 4089c8 7412->7248 7413 4088ba SetWindowTextA 7413->7408 7414 4088fb GetWindowTextA 7414->7415 7415->7412 7415->7414 7416 408642 wvsprintfA 7415->7416 7417 408944 GetWindowRect SetWindowPos 7415->7417 7418 4089aa GetWindow 7415->7418 7419 40892e SetWindowTextA 7416->7419 7417->7418 7418->7412 7418->7415 7419->7415 7421 408621 GetWindowLongA SetWindowLongA 7420->7421 7422 40863f 7420->7422 7421->7422 7422->7248 7424 408642 wvsprintfA 7423->7424 7425 408748 7424->7425 7425->7405 7427 408659 7426->7427 7429 4086c4 7426->7429 7428 408fac wvsprintfA 7427->7428 7428->7429 7429->7413 7431 4069f0 GetVersionExA 7430->7431 7432 403741 7431->7432 7433 40375d CreateDirectoryA 7432->7433 7435 403752 CreateDirectoryW 7432->7435 7434 403768 7433->7434 7436 403782 GetLastError 7434->7436 7437 40376c 7434->7437 7435->7434 7438 40377e 7436->7438 7437->7438 7442 4035d7 7437->7442 7438->7257 7441 40c7ce 7440->7441 7441->7252 7443 4069f0 GetVersionExA 7442->7443 7445 4035dc 7443->7445 7444 4035fb SetFileAttributesA 7446 403609 7444->7446 7445->7444 7447 4035ee SetFileAttributesW 7445->7447 7446->7438 7447->7446 7457 40bff5 7448->7457 7450 40c128 7450->7310 7452 40caee 7451->7452 7572 4082a9 7452->7572 7454 40caf3 7455 408a78 ctype 2 API calls 7454->7455 7456 40cb04 7454->7456 7455->7456 7456->7312 7458 40c00b 7457->7458 7465 40bf03 7458->7465 7460 40c014 7464 40c05d 7460->7464 7471 401f35 7460->7471 7462 40c03e 7477 40bf63 7462->7477 7464->7450 7466 40bf3f 7465->7466 7467 40bf17 7465->7467 7466->7460 7468 408a97 4 API calls 7467->7468 7469 40bf2f 7468->7469 7469->7466 7483 40195b 7469->7483 7472 401f49 7471->7472 7474 401f76 7471->7474 7473 408a97 4 API calls 7472->7473 7475 401f66 7473->7475 7474->7462 7475->7474 7476 40195b 31 API calls 7475->7476 7476->7474 7478 40bf77 7477->7478 7480 40bfa2 7477->7480 7479 408a97 4 API calls 7478->7479 7481 40bf92 7479->7481 7480->7464 7481->7480 7482 40195b 31 API calls 7481->7482 7482->7480 7488 4018bc 7483->7488 7489 4089e6 3 API calls 7488->7489 7490 4018c3 7489->7490 7501 4097b0 7490->7501 7493 401814 7495 401821 7493->7495 7494 401842 7494->7466 7495->7494 7518 40337b 7495->7518 7502 4097c0 7501->7502 7503 4018c9 7501->7503 7502->7503 7504 4097c5 wvsprintfA 7502->7504 7503->7493 7506 40969c GetDlgItem 7504->7506 7507 4096cc 7506->7507 7508 4096fe SendMessageA SendMessageA 7506->7508 7515 404d05 7507->7515 7509 409732 7508->7509 7510 40974e SendMessageA SendMessageA SendMessageA 7508->7510 7509->7510 7513 409798 SendMessageA 7510->7513 7514 40977a SendMessageA 7510->7514 7513->7503 7514->7513 7516 404d1a ShowWindow SendMessageA SendMessageA 7515->7516 7517 404d0f DestroyWindow 7515->7517 7516->7508 7517->7516 7522 40338c 7518->7522 7519 401837 7523 40a1ed 7519->7523 7522->7519 7535 402f2d 7522->7535 7542 402eaf 7522->7542 7524 40a202 7523->7524 7525 40a217 7523->7525 7526 4089e6 3 API calls 7524->7526 7527 40183c 7525->7527 7528 40a22c ShowWindow 7525->7528 7529 40a209 SetDlgItemTextA 7526->7529 7534 408f9c ExitProcess 7527->7534 7530 40a23c 7528->7530 7531 40a259 7528->7531 7529->7525 7530->7531 7532 40a244 SendMessageA 7530->7532 7531->7527 7569 409183 PeekMessageA 7531->7569 7532->7531 7536 402f36 7535->7536 7537 402f3a 7535->7537 7536->7522 7538 402f45 7537->7538 7539 402eaf 31 API calls 7537->7539 7538->7536 7548 403655 7538->7548 7539->7538 7543 402ec1 7542->7543 7544 402ebb 7542->7544 7543->7544 7545 402ee1 7543->7545 7546 402ecf CloseHandle 7543->7546 7544->7522 7545->7544 7554 40185b 7545->7554 7546->7545 7549 4069f0 GetVersionExA 7548->7549 7550 40365a 7549->7550 7551 403675 DeleteFileA 7550->7551 7553 40366c DeleteFileW 7550->7553 7552 402f5b 7551->7552 7552->7522 7553->7552 7555 401867 7554->7555 7556 40187a 7554->7556 7558 4089e6 3 API calls 7555->7558 7557 401814 31 API calls 7556->7557 7559 401886 7557->7559 7560 401872 7558->7560 7559->7544 7562 409bff 7560->7562 7563 409c0c 7562->7563 7564 409c58 7563->7564 7565 409c1d GetLastError wvsprintfA 7563->7565 7564->7556 7566 4097b0 13 API calls 7565->7566 7567 409c4b 7566->7567 7567->7564 7568 409c51 SetLastError 7567->7568 7568->7564 7570 40919e GetMessageA TranslateMessage DispatchMessageA 7569->7570 7571 4091bf 7569->7571 7570->7571 7571->7531 7585 408a5f GetProcessHeap RtlAllocateHeap 7572->7585 7574 4082b6 7586 408a5f GetProcessHeap RtlAllocateHeap 7574->7586 7576 4082c5 7577 40835e 7576->7577 7580 4082e1 7576->7580 7578 4018bc 16 API calls 7577->7578 7579 408368 7578->7579 7579->7454 7587 407e91 7580->7587 7585->7574 7586->7576 7588 407e9b 7587->7588 7652 4048c7 7588->7652 7590 407ec0 7597 4081c3 7590->7597 7658 403a4d 7590->7658 7592 407ef6 7643 40726f 7592->7643 7594 407ef2 7594->7592 7666 407672 7594->7666 7597->7592 7780 4018cb 7597->7780 7600 407fd0 7605 4089e6 3 API calls 7600->7605 7601 407fbb 7604 4089e6 3 API calls 7601->7604 7602 407fde 7603 408014 7602->7603 7606 408023 7602->7606 7608 4089e6 3 API calls 7603->7608 7611 407fc2 7604->7611 7612 407fd7 7605->7612 7613 4089e6 3 API calls 7606->7613 7621 408021 7606->7621 7607 4080cc 7699 403e50 7607->7699 7610 40801a 7608->7610 7609 408093 7609->7592 7620 4089e6 3 API calls 7609->7620 7615 409bff 16 API calls 7610->7615 7616 409bff 16 API calls 7611->7616 7617 409bff 16 API calls 7612->7617 7618 40804d 7613->7618 7615->7621 7616->7592 7617->7602 7622 409bff 16 API calls 7618->7622 7623 40809d 7620->7623 7621->7607 7621->7609 7622->7621 7625 409bff 16 API calls 7623->7625 7625->7592 7626 408107 7627 403e50 39 API calls 7626->7627 7629 40816b 7626->7629 7628 40813b 7627->7628 7630 4081b6 7628->7630 7633 403c66 45 API calls 7628->7633 7632 403e50 39 API calls 7629->7632 7631 4089e6 3 API calls 7630->7631 7634 4081bc 7631->7634 7635 408181 7632->7635 7636 408149 7633->7636 7637 409bff 16 API calls 7634->7637 7635->7592 7713 402011 7635->7713 7636->7630 7639 40815e 7636->7639 7637->7597 7640 4089e6 3 API calls 7639->7640 7641 408164 7640->7641 7642 409bff 16 API calls 7641->7642 7642->7629 8390 405d1d 7643->8390 7646 407283 7648 408a78 ctype 2 API calls 7646->7648 7649 407299 7646->7649 7647 408a78 ctype 2 API calls 7647->7646 7648->7649 7650 4072a8 7649->7650 7651 408a78 ctype 2 API calls 7649->7651 7650->7454 7651->7650 7653 4048e0 7652->7653 7657 4048e4 7653->7657 7786 404492 7653->7786 7655 4048f6 7656 4048fb FindClose 7655->7656 7655->7657 7656->7657 7657->7590 7829 409004 7658->7829 7661 403a57 7832 403005 7661->7832 7662 403a8a 7663 403a9f 7662->7663 7664 4018cb 19 API calls 7662->7664 7663->7594 7665 403a9a 7664->7665 7665->7594 7667 407693 7666->7667 7671 407746 __allrem 7666->7671 7668 4076a1 7667->7668 7667->7671 7669 4033f6 35 API calls 7668->7669 7670 4076af 7669->7670 7854 403bb6 7670->7854 7687 40779a __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 7671->7687 7844 4033f6 7671->7844 7675 407721 7678 4089e6 3 API calls 7675->7678 7677 407726 7684 403c66 45 API calls 7677->7684 7680 407943 7678->7680 7679 407783 7681 403bb6 45 API calls 7679->7681 7683 409bff 16 API calls 7680->7683 7681->7687 7682 4033f6 35 API calls 7682->7687 7688 40794e 7683->7688 7689 407989 7684->7689 7685 4076c0 7685->7675 7685->7677 7686 403bb6 45 API calls 7686->7687 7687->7675 7687->7677 7687->7682 7687->7685 7687->7686 7688->7597 7691 407a64 7688->7691 7689->7688 7863 40753a 7689->7863 7692 407a75 7691->7692 7698 407aa9 7691->7698 7692->7698 7954 404024 7692->7954 7694 407a93 7695 4089e6 3 API calls 7694->7695 7694->7698 7696 407a9e 7695->7696 7697 409bff 16 API calls 7696->7697 7697->7698 7698->7592 7698->7597 7698->7600 7698->7601 7698->7602 7700 403e77 __allrem 7699->7700 7701 4033f6 35 API calls 7700->7701 7703 403e8d 7700->7703 7702 403eb4 7701->7702 7704 402f5d 33 API calls 7702->7704 7703->7592 7707 403c66 7703->7707 7705 403ebf 7704->7705 7706 403460 39 API calls 7705->7706 7706->7703 7708 403d0f 7707->7708 7711 403c78 7707->7711 7708->7626 7709 403bb6 45 API calls 7709->7711 7710 403d1e 7712 401925 19 API calls 7710->7712 7711->7708 7711->7709 7711->7710 7712->7708 7714 40201b 7713->7714 7979 401eb8 7714->7979 7719 40c0f5 2 API calls 7779 40207d __allrem 7719->7779 7720 402d0c 7724 4089e6 3 API calls 7720->7724 7732 402d38 7720->7732 7721 402c85 7721->7720 7730 4038fd 11 API calls 7721->7730 7723 4033f6 35 API calls 7723->7779 7725 402d2d 7724->7725 7728 409bff 16 API calls 7725->7728 7726 4089e6 3 API calls 7729 402dad 7726->7729 7727 402f5d 33 API calls 7727->7779 7728->7732 7733 409bff 16 API calls 7729->7733 7730->7721 7731 402db8 7734 40bfaa 2 API calls 7731->7734 7732->7726 7732->7731 7733->7731 7736 402e0d 7734->7736 7737 402e1c 7736->7737 7739 408a78 ctype 2 API calls 7736->7739 7740 40bfaa 2 API calls 7737->7740 7738 401e7e wvsprintfA 7738->7779 7739->7737 7741 402e28 7740->7741 7743 402d7f 7741->7743 7745 408a78 ctype 2 API calls 7741->7745 7742 403a4d 26 API calls 7742->7779 7743->7592 7744 404024 50 API calls 7744->7779 7745->7743 7746 403bb6 45 API calls 7746->7779 7748 409bff 16 API calls 7748->7779 7749 408a78 ctype 2 API calls 7749->7779 7750 403e50 39 API calls 7750->7779 7752 403c66 45 API calls 7752->7779 7755 40c11d 35 API calls 7755->7779 7758 40c7aa WideCharToMultiByte 7758->7779 7762 403525 3 API calls 7762->7779 7763 402d47 8110 40bfaa 7763->8110 7771 40379f 7 API calls 7771->7779 7774 403738 6 API calls 7774->7779 7775 40bff5 35 API calls 7775->7779 7776 4089e6 LoadStringA LoadStringA wvsprintfA 7776->7779 7777 4029c0 7777->7779 8097 40a500 7777->8097 7779->7721 7779->7723 7779->7727 7779->7738 7779->7742 7779->7744 7779->7746 7779->7748 7779->7749 7779->7750 7779->7752 7779->7755 7779->7758 7779->7762 7779->7763 7779->7771 7779->7774 7779->7775 7779->7776 7779->7777 7987 408245 7779->7987 7990 4014b4 7779->7990 7996 407d58 7779->7996 7999 40a4cc 7779->7999 8007 4038fd 7779->8007 8026 401a97 7779->8026 8078 401f99 7779->8078 8082 401989 7779->8082 8088 406d74 7779->8088 8092 40bdc4 CompareStringA 7779->8092 8093 403f99 7779->8093 8104 401fb3 7779->8104 8107 40c797 7779->8107 7781 4018d4 7780->7781 7782 4089e6 3 API calls 7781->7782 7783 4018ea 7782->7783 7784 409bff 16 API calls 7783->7784 7785 4018f1 7784->7785 7785->7592 7787 4069f0 GetVersionExA 7786->7787 7788 4044a5 7787->7788 7789 4044b2 7788->7789 7790 40466e 7788->7790 7792 40c7d9 MultiByteToWideChar 7789->7792 7794 4044bf 7789->7794 7791 404689 7790->7791 7795 40467a 7790->7795 7793 40c7aa WideCharToMultiByte 7791->7793 7792->7794 7793->7795 7796 4044f0 FindFirstFileW 7794->7796 7797 404524 FindNextFileW 7794->7797 7798 4046e1 FindNextFileA 7795->7798 7799 4046ab FindFirstFileA 7795->7799 7802 404504 GetLastError 7796->7802 7809 40454f 7796->7809 7803 404531 GetLastError 7797->7803 7804 404546 7797->7804 7800 404703 7798->7800 7801 4046ee GetLastError 7798->7801 7805 4046bf GetLastError 7799->7805 7808 40470c 7799->7808 7807 404513 7800->7807 7800->7808 7801->7800 7802->7807 7803->7804 7804->7807 7804->7809 7806 4046ca 7805->7806 7805->7807 7806->7807 7807->7655 7811 40c7d9 MultiByteToWideChar 7808->7811 7810 40c7aa WideCharToMultiByte 7809->7810 7812 40457d 7810->7812 7814 40473a 7811->7814 7813 40c7aa WideCharToMultiByte 7812->7813 7815 4045c3 7813->7815 7816 40c2a1 3 API calls 7814->7816 7826 40c2a1 FileTimeToLocalFileTime FileTimeToSystemTime 7815->7826 7818 4047db 7816->7818 7820 40c2a1 3 API calls 7818->7820 7819 40461f 7821 40c2a1 3 API calls 7819->7821 7822 4047ed 7820->7822 7823 404631 7821->7823 7824 40c2a1 3 API calls 7822->7824 7825 40c2a1 3 API calls 7823->7825 7824->7807 7825->7807 7827 40c301 7826->7827 7828 40c327 SystemTimeToFileTime 7827->7828 7828->7819 7843 408a5f GetProcessHeap RtlAllocateHeap 7829->7843 7831 40900f 7831->7661 7833 40301b 7832->7833 7834 4069f0 GetVersionExA 7833->7834 7835 40305a 7834->7835 7836 40307e CreateFileA 7835->7836 7838 40306a CreateFileW 7835->7838 7837 403092 7836->7837 7839 403099 GetLastError 7837->7839 7840 4030a4 7837->7840 7838->7837 7839->7840 7841 40c7aa WideCharToMultiByte 7840->7841 7842 4030ed 7840->7842 7841->7842 7842->7662 7843->7831 7868 40325a 7844->7868 7847 403421 7849 402f5d SetFilePointer 7847->7849 7850 402f81 GetLastError 7849->7850 7852 402f9f 7849->7852 7851 402f8b 7850->7851 7850->7852 7851->7852 7853 40188a 31 API calls 7851->7853 7852->7679 7853->7852 7902 403460 7854->7902 7856 403c53 7856->7685 7859 403c05 7860 403a4d 26 API calls 7859->7860 7861 403c3d 7860->7861 7861->7856 7862 403460 39 API calls 7861->7862 7862->7856 7943 4072b7 7863->7943 7866 403c66 45 API calls 7867 40755e 7866->7867 7867->7688 7870 403267 7868->7870 7872 4032c3 7868->7872 7869 403298 SetFilePointer 7871 4032b9 GetLastError 7869->7871 7869->7872 7870->7869 7873 403283 7870->7873 7874 40328a 7870->7874 7871->7872 7872->7847 7878 40188a 7872->7878 7875 402f5d 33 API calls 7873->7875 7886 403425 7874->7886 7877 403288 7875->7877 7877->7869 7879 401896 7878->7879 7885 4018ac 7878->7885 7880 4089e6 3 API calls 7879->7880 7882 4018a4 7880->7882 7881 401814 31 API calls 7883 4018b8 7881->7883 7884 409bff 16 API calls 7882->7884 7883->7847 7884->7885 7885->7881 7895 40913f 7886->7895 7889 4033f6 35 API calls 7890 403445 7889->7890 7891 402f5d 33 API calls 7890->7891 7892 40344c 7891->7892 7898 409166 7892->7898 7896 402f5d 33 API calls 7895->7896 7897 403438 7896->7897 7897->7889 7899 403458 7898->7899 7900 409175 7898->7900 7899->7877 7901 4033f6 35 API calls 7900->7901 7901->7899 7903 403478 7902->7903 7907 40347d 7902->7907 7904 402f5d 33 API calls 7903->7904 7904->7907 7906 4034d0 7906->7856 7906->7859 7913 401e7e 7906->7913 7907->7906 7908 4034c5 7907->7908 7912 4034da 7907->7912 7917 4031db 7907->7917 7929 40196e 7908->7929 7910 4033f6 35 API calls 7910->7912 7911 4031db 4 API calls 7911->7912 7912->7906 7912->7910 7912->7911 7914 401e8c 7913->7914 7915 408fac wvsprintfA 7914->7915 7916 401ea5 7915->7916 7916->7859 7918 403201 ReadFile 7917->7918 7919 4031ee GetStdHandle 7917->7919 7920 40321a 7918->7920 7928 403235 7918->7928 7919->7918 7934 402fbf 7920->7934 7923 403221 7924 403237 7923->7924 7925 40322a 7923->7925 7926 40323d GetLastError 7924->7926 7924->7928 7927 4031db GetFileType 7925->7927 7926->7928 7927->7928 7928->7907 7938 401925 7929->7938 7932 401814 31 API calls 7933 401985 7932->7933 7933->7906 7935 402fc7 7934->7935 7936 402fca GetFileType 7934->7936 7935->7923 7937 402fd6 7936->7937 7937->7923 7939 4089e6 3 API calls 7938->7939 7940 401930 7939->7940 7941 409bff 16 API calls 7940->7941 7942 40193a 7941->7942 7942->7932 7944 4072da __allrem 7943->7944 7945 4033f6 35 API calls 7944->7945 7953 407330 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 7944->7953 7946 407308 7945->7946 7947 402f5d 33 API calls 7946->7947 7949 407313 7947->7949 7948 4074c1 7948->7866 7948->7867 7951 403460 39 API calls 7949->7951 7950 4033f6 35 API calls 7950->7953 7951->7953 7952 403460 39 API calls 7952->7953 7953->7948 7953->7950 7953->7952 7955 404035 7954->7955 7956 40403c 7954->7956 7955->7694 7958 4040c2 7956->7958 7959 40404e 7956->7959 7975 40414f 7956->7975 7957 403e50 39 API calls 7957->7955 7961 403c66 45 API calls 7958->7961 7959->7955 7960 404064 7959->7960 7962 408a78 ctype 2 API calls 7959->7962 7976 408a5f GetProcessHeap RtlAllocateHeap 7960->7976 7963 4040eb 7961->7963 7962->7960 7963->7955 7970 404128 7963->7970 7971 404121 OemToCharA 7963->7971 7965 40406a 7966 404073 7965->7966 7967 4040a6 7965->7967 7968 403e50 39 API calls 7966->7968 7969 403c66 45 API calls 7967->7969 7968->7955 7969->7955 7972 404140 7970->7972 7977 40bd81 CharLowerA 7970->7977 7971->7970 7972->7975 7978 40bd92 CharUpperA 7972->7978 7975->7955 7975->7957 7976->7965 7977->7972 7978->7975 8115 408a5f GetProcessHeap RtlAllocateHeap 7979->8115 7981 401ecb 7982 401edf 7981->7982 7983 40195b 31 API calls 7981->7983 7984 40c0f5 7982->7984 7983->7982 8116 40bfc5 7984->8116 8127 407ab2 7987->8127 7989 40824a 7989->7779 7991 4014cd 7990->7991 7995 401531 7991->7995 8130 401464 7991->8130 7994 4014f6 7994->7995 8135 406b91 7994->8135 7995->7779 7997 403c66 45 API calls 7996->7997 7998 407d69 7997->7998 7998->7779 8000 40a4d7 7999->8000 8001 4089e6 3 API calls 8000->8001 8002 40a4e2 8001->8002 8161 40a49f wvsprintfA 8002->8161 8005 409183 4 API calls 8006 40a4f2 8005->8006 8006->7779 8008 4069f0 GetVersionExA 8007->8008 8010 40390b 8008->8010 8009 403a2c 8009->7779 8010->8009 8164 4035aa 8010->8164 8013 40397b 8170 406f29 8013->8170 8014 4035d7 3 API calls 8014->8013 8016 40398c CreateFileW 8016->8009 8017 4039b0 8016->8017 8018 4039c1 8017->8018 8174 40c18d SystemTimeToFileTime 8017->8174 8019 4039d2 8018->8019 8021 40c18d 2 API calls 8018->8021 8022 4039e3 SetFileTime CloseHandle 8019->8022 8023 40c18d 2 API calls 8019->8023 8021->8019 8022->8009 8024 403a20 8022->8024 8023->8022 8025 4035d7 3 API calls 8024->8025 8025->8009 8027 401ba0 8026->8027 8028 401ad1 8026->8028 8031 401bb3 8027->8031 8056 401c2c 8027->8056 8177 4042b7 8028->8177 8030 401ad6 8034 40379f 7 API calls 8030->8034 8048 401b0c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 8030->8048 8032 401be9 8031->8032 8033 401bba 8031->8033 8037 4089e6 3 API calls 8032->8037 8192 406858 8033->8192 8036 401aeb 8034->8036 8038 4042b7 23 API calls 8036->8038 8039 401bf5 8037->8039 8040 401af0 8038->8040 8042 409bff 16 API calls 8039->8042 8043 401af4 8040->8043 8040->8048 8057 401c00 8042->8057 8206 4018f8 8043->8206 8045 401cfe 8046 401bc9 8045->8046 8053 4043be 20 API calls 8045->8053 8047 401d65 8046->8047 8051 401d3c 8046->8051 8054 4018bc 16 API calls 8047->8054 8062 401d5b 8047->8062 8048->8027 8052 403425 35 API calls 8048->8052 8066 401b5d 8048->8066 8050 401b04 8050->7779 8229 401940 8051->8229 8052->8066 8053->8046 8054->8062 8055 401b81 8061 401b8c SetEndOfFile 8055->8061 8056->8045 8064 409183 4 API calls 8056->8064 8212 403d36 8056->8212 8218 409c5b 8056->8218 8223 4043be 8056->8223 8057->8050 8060 40cb34 13 API calls 8057->8060 8063 401c16 8060->8063 8191 408c30 SetFilePointer 8061->8191 8070 401d9b 8062->8070 8072 4089e6 3 API calls 8062->8072 8065 403655 3 API calls 8063->8065 8064->8056 8065->8050 8066->8027 8190 408c30 SetFilePointer 8066->8190 8067 401e14 8069 401e22 8067->8069 8199 40cb34 8067->8199 8069->8050 8076 403655 3 API calls 8069->8076 8070->8067 8070->8069 8073 401e0d SetEndOfFile 8070->8073 8075 401dd0 8072->8075 8073->8067 8077 409bff 16 API calls 8075->8077 8076->8050 8077->8070 8079 401fa2 8078->8079 8081 401fab 8078->8081 8352 401eec 8079->8352 8081->7779 8083 401a25 8082->8083 8084 4089e6 3 API calls 8083->8084 8086 401a4c 8083->8086 8085 401a86 8084->8085 8087 409bff 16 API calls 8085->8087 8086->7779 8087->8086 8089 406d80 8088->8089 8090 406d7a 8088->8090 8089->7779 8091 408a78 ctype 2 API calls 8090->8091 8091->8089 8092->7779 8094 403fa6 8093->8094 8095 4048c7 15 API calls 8094->8095 8096 403ff3 8095->8096 8096->7779 8100 40a50a 8097->8100 8098 40a53e DialogBoxParamA 8098->8100 8099 40a5ba SetFileAttributesA 8101 40a584 8099->8101 8100->8098 8100->8099 8100->8101 8102 40a5b3 8100->8102 8103 40a565 DialogBoxParamA 8100->8103 8101->7777 8102->8099 8103->8100 8103->8101 8105 401f35 35 API calls 8104->8105 8106 401fbd 8105->8106 8106->7779 8358 40c5fa 8107->8358 8111 406d74 2 API calls 8110->8111 8112 40bfb5 8111->8112 8113 406d74 2 API calls 8112->8113 8114 40bfbd 8113->8114 8115->7981 8123 40bf47 8116->8123 8119 40bf47 2 API calls 8120 40bfe1 8119->8120 8121 40bf47 2 API calls 8120->8121 8122 402065 8121->8122 8122->7719 8124 40bf50 8123->8124 8125 40bf56 8123->8125 8126 408a78 ctype 2 API calls 8124->8126 8125->8119 8126->8125 8128 403c66 45 API calls 8127->8128 8129 407ac3 8128->8129 8129->7989 8145 401367 8130->8145 8133 401367 2 API calls 8134 401480 8133->8134 8134->7994 8136 406bb9 8135->8136 8143 406c88 8135->8143 8142 406bd3 8136->8142 8149 406a76 8136->8149 8139 406be9 8139->7994 8141 406c6d 8141->8139 8154 406a98 8141->8154 8142->8139 8142->8141 8142->8143 8144 406a76 CompareStringA 8142->8144 8143->8139 8153 40bdc4 CompareStringA 8143->8153 8144->8143 8146 401375 8145->8146 8147 4013a3 8146->8147 8148 406b91 2 API calls 8146->8148 8147->8133 8147->8134 8148->8146 8150 406a8f 8149->8150 8152 406a88 8149->8152 8160 40bdc4 CompareStringA 8150->8160 8152->8142 8153->8141 8156 406aa1 8154->8156 8155 406a41 CharUpperA 8155->8156 8156->8155 8157 406adb 8156->8157 8159 406aec 8156->8159 8157->8139 8158 406a98 CharUpperA 8158->8159 8159->8157 8159->8158 8160->8152 8162 40969c 12 API calls 8161->8162 8163 40a4ca 8162->8163 8163->8005 8165 4069f0 GetVersionExA 8164->8165 8166 4035af 8165->8166 8167 4035ca GetFileAttributesA 8166->8167 8169 4035c1 GetFileAttributesW 8166->8169 8168 4035d4 8167->8168 8168->8013 8168->8014 8169->8168 8171 406f33 8170->8171 8172 40c7d9 MultiByteToWideChar 8171->8172 8173 406f39 8171->8173 8172->8173 8173->8016 8175 40c1e5 8174->8175 8176 40c1e8 LocalFileTimeToFileTime 8174->8176 8175->8176 8176->8018 8179 4042c4 8177->8179 8178 404326 8180 4048c7 15 API calls 8178->8180 8179->8178 8181 40c7aa WideCharToMultiByte 8179->8181 8185 404351 8180->8185 8181->8178 8182 40438b 8189 40438f 8182->8189 8234 403687 8182->8234 8185->8182 8186 404378 8185->8186 8243 403a3b 8185->8243 8188 403655 3 API calls 8186->8188 8188->8182 8189->8030 8190->8055 8191->8027 8195 406888 8192->8195 8194 406996 8194->8046 8195->8194 8196 409c5b 5 API calls 8195->8196 8197 406967 8195->8197 8247 40675f 8195->8247 8196->8195 8197->8194 8198 4043be 20 API calls 8197->8198 8198->8194 8327 408b77 8199->8327 8201 40cb49 8203 40cba5 8201->8203 8331 40ccd3 8201->8331 8204 40cbd3 8203->8204 8205 4035d7 3 API calls 8203->8205 8204->8069 8205->8204 8207 401901 8206->8207 8208 4089e6 3 API calls 8207->8208 8209 401917 8208->8209 8210 409bff 16 API calls 8209->8210 8211 40191e 8210->8211 8211->8050 8213 403d46 8212->8213 8217 403d41 8212->8217 8214 403bb6 45 API calls 8213->8214 8213->8217 8215 403d98 8214->8215 8216 401925 19 API calls 8215->8216 8215->8217 8216->8217 8217->8056 8345 409bd9 8218->8345 8220 409c70 8221 409183 4 API calls 8220->8221 8222 409c75 8221->8222 8222->8056 8225 4043d3 8223->8225 8224 4043ee 8224->8056 8225->8224 8350 408baa WriteFile 8225->8350 8228 401940 19 API calls 8228->8224 8230 4089e6 3 API calls 8229->8230 8231 40194b 8230->8231 8232 409bff 16 API calls 8231->8232 8233 401955 8232->8233 8233->8062 8235 403697 8234->8235 8236 4069f0 GetVersionExA 8235->8236 8237 4036da 8236->8237 8238 4036ff CreateFileA 8237->8238 8240 4036ea CreateFileW 8237->8240 8239 403714 8238->8239 8242 40371b 8239->8242 8246 408a5f GetProcessHeap RtlAllocateHeap 8239->8246 8240->8239 8242->8030 8244 4035d7 3 API calls 8243->8244 8245 403a4a 8244->8245 8245->8186 8246->8242 8250 406772 8247->8250 8248 403d36 45 API calls 8248->8250 8249 40680c 8252 406836 8249->8252 8254 406831 8249->8254 8255 406838 8249->8255 8250->8248 8253 4067b4 8250->8253 8251 403d36 45 API calls 8251->8253 8252->8195 8253->8249 8253->8251 8261 40621d 8254->8261 8256 406843 8255->8256 8257 40683c 8255->8257 8256->8252 8301 406115 8256->8301 8292 405b34 8257->8292 8263 406240 8261->8263 8262 403d36 45 API calls 8262->8263 8263->8262 8265 406293 8263->8265 8264 403d36 45 API calls 8264->8265 8265->8264 8267 4062f2 8265->8267 8266 403d36 45 API calls 8266->8267 8267->8266 8270 406352 8267->8270 8268 406400 8312 405d4d 8268->8312 8270->8268 8271 403d36 45 API calls 8270->8271 8291 406457 8270->8291 8271->8270 8272 40667b 8274 405cfc 2 API calls 8272->8274 8275 406683 8274->8275 8276 405d4d 4 API calls 8275->8276 8277 4066bf 8276->8277 8278 405d4d 4 API calls 8277->8278 8287 40644a 8277->8287 8281 406700 8278->8281 8279 403d36 45 API calls 8280 40643a 8279->8280 8280->8272 8280->8279 8280->8287 8280->8291 8282 406730 8281->8282 8283 40671a 8281->8283 8322 40570e 8282->8322 8285 405cfc 2 API calls 8283->8285 8283->8287 8285->8287 8287->8291 8318 405cfc 8287->8318 8288 405cfc 2 API calls 8289 40674b 8288->8289 8290 405cfc 2 API calls 8289->8290 8290->8291 8291->8252 8293 405b65 8292->8293 8294 403d36 45 API calls 8293->8294 8297 405ba7 8293->8297 8294->8293 8295 403d36 45 API calls 8295->8297 8296 405c1a 8296->8252 8297->8295 8298 405c01 8297->8298 8298->8296 8299 403d36 45 API calls 8298->8299 8300 4043be 20 API calls 8298->8300 8299->8298 8300->8298 8302 4061fb 8301->8302 8303 40612f 8301->8303 8305 40570e 46 API calls 8302->8305 8304 405d4d 4 API calls 8303->8304 8306 406196 8304->8306 8311 40619a 8305->8311 8307 405d4d 4 API calls 8306->8307 8306->8311 8308 4061d9 8307->8308 8308->8302 8309 4061e0 8308->8309 8310 405cfc 2 API calls 8309->8310 8310->8311 8311->8252 8314 405d69 8312->8314 8313 405da0 8313->8280 8314->8313 8315 408a5f GetProcessHeap RtlAllocateHeap 8314->8315 8316 4060fd 8314->8316 8315->8314 8316->8313 8317 405cfc GetProcessHeap RtlFreeHeap 8316->8317 8317->8313 8319 405d04 8318->8319 8320 405d17 8318->8320 8319->8320 8321 408a78 ctype GetProcessHeap RtlFreeHeap 8319->8321 8320->8291 8321->8319 8326 405755 8322->8326 8323 4043be 20 API calls 8323->8326 8324 405b0c 8324->8288 8325 403d36 45 API calls 8325->8326 8326->8323 8326->8324 8326->8325 8328 408b81 8327->8328 8329 408b86 CloseHandle 8327->8329 8328->8201 8330 408a78 ctype 2 API calls 8329->8330 8330->8328 8332 40cce7 8331->8332 8333 403005 5 API calls 8332->8333 8335 40ccfc 8333->8335 8334 40cd26 ctype 8334->8203 8335->8334 8337 4032ce 8335->8337 8338 4032e0 8337->8338 8339 40331f 8338->8339 8340 40c18d 2 API calls 8338->8340 8341 403330 8339->8341 8342 40c18d 2 API calls 8339->8342 8340->8339 8343 40333f SetFileTime 8341->8343 8344 40c18d 2 API calls 8341->8344 8342->8341 8343->8334 8344->8343 8348 409247 8345->8348 8349 409254 SendDlgItemMessageA 8348->8349 8349->8220 8351 404405 8350->8351 8351->8224 8351->8228 8353 401f00 8352->8353 8354 401f2d 8352->8354 8355 408a97 4 API calls 8353->8355 8354->8081 8356 401f1d 8355->8356 8356->8354 8357 40195b 31 API calls 8356->8357 8357->8354 8363 40c610 8358->8363 8372 40c664 8358->8372 8359 40c6e0 8370 40c6a3 8359->8370 8378 40c590 8359->8378 8360 40c74b 8388 408a5f GetProcessHeap RtlAllocateHeap 8360->8388 8361 40c6c3 8361->8360 8366 408a78 ctype 2 API calls 8361->8366 8362 40c68c 8362->8359 8377 408a5f GetProcessHeap RtlAllocateHeap 8362->8377 8369 403d36 45 API calls 8363->8369 8363->8372 8368 40c69a 8366->8368 8368->8359 8368->8360 8368->8370 8369->8363 8370->7779 8371 40c6f4 8371->8370 8373 40c735 8371->8373 8374 40c75f 8371->8374 8372->8361 8372->8362 8372->8368 8375 408a78 ctype 2 API calls 8373->8375 8374->8370 8376 40c590 6 API calls 8374->8376 8375->8370 8376->8370 8377->8368 8380 40c59e 8378->8380 8379 40c5bc 8379->8371 8380->8379 8389 408a5f GetProcessHeap RtlAllocateHeap 8380->8389 8382 40c5b6 8382->8379 8383 40c5c1 CharToOemA 8382->8383 8384 40c5d4 8383->8384 8385 40c5da OemToCharA 8384->8385 8387 40c5ed 8384->8387 8385->8387 8386 408a78 ctype 2 API calls 8386->8379 8387->8386 8388->8371 8389->8382 8391 405d26 8390->8391 8392 405d3c 8390->8392 8393 405cfc 2 API calls 8391->8393 8392->7646 8392->7647 8394 405d31 8393->8394 8395 405cfc 2 API calls 8394->8395 8395->8392 8397 4095f7 3 API calls 8396->8397 8398 409684 8397->8398 8399 409690 8398->8399 8400 40963a 3 API calls 8398->8400 8399->7316 8399->7317 8400->8399 8401->7320 8403 409643 GetDC 8402->8403 8404 409669 8402->8404 8403->8404 8405 409652 GetDeviceCaps ReleaseDC 8403->8405 8404->7327 8405->8404 8407 409600 GetDC 8406->8407 8408 409626 8406->8408 8407->8408 8409 40960f GetDeviceCaps ReleaseDC 8407->8409 8408->7327 8409->8408 8411 409579 8410->8411 8412 40957c 9 API calls 8410->8412 8411->8412 8412->7329 8414 408b0d CreateFileA 8413->8414 8416 408b5a 8414->8416 8417 408b5e 8414->8417 8416->7344 8419 408a5f GetProcessHeap RtlAllocateHeap 8416->8419 8426 408a5f GetProcessHeap RtlAllocateHeap 8417->8426 8419->7346 8420->7351 8421->7353 8422->7355 8424 408c18 8423->8424 8424->7358 8425->7362 8426->8416 8427->7379 8430 404f41 8428->8430 8429 404f96 VariantInit 8431 404fc6 8429->8431 8430->8429 8432 404f5a PeekMessageA 8430->8432 8431->7386 8433 404f6c TranslateMessage DispatchMessageA GetMessageA 8432->8433 8434 404f8d GetTickCount 8432->8434 8433->8434 8434->8430 8435->7392 8437 404e61 8436->8437 8448 408a5f GetProcessHeap RtlAllocateHeap 8437->8448 8439 404f15 8439->7393 8440 408a78 ctype 2 API calls 8440->8439 8441 404e6f 8441->8439 8441->8440 8443 405291 8442->8443 8449 408a5f GetProcessHeap RtlAllocateHeap 8443->8449 8445 4053b3 8445->7397 8446 408f59 CompareStringA 8447 405298 8446->8447 8447->8445 8447->8446 8448->8441 8449->8447 8809 40b07b 8810 40b085 8809->8810 8828 40a8ce 8809->8828 8856 408ac3 OemToCharBuffA CharUpperA CharToOemBuffA 8810->8856 8811 409f89 ExpandEnvironmentStringsA 8811->8828 8813 40b345 8814 40b092 8815 40b0eb 8814->8815 8817 403525 3 API calls 8814->8817 8818 40b1c9 8815->8818 8819 403611 GetFullPathNameA 8815->8819 8816 40a90e lstrcmpiA 8816->8828 8829 40b138 8817->8829 8820 403611 GetFullPathNameA 8818->8820 8819->8818 8824 40b1dc 8820->8824 8821 40a955 GetCurrentDirectoryA 8821->8828 8822 40abeb SetWindowTextA 8822->8828 8823 403525 3 API calls 8823->8829 8857 409418 SHGetMalloc SHGetSpecialFolderLocation SHGetPathFromIDListA 8824->8857 8826 40a130 3 API calls 8826->8828 8827 40b1eb 8838 40b275 8827->8838 8859 408f36 CompareStringA 8827->8859 8828->8811 8828->8813 8828->8816 8828->8821 8828->8822 8828->8826 8830 40ad0b RegOpenKeyExA 8828->8830 8831 408a97 4 API calls 8828->8831 8833 40445f MultiByteToWideChar 8828->8833 8834 408a78 ctype 2 API calls 8828->8834 8835 40a326 3 API calls 8828->8835 8836 40a9e2 SetFileAttributesA 8828->8836 8837 40444c FindClose 8828->8837 8840 40aaa8 GetFileAttributesA 8828->8840 8842 4069f0 GetVersionExA 8828->8842 8845 40acdb SendMessageA 8828->8845 8846 40482f 14 API calls 8828->8846 8848 40aad3 wsprintfA GetFileAttributesA 8828->8848 8851 406eb5 4 API calls 8828->8851 8854 40ab16 MoveFileExA 8828->8854 8855 40aa87 SHFileOperationA 8828->8855 8829->8815 8829->8823 8830->8828 8832 40ad27 RegQueryValueExA RegCloseKey 8830->8832 8831->8828 8832->8828 8833->8828 8834->8828 8839 40ac9c GetDlgItem SetWindowTextA SendMessageA 8835->8839 8836->8828 8836->8840 8837->8828 8844 40379f 7 API calls 8838->8844 8839->8828 8840->8828 8843 40aab6 DeleteFileA 8840->8843 8842->8828 8843->8828 8847 40b29a 8844->8847 8845->8828 8846->8828 8860 409313 OleInitialize CoCreateInstance 8847->8860 8848->8828 8849 40aaf5 MoveFileA 8848->8849 8849->8828 8851->8828 8852 40b2e9 8852->8828 8853 40b2f2 SHChangeNotify 8852->8853 8853->8828 8854->8828 8855->8840 8856->8814 8858 40944e 8857->8858 8858->8827 8859->8838 8861 40940b OleUninitialize 8860->8861 8862 409345 8860->8862 8861->8852 8863 4093f3 8862->8863 8864 4093c8 MultiByteToWideChar 8862->8864 8863->8861 8864->8863 8865 40837b 8866 40838f 8865->8866 8867 4083a6 GetModuleFileNameA 8866->8867 8868 4083c2 8866->8868 8867->8868 8869 403005 5 API calls 8868->8869 8880 4083fc ctype 8868->8880 8878 4083f8 8869->8878 8870 4084e6 8871 4033f6 35 API calls 8870->8871 8870->8880 8873 40850b 8871->8873 8872 402f5d 33 API calls 8872->8878 8881 408a5f GetProcessHeap RtlAllocateHeap 8873->8881 8875 403460 39 API calls 8875->8878 8876 408519 8877 403460 39 API calls 8876->8877 8876->8880 8877->8880 8878->8870 8878->8872 8878->8875 8879 4033f6 35 API calls 8878->8879 8878->8880 8879->8878 8881->8876 8994 40adbe 9019 40a8ce 8994->9019 8995 409f89 ExpandEnvironmentStringsA 8995->9019 8996 40b345 8997 40a90e lstrcmpiA 8997->9019 8998 40a955 GetCurrentDirectoryA 8998->9019 8999 40abeb SetWindowTextA 8999->9019 9000 40a130 3 API calls 9000->9019 9001 40ad0b RegOpenKeyExA 9003 40ad27 RegQueryValueExA RegCloseKey 9001->9003 9001->9019 9002 408a97 4 API calls 9002->9019 9003->9019 9004 40445f MultiByteToWideChar 9004->9019 9005 408a78 ctype 2 API calls 9005->9019 9006 40a326 3 API calls 9009 40ac9c GetDlgItem SetWindowTextA SendMessageA 9006->9009 9007 40a9e2 SetFileAttributesA 9010 40aaa8 GetFileAttributesA 9007->9010 9007->9019 9008 40444c FindClose 9008->9019 9009->9019 9012 40aab6 DeleteFileA 9010->9012 9010->9019 9011 4069f0 GetVersionExA 9011->9019 9012->9019 9013 40acdb SendMessageA 9013->9019 9014 40482f 14 API calls 9014->9019 9015 40aad3 wsprintfA GetFileAttributesA 9016 40aaf5 MoveFileA 9015->9016 9015->9019 9016->9019 9017 406eb5 4 API calls 9017->9019 9018 40ab16 MoveFileExA 9018->9019 9019->8995 9019->8996 9019->8997 9019->8998 9019->8999 9019->9000 9019->9001 9019->9002 9019->9004 9019->9005 9019->9006 9019->9007 9019->9008 9019->9010 9019->9011 9019->9013 9019->9014 9019->9015 9019->9017 9019->9018 9020 40aa87 SHFileOperationA 9019->9020 9020->9010

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 378 40cc30-40cc78 LoadLibraryA * 2 #17 LoadLibraryA 379 40cc97-40cca7 SHGetMalloc 378->379 380 40cc7a-40cc88 GetProcAddress 378->380 381 40cc90-40cc91 FreeLibrary 380->381 382 40cc8a-40cc8d 380->382 381->379 382->381
                                                  APIs
                                                  • LoadLibraryA.KERNELBASE(riched32.dll,00000000,C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe,?,?,?,0040BC45), ref: 0040CC4B
                                                  • LoadLibraryA.KERNEL32(riched20.dll,?,0040BC45), ref: 0040CC54
                                                  • #17.COMCTL32(?,0040BC45), ref: 0040CC59
                                                  • LoadLibraryA.KERNEL32(COMCTL32.DLL,?,0040BC45), ref: 0040CC72
                                                  • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 0040CC80
                                                  • FreeLibrary.KERNEL32(00000000,?,0040BC45), ref: 0040CC91
                                                  • SHGetMalloc.SHELL32(00428CB4), ref: 0040CC9C
                                                  Strings
                                                  • riched20.dll, xrefs: 0040CC4D
                                                  • riched32.dll, xrefs: 0040CC46
                                                  • COMCTL32.DLL, xrefs: 0040CC5F
                                                  • InitCommonControlsEx, xrefs: 0040CC7A
                                                  • C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe, xrefs: 0040CC35
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Library$Load$AddressFreeMallocProc
                                                  • String ID: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe$COMCTL32.DLL$InitCommonControlsEx$riched20.dll$riched32.dll
                                                  • API String ID: 253899923-253133091
                                                  • Opcode ID: 5a91941a0addb607f5fcc8110f23b5a7d799d54039f373a3bebda7828aad3d5f
                                                  • Instruction ID: 40b2a487f0d0e0410aa7aa7d932e37ff4c66b6169e0ba79eb739e80cc2a3369a
                                                  • Opcode Fuzzy Hash: 5a91941a0addb607f5fcc8110f23b5a7d799d54039f373a3bebda7828aad3d5f
                                                  • Instruction Fuzzy Hash: C4F08172E00304ABD3106FE5DD09B6ABAA8EF90B15F11813EE045B3290DFB895088B68
                                                  APIs
                                                  • __allrem.LIBCMT ref: 004024ED
                                                  • __allrem.LIBCMT ref: 0040256D
                                                    • Part of subcall function 004089E6: LoadStringA.USER32(00409150,-0042171C,00000200,00000000), ref: 00408A35
                                                    • Part of subcall function 004089E6: LoadStringA.USER32(00409150,-0042171C,00000200,00000000), ref: 00408A47
                                                    • Part of subcall function 00409BFF: GetLastError.KERNEL32(00424098,?,0040187A,00000000,00000000,00000076,?,00000000,00402F22,00000017,00000000,00000000,004033B2,?), ref: 00409C1E
                                                    • Part of subcall function 00409BFF: wvsprintfA.USER32(?,?,84@), ref: 00409C34
                                                    • Part of subcall function 00409BFF: SetLastError.KERNEL32(00000000,?,0040187A,00000000,00000000,00000076,?,00000000,00402F22,00000017,00000000,00000000,004033B2,?), ref: 00409C52
                                                    • Part of subcall function 00408A78: GetProcessHeap.KERNEL32(00000000,00000000,?,0040BF56,00000000,00000000,00401571,?,00000000,00401657), ref: 00408A86
                                                    • Part of subcall function 00408A78: RtlFreeHeap.NTDLL(00000000,?,0040BF56,00000000,00000000,00401571,?,00000000,00401657), ref: 00408A8D
                                                    • Part of subcall function 0040C7AA: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,?,00000000,00000000,00000000,?,?,00403106,?,?,01000000,?), ref: 0040C7C4
                                                    • Part of subcall function 004038FD: CreateFileW.KERNELBASE(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,?,?,?,000000A0,00000400), ref: 004039A3
                                                    • Part of subcall function 004038FD: SetFileTime.KERNELBASE(00000000,?,?,?), ref: 00403A0E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: ErrorFileHeapLastLoadString__allrem$ByteCharCreateFreeMultiProcessTimeWidewvsprintf
                                                  • String ID: 3$C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe$C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe$ya-page.html$ya-page.html$z01$zip
                                                  • API String ID: 3030403831-3764212960
                                                  • Opcode ID: a288cc43e52d33bfa1aab8eaf8196ec0822421c08c9c09e4e6d59b43c35a172e
                                                  • Instruction ID: 80dd58e2a7b30b1c2b97e499b99d795e6e0012d48562e64806d4ea0cc67e6acf
                                                  • Opcode Fuzzy Hash: a288cc43e52d33bfa1aab8eaf8196ec0822421c08c9c09e4e6d59b43c35a172e
                                                  • Instruction Fuzzy Hash: 8D82A170608341ABD730DB659E49B2B77E4AB84704F54083FF984B22D2DBBC9846CB5E

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1233 404492-4044ac call 4069f0 1236 4044b2-4044b7 1233->1236 1237 40466e-404673 1233->1237 1240 4044b9-4044bd 1236->1240 1241 4044ce-4044d9 call 40c7d9 1236->1241 1238 404675-404678 1237->1238 1239 404689-404694 call 40c7aa 1237->1239 1238->1239 1243 40467a-404687 call 408e13 1238->1243 1248 404699-4046a9 1239->1248 1240->1241 1245 4044bf-4044cc call 40c95d 1240->1245 1246 4044de-4044ee 1241->1246 1243->1248 1245->1246 1250 4044f0-404502 FindFirstFileW 1246->1250 1251 404524-40452f FindNextFileW 1246->1251 1253 4046e1-4046ec FindNextFileA 1248->1253 1254 4046ab-4046bd FindFirstFileA 1248->1254 1258 404504-40450d GetLastError 1250->1258 1259 40454f-40465e call 40c95d call 406fe7 call 40c95d call 40c7aa call 401030 call 40c7aa call 40c2a1 * 3 call 40c1f9 call 40be4a 1250->1259 1260 404531-404540 GetLastError 1251->1260 1261 404546-404549 1251->1261 1256 404703-404706 1253->1256 1257 4046ee-4046fd GetLastError 1253->1257 1262 40470c-404814 call 408e13 call 406f90 call 408e13 call 40c7d9 call 401030 call 408e13 call 40c2a1 * 3 call 40c1f9 call 40be2c 1254->1262 1263 4046bf-4046c8 GetLastError 1254->1263 1256->1262 1264 40481b-40482c 1256->1264 1257->1256 1265 404513-404516 1258->1265 1266 4046d4 1258->1266 1259->1264 1316 404664-404669 1259->1316 1260->1261 1261->1259 1261->1264 1262->1264 1317 404816-404818 1262->1317 1263->1266 1269 4046ca 1263->1269 1265->1266 1270 40451c-40451f 1265->1270 1274 4046d6-4046dc 1266->1274 1273 4046cd 1269->1273 1270->1273 1273->1266 1277 4046cf-4046d2 1273->1277 1274->1264 1277->1274 1316->1264 1317->1264
                                                  APIs
                                                    • Part of subcall function 004069F0: GetVersionExA.KERNEL32(?), ref: 00406A14
                                                  • FindFirstFileW.KERNELBASE(?,?,00000000,?,01000000,?,?,00000000), ref: 004044F7
                                                  • GetLastError.KERNEL32 ref: 00404504
                                                  • FindNextFileW.KERNEL32(?,?,00000000,?,01000000,?,?,00000000), ref: 00404527
                                                  • GetLastError.KERNEL32 ref: 00404534
                                                    • Part of subcall function 0040C7AA: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,?,00000000,00000000,00000000,?,?,00403106,?,?,01000000,?), ref: 0040C7C4
                                                  • FindFirstFileA.KERNEL32(?,?,00000002,?,01000000,?,?,00000000), ref: 004046B2
                                                  • GetLastError.KERNEL32 ref: 004046BF
                                                  • FindNextFileA.KERNEL32(?,?,00000002,?,01000000,?,?,00000000), ref: 004046E4
                                                  • GetLastError.KERNEL32 ref: 004046F1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: ErrorFileFindLast$FirstNext$ByteCharMultiVersionWide
                                                  • String ID:
                                                  • API String ID: 3067395930-0
                                                  • Opcode ID: f27d4cb0a927c155c8f22fa7272525b34f707b169e3375ec0edd0061d46a9ae6
                                                  • Instruction ID: e97bb144311f20fdbc8aa469a7062481502839e879d3f6c58a1f7c72b00e072c
                                                  • Opcode Fuzzy Hash: f27d4cb0a927c155c8f22fa7272525b34f707b169e3375ec0edd0061d46a9ae6
                                                  • Instruction Fuzzy Hash: 26A11AB5900258DBDB20DF74CC81BDA77E8AF45304F104A6BE65AF3291DB38AA85CF54
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,?,?,0040900F,?,?,0040159F), ref: 00408A67
                                                  • RtlAllocateHeap.NTDLL(00000000,?,0040900F,?,?,0040159F), ref: 00408A6E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocateProcess
                                                  • String ID:
                                                  • API String ID: 1357844191-0
                                                  • Opcode ID: 9e4d253b0ce5362a1981724ce4722cb9db70110a1f633c449c30fe5922a103a7
                                                  • Instruction ID: 874871f01d306ea12a689bd2b79c727d8db13f7b45d536dc5076a0c78b13f2b9
                                                  • Opcode Fuzzy Hash: 9e4d253b0ce5362a1981724ce4722cb9db70110a1f633c449c30fe5922a103a7
                                                  • Instruction Fuzzy Hash: 35C09272854208FBDA002BF1ED0DF8ABF2CEB19766F008021F70D95164CA7290699BBD

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 0 40b47b-40b4ae call 4012c0 call 40178c 5 40b4b4-40b4b5 0->5 6 40b8a6-40b8b9 0->6 7 40b4c6-40b4c8 5->7 8 40b4b7-40b4bc 5->8 9 40b8ca-40b8d1 6->9 10 40b8bb-40b8c4 SendMessageA 6->10 15 40bb8c-40bb90 7->15 13 40b525-40b540 GetDlgItemTextA 8->13 14 40b4be-40b4bf 8->14 11 40b8e3-40b957 call 40a3ac GetDlgItem GetWindowRect MapWindowPoints SetMenu CreateWindowExA 9->11 12 40b8d3-40b8dd SendDlgItemMessageA 9->12 10->9 31 40b962-40b991 SetWindowPos DestroyWindow SendMessageA 11->31 32 40b959-40b960 SetMenu 11->32 12->11 17 40b542-40b548 13->17 18 40b55f-40b565 13->18 19 40b4c1-40b4c4 14->19 20 40b4fe-40b504 14->20 24 40b554 17->24 25 40b54a 17->25 27 40b567-40b574 18->27 28 40b579-40b58b GetDlgItem 18->28 19->7 26 40b4cd-40b4e4 call 4089e6 call 4012eb 19->26 22 40b506-40b516 20->22 23 40b518-40b523 20->23 22->23 33 40b4f6-40b4f9 22->33 34 40b556-40b55d EndDialog 23->34 24->34 25->24 26->33 55 40b4e6-40b4f0 SetDlgItemTextA 26->55 36 40b83d-40b843 27->36 29 40b58d-40b5ac SendMessageA * 2 28->29 30 40b5ae-40b5d0 SetFocus call 40379f 28->30 29->30 50 40b5e2-40b5f8 SetCurrentDirectoryA 30->50 51 40b5d2-40b5d7 GetLastError 30->51 42 40b993-40b998 SendMessageA 31->42 43 40b99e-40b9aa SendMessageA 31->43 41 40b9b0-40b9d9 GetCurrentDirectoryA GetDlgItem 32->41 33->15 34->33 39 40bb02 36->39 40 40b849-40b84f 36->40 54 40bb08-40bb10 call 40a886 39->54 40->39 46 40b855-40b873 call 4089e6 SetDlgItemTextA 40->46 47 40b9e1-40ba18 SetWindowTextA call 409452 call 409d05 41->47 48 40b9db 41->48 42->43 43->41 63 40b875-40b878 46->63 64 40b87a-40b886 46->64 78 40ba28-40ba2e 47->78 79 40ba1a-40ba23 call 40a886 47->79 48->47 59 40b605-40b60c call 4069f0 50->59 60 40b5fa-40b5ff GetLastError 50->60 56 40b5d9-40b5dc 51->56 57 40b5de 51->57 68 40bb15 54->68 55->33 56->50 56->57 57->50 76 40b67c-40b67e 59->76 77 40b60e-40b614 59->77 60->59 65 40b601 60->65 69 40b889-40b8a1 call 4089e6 * 2 MessageBoxA 63->69 64->69 65->59 72 40bb1a-40bb21 68->72 104 40bb8a 69->104 73 40bb23-40bb27 EnableWindow 72->73 74 40bb2d-40bb33 72->74 73->74 81 40bb35-40bb42 call 40176e * 2 74->81 82 40bb47-40bb4e 74->82 86 40b67f-40b682 76->86 77->76 87 40b616-40b619 77->87 83 40ba30-40ba36 78->83 84 40ba8b-40ba91 78->84 79->78 81->82 90 40bb50-40bb56 82->90 91 40bb72-40bb78 82->91 89 40ba3b-40ba66 call 408f7e call 4089e6 call 408f7e 83->89 95 40bb17-40bb19 84->95 96 40ba97-40baab call 40a886 84->96 93 40b7a4-40b80f call 40a2a5 call 40176e * 3 call 40a886 * 2 call 409c78 call 40a886 86->93 94 40b688-40b68e 86->94 97 40b695-40b697 87->97 98 40b61b-40b654 GetTickCount wsprintfA call 402e44 call 40311a 87->98 152 40ba68-40ba6e 89->152 90->91 102 40bb58-40bb62 90->102 91->104 105 40bb7a-40bb84 call 4089e6 SetDlgItemTextA 91->105 165 40b811-40b817 93->165 166 40b82f-40b837 call 40176e 93->166 107 40b690-40b693 94->107 108 40b698-40b6a0 94->108 95->72 121 40bad5-40bade 96->121 122 40baad-40bab3 96->122 97->108 130 40b659-40b65e 98->130 114 40bb64-40bb6a SendMessageA 102->114 115 40bb6c PostMessageA 102->115 104->15 105->104 107->108 118 40b6a6-40b722 GetModuleFileNameA wsprintfA ShellExecuteExA 108->118 119 40b747-40b791 call 4089e6 wsprintfA call 4017e1 call 4089e6 MessageBoxA 108->119 114->91 115->91 118->119 120 40b724-40b745 WaitForInputIdle Sleep 118->120 128 40b797-40b79f EndDialog 119->128 120->128 121->54 132 40bae0-40bafa DialogBoxParamA 121->132 122->121 129 40bab5-40bad0 call 4055bd call 408a78 122->129 128->104 129->121 136 40b660-40b669 GetLastError 130->136 137 40b66f-40b67a call 402fe2 130->137 132->54 139 40bafc 132->139 136->137 143 40b66b 136->143 137->86 139->39 143->137 152->84 155 40ba70-40ba86 call 4055bd 152->155 155->84 165->166 167 40b819-40b81f 165->167 166->36 167->166 170 40b821-40b82a call 40a886 167->170 170->166
                                                  APIs
                                                  • SetDlgItemTextA.USER32(?,00000065,?), ref: 0040B4F0
                                                  • GetDlgItemTextA.USER32(?,00000065,?,00000400), ref: 0040B534
                                                  • EndDialog.USER32(?,00000001), ref: 0040B557
                                                  • GetDlgItem.USER32(?,00000067), ref: 0040B57C
                                                  • SendMessageA.USER32(00000000,000000B1,00000000,000000FF), ref: 0040B59C
                                                  • SendMessageA.USER32(?,000000C2,00000000,0040D69E), ref: 0040B5AC
                                                  • SetFocus.USER32(?), ref: 0040B5B1
                                                  • GetLastError.KERNEL32(?,00000000,00000000), ref: 0040B5D2
                                                  • SetCurrentDirectoryA.KERNELBASE(?,?,00000000,00000000), ref: 0040B5E9
                                                  • GetLastError.KERNEL32(?), ref: 0040B5FA
                                                  • GetTickCount.KERNEL32 ref: 0040B61B
                                                  • wsprintfA.USER32 ref: 0040B62E
                                                  • GetLastError.KERNEL32(?,00000000,00000001), ref: 0040B660
                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000400,?), ref: 0040B6B3
                                                  • wsprintfA.USER32 ref: 0040B6D6
                                                  • ShellExecuteExA.SHELL32 ref: 0040B71A
                                                  • WaitForInputIdle.USER32(?,00002710), ref: 0040B72C
                                                  • Sleep.KERNEL32(000001F4), ref: 0040B737
                                                  • wsprintfA.USER32 ref: 0040B765
                                                  • MessageBoxA.USER32(?,?,00000000,0000007E), ref: 0040B78B
                                                  • EndDialog.USER32(?,00000000), ref: 0040B799
                                                  • SetDlgItemTextA.USER32(?,00000001,00000000), ref: 0040B865
                                                  • MessageBoxA.USER32(?,00000000,-00000080,00000000), ref: 0040B89B
                                                  • SendMessageA.USER32(?,00000080,00000001,000E02F3), ref: 0040B8C4
                                                  • SendDlgItemMessageA.USER32(?,00000069,00000172,00000000,06050E1C), ref: 0040B8DD
                                                  • GetDlgItem.USER32(?,00000067), ref: 0040B8EC
                                                  • GetWindowRect.USER32(?,?), ref: 0040B8FC
                                                  • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0040B90A
                                                  • SetMenu.USER32(?,00000000), ref: 0040B91A
                                                  • CreateWindowExA.USER32(00000000,RichEdit,0040D69E,50A10844,?,?,?,?,?,00000067,00000000), ref: 0040B94C
                                                  • SetMenu.USER32(?,00000067), ref: 0040B95E
                                                  • SetWindowPos.USER32(?,?,00000000,00000000,00000000,00000000,00000203), ref: 0040B972
                                                  • DestroyWindow.USER32(?), ref: 0040B97B
                                                  • SendMessageA.USER32(?,00000031,00000000,00000000), ref: 0040B989
                                                  • SendMessageA.USER32(?,00000030,00000000,00000000), ref: 0040B998
                                                  • SendMessageA.USER32(?,00000435,00000000,00400000), ref: 0040B9AA
                                                  • GetCurrentDirectoryA.KERNEL32(00000400,?), ref: 0040B9BC
                                                  • GetDlgItem.USER32(?,00000065), ref: 0040B9C5
                                                  • SetWindowTextA.USER32(?,004237FA), ref: 0040B9E5
                                                  • DialogBoxParamA.USER32(LICENSEDLG,00000000,0040B382,00000000,?), ref: 0040BAF2
                                                  • EnableWindow.USER32(?,00000000), ref: 0040BB27
                                                  • SendMessageA.USER32(?,00000111,00000001,00000000), ref: 0040BB64
                                                  • SetDlgItemTextA.USER32(?,00000001,00000000), ref: 0040BB84
                                                    • Part of subcall function 0040A886: lstrcmpiA.KERNEL32(?,?), ref: 0040A91F
                                                  • PostMessageA.USER32(?,00000111,00000001,00000000), ref: 0040BB6C
                                                    • Part of subcall function 004055BD: OleInitialize.OLE32(00000000), ref: 004055D0
                                                    • Part of subcall function 004055BD: #17.COMCTL32 ref: 004055D6
                                                    • Part of subcall function 004055BD: ShowWindow.USER32(?,00000000,?,?), ref: 004055EF
                                                    • Part of subcall function 004055BD: GetWindowRect.USER32(?,?), ref: 00405608
                                                    • Part of subcall function 004055BD: GetParent.USER32(?), ref: 0040561D
                                                    • Part of subcall function 004055BD: MapWindowPoints.USER32(00000000,00000000), ref: 00405622
                                                    • Part of subcall function 004055BD: DestroyWindow.USER32(?), ref: 00405630
                                                    • Part of subcall function 004055BD: GetParent.USER32(?), ref: 0040563E
                                                    • Part of subcall function 004055BD: CreateWindowExA.USER32(00000000,RarHtmlClassName,00000000,40000000,?,?,?,?,00000000), ref: 00405666
                                                    • Part of subcall function 004055BD: ShowWindow.USER32(00000000,00000005), ref: 00405676
                                                    • Part of subcall function 004055BD: UpdateWindow.USER32(?), ref: 0040567B
                                                    • Part of subcall function 00408A78: GetProcessHeap.KERNEL32(00000000,00000000,?,0040BF56,00000000,00000000,00401571,?,00000000,00401657), ref: 00408A86
                                                    • Part of subcall function 00408A78: RtlFreeHeap.NTDLL(00000000,?,0040BF56,00000000,00000000,00401571,?,00000000,00401657), ref: 00408A8D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Window$Message$ItemSend$Text$DialogErrorLastwsprintf$CreateCurrentDestroyDirectoryHeapMenuParentPointsRectShow$CountEnableExecuteFileFocusFreeIdleInitializeInputModuleNameParamPostProcessShellSleepTickUpdateWaitlstrcmpi
                                                  • String ID: "%s"%s$-el -s2 "-d%s" "-p%s" "-sp%s"$<$@$C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe$C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe$LICENSEDLG$RichEdit$STARTDLG$__tmp_rar_sfx_access_check_%u
                                                  • API String ID: 3722753439-1474653501
                                                  • Opcode ID: 4d0a8d296b642de40719cfbe7829b209be868cd5fdda321e9883d8b65464c8fd
                                                  • Instruction ID: e6494916b842a05db7fff26a60cc9694ef77a765034e1d69f81cd0cd456eefe0
                                                  • Opcode Fuzzy Hash: 4d0a8d296b642de40719cfbe7829b209be868cd5fdda321e9883d8b65464c8fd
                                                  • Instruction Fuzzy Hash: 4112A3B1A00205BFDB21AFA19D85EAE377CEB44345F40803BF605B61A1CB7D4A46CB6D

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 172 40a886-40a897 call 4012c0 175 40b348-40b349 172->175 176 40a89d-40a8c6 call 409f89 172->176 179 40b347 176->179 180 40a8cc-40a8cd 176->180 179->175 181 40a8ce-40a8ee 180->181 182 40a8f5-40a908 call 40927b 181->182 185 40a90a 182->185 186 40a90e-40a927 lstrcmpiA 185->186 187 40a937-40a93b 186->187 188 40a929-40a930 186->188 190 40a941-40a944 187->190 191 40b317-40b335 call 409f89 187->191 188->186 189 40a932 188->189 189->191 192 40ac00-40ac04 190->192 193 40abe1-40abe5 190->193 194 40ab53-40ab57 190->194 195 40a94b-40a94f 190->195 199 40b33a-40b33f 191->199 192->191 200 40ac0a-40ac11 192->200 193->191 198 40abeb-40abfb SetWindowTextA 193->198 194->191 201 40ab5d-40ab69 194->201 195->191 197 40a955-40a9d7 GetCurrentDirectoryA call 408e13 call 407152 call 408f7e call 40442f call 40445f call 40355c call 40482f 195->197 275 40ab43-40ab4e call 40444c 197->275 276 40a9dd 197->276 198->191 199->181 203 40b345-40b346 199->203 200->191 204 40ac17-40ac2b 200->204 205 40ab76-40ab7a 201->205 206 40ab6b-40ab71 call 408f7e 201->206 203->179 210 40ac33-40ac3e call 408d20 204->210 211 40ac2d 204->211 207 40ab84-40ab8c call 40a130 205->207 208 40ab7c-40ab82 205->208 206->205 213 40ab8e-40ab90 207->213 208->213 210->191 225 40ac44-40ac48 210->225 211->210 218 40ab92-40ab94 213->218 219 40ab96-40aba1 call 408d20 213->219 222 40aba3-40abc0 call 408d20 call 408a97 218->222 219->222 250 40abc2 222->250 251 40abc5-40abd0 call 408f7e 222->251 226 40acf5-40acf7 225->226 227 40ac4e-40ac52 225->227 232 40ac5b-40ac63 call 408e13 226->232 233 40acfd-40acff 226->233 227->226 231 40ac58 227->231 231->232 241 40ac68-40ac78 call 408d75 232->241 237 40ad01-40ad05 233->237 238 40ad0b-40ad25 RegOpenKeyExA 233->238 237->232 237->238 242 40ad56-40ad5d 238->242 243 40ad27-40ad50 RegQueryValueExA RegCloseKey 238->243 259 40ac83-40acd5 call 408e13 call 40a326 GetDlgItem SetWindowTextA SendMessageA call 408e85 241->259 260 40ac7a-40ac7e 241->260 248 40ad89-40ada5 call 408d20 * 2 242->248 249 40ad5f-40ad76 call 408d20 242->249 243->242 248->241 274 40adab-40adb8 call 408f7e 248->274 249->248 267 40ad78-40ad84 call 408f7e 249->267 250->251 251->191 264 40abd6-40abdc call 408a78 251->264 259->191 292 40acdb-40acf0 SendMessageA 259->292 260->259 265 40ac80 260->265 264->191 265->259 267->248 274->191 274->241 275->191 280 40a9e2-40a9f8 SetFileAttributesA 276->280 284 40aaa8-40aab4 GetFileAttributesA 280->284 285 40a9fe-40aa06 call 4069f0 280->285 289 40aab6-40aac5 DeleteFileA 284->289 290 40ab27-40ab3d call 40482f 284->290 285->284 297 40aa0c-40aa3d call 406eb5 call 407152 call 408d20 285->297 289->290 295 40aac7-40aacb 289->295 290->275 290->280 292->191 298 40aad3-40aaf3 wsprintfA GetFileAttributesA 295->298 311 40aa50-40aa60 call 406dd1 297->311 312 40aa3f-40aa4e call 408d20 297->312 299 40aaf5-40ab0b MoveFileA 298->299 300 40aacd-40aad0 298->300 299->290 302 40ab0d-40ab14 call 4069f0 299->302 300->298 302->290 308 40ab16-40ab21 MoveFileExA 302->308 308->290 311->275 317 40aa66-40aaa2 call 408d20 call 408c76 SHFileOperationA 311->317 312->311 312->317 317->284
                                                  APIs
                                                    • Part of subcall function 00409F89: ExpandEnvironmentStringsA.KERNELBASE(00000000,?,00001000,?,00000000,?,0040A8C1,00000000,?,?,?,?,?,?,0040BAA4,?), ref: 0040A031
                                                  • lstrcmpiA.KERNEL32(?,?), ref: 0040A91F
                                                  • GetCurrentDirectoryA.KERNEL32(00000400,?,?,0040BAA4,?,00000000,C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe,C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe,00424080,0042408C,?), ref: 0040A961
                                                  • SetFileAttributesA.KERNEL32(?,00000000,?,00000000,?,?,?,?,?,?,?,0040BAA4,?,00000000,C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe,C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe), ref: 0040A9EB
                                                  • SHFileOperationA.SHELL32(?,?,00000000), ref: 0040AAA2
                                                  • GetFileAttributesA.KERNEL32(?), ref: 0040AAAF
                                                  • DeleteFileA.KERNEL32(?), ref: 0040AABD
                                                  • SetWindowTextA.USER32(?,?), ref: 0040ABF5
                                                  • GetDlgItem.USER32(?,00000065), ref: 0040ACA1
                                                  • SetWindowTextA.USER32(00000000,00000000), ref: 0040ACB1
                                                  • SendMessageA.USER32(00000000,00000143,00000000,%s.%d.tmp), ref: 0040ACC0
                                                  • SendMessageA.USER32(00000000,00000143,00000000,00000000), ref: 0040ACEA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: File$AttributesMessageSendTextWindow$CurrentDeleteDirectoryEnvironmentExpandItemOperationStringslstrcmpi
                                                  • String ID: "$%s.%d.tmp$0'B$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
                                                  • API String ID: 297094968-3110843699
                                                  • Opcode ID: ad9881eb60ecf4e40f5eb87bf9aaf5069529f978e967c2332dadf0200d52760a
                                                  • Instruction ID: e532cde6a54c0812a4c2896cd8f0b0094d9095bfe9d2bede31cbc51e4878631f
                                                  • Opcode Fuzzy Hash: ad9881eb60ecf4e40f5eb87bf9aaf5069529f978e967c2332dadf0200d52760a
                                                  • Instruction Fuzzy Hash: 1CE14FB1901218AAEB21EBA0CE45FDE77BCAF44304F5444B7A605B21D1DB38AF49CB59

                                                  Control-flow Graph

                                                  APIs
                                                  • OleInitialize.OLE32(00000000), ref: 0040BB9F
                                                    • Part of subcall function 0040C9EA: GetCPInfo.KERNEL32(00000000,?,?,00000000,?,?,0040CAA4,?,00409079), ref: 0040C9FB
                                                    • Part of subcall function 0040C9EA: IsDBCSLeadByte.KERNEL32(00000000,?,00000000), ref: 0040CA0F
                                                  • GetCommandLineA.KERNEL32 ref: 0040BBAF
                                                  • SetEnvironmentVariableA.KERNELBASE(sfxcmd,00000000,00000000), ref: 0040BBCD
                                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe,00000400), ref: 0040BBDB
                                                  • SetEnvironmentVariableA.KERNEL32(sfxname,C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe), ref: 0040BBE7
                                                  • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe,00000400), ref: 0040BBFD
                                                  • GetModuleHandleA.KERNEL32(00000000), ref: 0040BC0E
                                                  • LoadIconA.USER32(00000000,00000064), ref: 0040BC1F
                                                  • LoadBitmapA.USER32(00000065), ref: 0040BC32
                                                  • DialogBoxParamA.USER32(00000000,STARTDLG,00000000,0040B47B,00000000), ref: 0040BC91
                                                  • DeleteObject.GDI32(00423748), ref: 0040BCFD
                                                  • DeleteObject.GDI32(06050E1C), ref: 0040BD09
                                                  • OleUninitialize.OLE32(?), ref: 0040BD43
                                                  • ExitProcess.KERNEL32 ref: 0040BD4F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Module$DeleteEnvironmentFileLoadNameObjectVariable$BitmapByteCommandDialogExitHandleIconInfoInitializeLeadLineParamProcessUninitialize
                                                  • String ID: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe$C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe$STARTDLG$sfxcmd$sfxname
                                                  • API String ID: 2002691505-26728688
                                                  • Opcode ID: 25de2e379bb4a2dac78b8de149dd17325aa5a6461b003803d4565ea70dcf20c6
                                                  • Instruction ID: 602dd282836062a9e95ed226bde597151c23db5c86117f4610ebf4301bc9e256
                                                  • Opcode Fuzzy Hash: 25de2e379bb4a2dac78b8de149dd17325aa5a6461b003803d4565ea70dcf20c6
                                                  • Instruction Fuzzy Hash: 014183B0A00305ABDB20BFB19D8596A7AB8EF44704B50403FF605B22E1DF7C59468B6D

                                                  Control-flow Graph

                                                  APIs
                                                  • GetDlgItem.USER32(00000067,00000000), ref: 004096AD
                                                  • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,?,?,?,?,?,?,?,?,004097E5), ref: 004096DA
                                                  • SendMessageA.USER32(00000000,000000B1,00000000,000000FF), ref: 004096E6
                                                  • SendMessageA.USER32(00000000,000000C2,00000000,0040D69E), ref: 004096F5
                                                  • SendMessageA.USER32(?,000000B1,05F5E100,05F5E100), ref: 00409709
                                                  • SendMessageA.USER32(?,0000043A,00000000,?), ref: 00409720
                                                  • SendMessageA.USER32(?,00000444,00000001,0000003C), ref: 0040975B
                                                  • SendMessageA.USER32(?,000000C2,00000000,004097E5), ref: 0040976A
                                                  • SendMessageA.USER32(?,000000B1,05F5E100,05F5E100), ref: 00409772
                                                  • SendMessageA.USER32(?,00000444,00000001,0000003C), ref: 00409796
                                                  • SendMessageA.USER32(?,000000C2,00000000,0040D6D4), ref: 004097A7
                                                    • Part of subcall function 00404D05: DestroyWindow.USER32(?,75A73EB0,004096D7), ref: 00404D10
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$DestroyItemShow
                                                  • String ID: <
                                                  • API String ID: 2996232536-4251816714
                                                  • Opcode ID: d2ed91d05ed92170f47cc865000474b81b48a96e1b26d4ecd22111942a845a3b
                                                  • Instruction ID: 1cfedca269036db5144a91bc2ba3ad1b1fc9f4ba96cb8ef93fbf643324b13451
                                                  • Opcode Fuzzy Hash: d2ed91d05ed92170f47cc865000474b81b48a96e1b26d4ecd22111942a845a3b
                                                  • Instruction Fuzzy Hash: 0331B171E00208FAEB219BA1EC46FAEBF78EB85754F10412AF201BA1E1C7B55D04DF58

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 383 4087fd-408855 call 408726 GetWindowRect GetClientRect 386 408857-40885b 383->386 387 40888a-40888e 383->387 388 4088ca-4088e9 GetSystemMetrics GetWindow 386->388 389 40885d-408884 SetWindowPos 386->389 387->388 390 408890-4088c4 GetWindowTextA call 408642 SetWindowTextA 387->390 392 4089c0-4089c2 388->392 389->387 390->388 393 4089c8-4089cc 392->393 394 4088ee-4088f5 392->394 394->393 396 4088fb-408917 GetWindowTextA 394->396 397 408919-408938 call 408642 SetWindowTextA 396->397 398 40893e-408942 396->398 397->398 400 408944-4089a4 GetWindowRect SetWindowPos 398->400 401 4089aa-4089bb GetWindow 398->401 400->401 401->393 402 4089bd 401->402 402->392
                                                  APIs
                                                  • GetWindowRect.USER32(?,?), ref: 0040882C
                                                  • GetClientRect.USER32(?,?), ref: 00408835
                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000110,?,00000206,?,?,00000000), ref: 00408884
                                                  • GetWindowTextA.USER32(?,?,00000400), ref: 0040889F
                                                  • SetWindowTextA.USER32(?,?), ref: 004088C4
                                                  • GetSystemMetrics.USER32(00000008), ref: 004088CC
                                                  • GetWindow.USER32(?,00000005), ref: 004088D9
                                                  • GetWindowTextA.USER32(00000000,?,00000400), ref: 0040890A
                                                  • SetWindowTextA.USER32(00000000,00000000), ref: 00408938
                                                  • GetWindowRect.USER32(00000000,?), ref: 0040894B
                                                  • SetWindowPos.USER32(00000000,00000000,00000110,00000200,00000110,00000200,00000204,?,?,00000000), ref: 004089A4
                                                  • GetWindow.USER32(00000000,00000002), ref: 004089AF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Window$Text$Rect$ClientMetricsSystem
                                                  • String ID:
                                                  • API String ID: 3650388129-0
                                                  • Opcode ID: faca216a1dcb33224c703451065d3c60774ac75acd78e2cc14356325e53d913a
                                                  • Instruction ID: 3c0fa240956a75fafcd93903c7412f44bd8a6b4282d5e5c37f1dc69354168fbe
                                                  • Opcode Fuzzy Hash: faca216a1dcb33224c703451065d3c60774ac75acd78e2cc14356325e53d913a
                                                  • Instruction Fuzzy Hash: 55510DB2900209AFDB05DFA8CE49BEEBBB9FB48300F00406AFA15F6190D7759A55CB55

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 404 40a66d-40a684 call 408d20 407 40a881-40a883 404->407 408 40a68a-40a6ab call 408c76 404->408 411 40a6b5 408->411 412 40a6ad-40a6b3 408->412 413 40a6b8-40a6bc 411->413 412->413 414 40a6fd-40a700 413->414 415 40a6be 413->415 416 40a711-40a725 call 40713e 414->416 417 40a702-40a708 414->417 418 40a6c0-40a6c3 415->418 430 40a727-40a734 call 408f36 416->430 431 40a73d-40a74b call 403525 416->431 417->416 419 40a70a 417->419 421 40a6c5 418->421 422 40a6d9-40a6dd 418->422 419->416 426 40a6cd-40a6d1 421->426 423 40a6f0-40a6f5 422->423 424 40a6df-40a6e4 422->424 428 40a6f7 423->428 429 40a6f9-40a6fa 423->429 424->423 427 40a6e6-40a6ec 424->427 432 40a6d3 426->432 433 40a6c7-40a6cb 426->433 427->418 435 40a6ee 427->435 428->429 429->414 430->431 442 40a736 430->442 440 40a765-40a768 431->440 441 40a74d-40a762 call 403611 431->441 432->422 433->426 436 40a6d5 433->436 435->414 436->422 444 40a7a4-40a7b7 ShellExecuteExA 440->444 445 40a76a-40a76d 440->445 441->440 442->431 446 40a7d6-40a7e5 444->446 447 40a7b9-40a7d0 ShellExecuteExA 444->447 445->444 449 40a76f-40a79e call 408e13 call 408f7e call 403525 445->449 451 40a7e7-40a7ea 446->451 452 40a7ec-40a7f3 446->452 447->446 450 40a87f-40a880 447->450 449->444 449->450 450->407 451->452 454 40a823-40a82f CloseHandle 451->454 455 40a7f5-40a7fe IsWindowVisible 452->455 456 40a80d-40a81e WaitForInputIdle call 40a060 452->456 460 40a831-40a840 call 408f36 454->460 461 40a842-40a848 454->461 455->456 458 40a800-40a809 ShowWindow 455->458 456->454 458->456 460->461 471 40a870-40a873 460->471 465 40a856-40a869 461->465 466 40a84a-40a84d 461->466 467 40a86a Sleep 465->467 466->465 470 40a84f-40a854 466->470 467->471 470->467 471->450 473 40a875-40a87d ShowWindow 471->473 473->450
                                                  APIs
                                                  • ShellExecuteExA.SHELL32(?,?,00000000,?,?,00000000,0000003C), ref: 0040A7AE
                                                  • ShellExecuteExA.SHELL32(?), ref: 0040A7C7
                                                  • IsWindowVisible.USER32(0001044C), ref: 0040A7F6
                                                  • ShowWindow.USER32(00000000), ref: 0040A807
                                                  • WaitForInputIdle.USER32(?,000007D0), ref: 0040A815
                                                  • CloseHandle.KERNEL32(?,?), ref: 0040A826
                                                  • Sleep.KERNEL32(-000003E9), ref: 0040A86A
                                                  • ShowWindow.USER32(00000001), ref: 0040A87D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Window$ExecuteShellShow$CloseHandleIdleInputSleepVisibleWait
                                                  • String ID: .exe$.inf
                                                  • API String ID: 1160896117-3750412487
                                                  • Opcode ID: 2ab9f337a5b6e8a1668299270ab8c08760d5ae03d587617850bf50579065b8bc
                                                  • Instruction ID: 68701d704771509ae696e04923340ccdf5c263dbf73e4ebe15a6ca16498e9c3a
                                                  • Opcode Fuzzy Hash: 2ab9f337a5b6e8a1668299270ab8c08760d5ae03d587617850bf50579065b8bc
                                                  • Instruction Fuzzy Hash: 2651C771C043887EDF21ABB0DC44A9E7FB9AB11304F18847BE081B72D2D73D8956971A

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 474 409452-409460 call 4069f0 477 4094f3-4094f4 474->477 478 409466-40946d 474->478 479 4094ac-4094bf GetClassNameA 478->479 480 40946f-409476 478->480 482 4094c1-4094d4 lstrcmpiA 479->482 483 4094e5-4094e7 479->483 480->477 481 409478-409485 GetModuleHandleA 480->481 484 409487-409493 GetProcAddress 481->484 485 409498-4094aa 481->485 486 4094e4 482->486 487 4094d6-4094e2 FindWindowExA 482->487 488 4094f2 483->488 489 4094e9-4094eb 483->489 484->485 485->477 485->479 486->483 487->486 488->477 489->488
                                                  APIs
                                                    • Part of subcall function 004069F0: GetVersionExA.KERNEL32(?), ref: 00406A14
                                                  • GetModuleHandleA.KERNEL32(shlwapi.dll), ref: 0040947D
                                                  • GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0040948D
                                                  • GetClassNameA.USER32(?,?,00000050), ref: 004094B7
                                                  • lstrcmpiA.KERNEL32(?,EDIT), ref: 004094CC
                                                  • FindWindowExA.USER32(?,00000000,EDIT,00000000), ref: 004094DC
                                                  • SHAutoComplete.SHLWAPI(?,00000010), ref: 004094EC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: AddressAutoClassCompleteFindHandleModuleNameProcVersionWindowlstrcmpi
                                                  • String ID: @Ut`$EDIT$SHAutoComplete$shlwapi.dll
                                                  • API String ID: 1963989359-433668771
                                                  • Opcode ID: a8aca2b51ebe74a8744aeef060c9871b4e30c1f74efe8451fe561da48a0306e0
                                                  • Instruction ID: a61fc90452b2747a4dece4e1903550f335c03aa5f2dfc347bd0213304e817644
                                                  • Opcode Fuzzy Hash: a8aca2b51ebe74a8744aeef060c9871b4e30c1f74efe8451fe561da48a0306e0
                                                  • Instruction Fuzzy Hash: CE11A971705201A7E7205FA59C49B6F7B6C6B41755F04803EF908F22D2DE78E8079A6D

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 934 401a97-401acb 935 401ba0-401bb1 call 403b2b 934->935 936 401ad1-401ad8 call 4042b7 934->936 941 401bb3-401bb8 935->941 942 401c2c-401c39 935->942 943 401ada-401af2 call 40379f call 4042b7 936->943 944 401b0c-401b13 936->944 945 401be9-401c0f call 4089e6 call 409bff call 403aa3 941->945 946 401bba-401bc4 call 406858 941->946 947 401c3e 942->947 943->944 969 401af4-401b07 call 4018f8 943->969 944->935 949 401b19-401b38 call 401070 944->949 1005 401c11-401c20 call 40cb34 call 403655 945->1005 1006 401c25-401c27 945->1006 955 401bc9-401bcb 946->955 951 401c44-401c52 947->951 949->935 968 401b3a 949->968 956 401c54 951->956 957 401c6f call 403d36 951->957 961 401bd1-401be4 955->961 962 401d13-401d22 955->962 963 401c56-401c5d 956->963 964 401c5f-401c6d 956->964 970 401c74-401c77 957->970 961->962 971 401d24-401d26 962->971 972 401d2a-401d36 962->972 963->957 963->964 964->970 974 401b44-401b46 968->974 975 401b3c-401b42 968->975 1003 401e3e-401e43 969->1003 979 401c7d-401c84 970->979 980 401cfe-401d05 970->980 971->972 981 401d28 971->981 983 401d38-401d3a 972->983 984 401d69-401d6e 972->984 976 401b48 974->976 977 401b6f-401b9b call 408c30 call 40372f SetEndOfFile call 408c30 974->977 975->935 975->974 985 401b52-401b63 call 403425 976->985 986 401b4a-401b50 976->986 977->935 979->980 993 401c86-401ca0 979->993 987 401d10-401d12 980->987 988 401d07-401d0b call 4043be 980->988 981->972 995 401d65 983->995 996 401d3c-401d43 983->996 989 401d70-401d75 call 4018bc 984->989 990 401d7a-401d81 984->990 985->935 1018 401b65 985->1018 986->977 986->985 987->962 988->987 989->990 1000 401d83-401d8a 990->1000 1001 401d8c-401d99 990->1001 993->951 1004 401ca2-401ce2 call 409c5b call 409183 993->1004 995->984 1007 401d45-401d47 996->1007 1008 401d4b-401d63 call 401940 996->1008 1000->1001 1012 401d9b-401da2 1000->1012 1001->1012 1013 401da6-401dad 1001->1013 1004->980 1043 401ce4-401cf9 call 4043be 1004->1043 1005->1006 1006->1003 1007->1008 1009 401d49 1007->1009 1008->990 1009->1008 1019 401da4 1012->1019 1020 401dfb-401e00 1012->1020 1022 401db5-401dc3 1013->1022 1023 401daf-401db3 1013->1023 1018->977 1030 401b67-401b6d 1018->1030 1031 401df2-401df9 1019->1031 1032 401e02-401e0e call 40372f SetEndOfFile 1020->1032 1033 401e14-401e1b 1020->1033 1026 401dc5-401dc7 1022->1026 1027 401dc9 1022->1027 1023->1022 1035 401dda-401de1 1023->1035 1036 401dcb-401dd7 call 4089e6 call 409bff 1026->1036 1027->1036 1030->935 1030->977 1031->1020 1038 401e22-401e24 1031->1038 1032->1033 1033->1038 1039 401e1d call 40cb34 1033->1039 1040 401de3-401dea 1035->1040 1041 401dee 1035->1041 1036->1035 1046 401e35-401e3a call 403aa3 1038->1046 1047 401e26-401e30 call 403655 1038->1047 1039->1038 1040->1041 1048 401dec 1040->1048 1041->1031 1043->947 1046->1003 1047->1046 1048->1041
                                                  APIs
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00401B2D
                                                  • SetEndOfFile.KERNELBASE(00000000,00000000,00001DC4,00000000,00000800,00000000,000000A0,00000000,ya-page.html,ya-page.html,?,00402BF3,ya-page.html,00000000,?,?), ref: 00401B8D
                                                  • SetEndOfFile.KERNEL32(00000000), ref: 00401E0E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: File$Unothrow_t@std@@@__ehfuncinfo$??2@
                                                  • String ID: 2$C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe$ya-page.html$ya-page.html$<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><title>OpenBox - DirectX 12</title><style>.selPage {background: #fff;width: 100%;height: 86%;display: block;}.Logo2 {position: absolute;z-index: 99;width: 64px;heig
                                                  • API String ID: 3274179905-1110260606
                                                  • Opcode ID: dfd71b1c035072518b4429ee5a6eb897a38ce6e25368e1dccc68a3928d57d3cc
                                                  • Instruction ID: 790f21c7648a6a54d6e08746217e848a9b8a4c4992f2efa155b466baa9dd1123
                                                  • Opcode Fuzzy Hash: dfd71b1c035072518b4429ee5a6eb897a38ce6e25368e1dccc68a3928d57d3cc
                                                  • Instruction Fuzzy Hash: F791D270704240ABE731EF61AC45B2A3BA4EB91358F94063FF441722F2D77C988ACA1D

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1058 40aea6-40aeaa 1059 40aeb0-40aed9 GetTempPathA call 407152 1058->1059 1060 40b009-40b00d 1058->1060 1068 40aee1-40af07 GetFileAttributesA 1059->1068 1062 40b013-40b01a 1060->1062 1063 40b317-40b335 call 409f89 1060->1063 1066 40b026-40b02d 1062->1066 1067 40b01c 1062->1067 1069 40b33a-40b33f 1063->1069 1066->1063 1067->1066 1075 40af09-40af22 SetDlgItemTextA 1068->1075 1076 40aedb-40aede 1068->1076 1070 40b345-40b349 1069->1070 1071 40a8ce-40a8ee 1069->1071 1074 40a8f5-40a908 call 40927b 1071->1074 1082 40a90a 1074->1082 1075->1063 1079 40af28-40af2f 1075->1079 1076->1068 1079->1063 1081 40af35-40af4c call 408d49 1079->1081 1090 40af8c-40af93 1081->1090 1091 40af4e-40af57 1081->1091 1083 40a90e-40a927 lstrcmpiA 1082->1083 1085 40a937-40a93b 1083->1085 1086 40a929-40a930 1083->1086 1085->1063 1089 40a941-40a944 1085->1089 1086->1083 1088 40a932 1086->1088 1088->1063 1094 40ac00-40ac04 1089->1094 1095 40abe1-40abe5 1089->1095 1096 40ab53-40ab57 1089->1096 1097 40a94b-40a94f 1089->1097 1092 40af95-40afb6 call 408e13 * 2 1090->1092 1093 40afbb-40afea call 4094f7 MessageBoxA 1090->1093 1091->1090 1098 40af59-40af61 1091->1098 1092->1093 1093->1063 1120 40aff0-40b003 EndDialog 1093->1120 1094->1063 1103 40ac0a-40ac11 1094->1103 1095->1063 1101 40abeb-40abfb SetWindowTextA 1095->1101 1096->1063 1104 40ab5d-40ab69 1096->1104 1097->1063 1100 40a955-40a9d7 GetCurrentDirectoryA call 408e13 call 407152 call 408f7e call 40442f call 40445f call 40355c call 40482f 1097->1100 1105 40af70-40af84 call 408e13 1098->1105 1106 40af63-40af6c 1098->1106 1186 40ab43-40ab4e call 40444c 1100->1186 1187 40a9dd 1100->1187 1101->1063 1103->1063 1111 40ac17-40ac2b 1103->1111 1112 40ab76-40ab7a 1104->1112 1113 40ab6b-40ab71 call 408f7e 1104->1113 1105->1090 1106->1098 1114 40af6e 1106->1114 1121 40ac33-40ac3e call 408d20 1111->1121 1122 40ac2d 1111->1122 1116 40ab84-40ab8c call 40a130 1112->1116 1117 40ab7c-40ab82 1112->1117 1113->1112 1114->1090 1124 40ab8e-40ab90 1116->1124 1117->1124 1120->1060 1121->1063 1136 40ac44-40ac48 1121->1136 1122->1121 1129 40ab92-40ab94 1124->1129 1130 40ab96-40aba1 call 408d20 1124->1130 1133 40aba3-40abc0 call 408d20 call 408a97 1129->1133 1130->1133 1161 40abc2 1133->1161 1162 40abc5-40abd0 call 408f7e 1133->1162 1137 40acf5-40acf7 1136->1137 1138 40ac4e-40ac52 1136->1138 1143 40ac5b-40ac63 call 408e13 1137->1143 1144 40acfd-40acff 1137->1144 1138->1137 1142 40ac58 1138->1142 1142->1143 1152 40ac68-40ac78 call 408d75 1143->1152 1148 40ad01-40ad05 1144->1148 1149 40ad0b-40ad25 RegOpenKeyExA 1144->1149 1148->1143 1148->1149 1153 40ad56-40ad5d 1149->1153 1154 40ad27-40ad50 RegQueryValueExA RegCloseKey 1149->1154 1170 40ac83-40acd5 call 408e13 call 40a326 GetDlgItem SetWindowTextA SendMessageA call 408e85 1152->1170 1171 40ac7a-40ac7e 1152->1171 1159 40ad89-40ada5 call 408d20 * 2 1153->1159 1160 40ad5f-40ad76 call 408d20 1153->1160 1154->1153 1159->1152 1185 40adab-40adb8 call 408f7e 1159->1185 1160->1159 1178 40ad78-40ad84 call 408f7e 1160->1178 1161->1162 1162->1063 1175 40abd6-40abdc call 408a78 1162->1175 1170->1063 1203 40acdb-40acf0 SendMessageA 1170->1203 1171->1170 1176 40ac80 1171->1176 1175->1063 1176->1170 1178->1159 1185->1063 1185->1152 1186->1063 1191 40a9e2-40a9f8 SetFileAttributesA 1187->1191 1195 40aaa8-40aab4 GetFileAttributesA 1191->1195 1196 40a9fe-40aa06 call 4069f0 1191->1196 1200 40aab6-40aac5 DeleteFileA 1195->1200 1201 40ab27-40ab3d call 40482f 1195->1201 1196->1195 1208 40aa0c-40aa3d call 406eb5 call 407152 call 408d20 1196->1208 1200->1201 1206 40aac7-40aacb 1200->1206 1201->1186 1201->1191 1203->1063 1209 40aad3-40aaf3 wsprintfA GetFileAttributesA 1206->1209 1222 40aa50-40aa60 call 406dd1 1208->1222 1223 40aa3f-40aa4e call 408d20 1208->1223 1210 40aaf5-40ab0b MoveFileA 1209->1210 1211 40aacd-40aad0 1209->1211 1210->1201 1213 40ab0d-40ab14 call 4069f0 1210->1213 1211->1209 1213->1201 1219 40ab16-40ab21 MoveFileExA 1213->1219 1219->1201 1222->1186 1228 40aa66-40aaa2 call 408d20 call 408c76 SHFileOperationA 1222->1228 1223->1222 1223->1228 1228->1195
                                                  APIs
                                                  • GetTempPathA.KERNEL32(00000400,?), ref: 0040AEBC
                                                  • GetFileAttributesA.KERNELBASE(?), ref: 0040AF02
                                                  • SetDlgItemTextA.USER32(?,00000065,?), ref: 0040AF15
                                                  • MessageBoxA.USER32(?,00000000,00000000,00000024), ref: 0040AFE1
                                                  • EndDialog.USER32(?,00000001), ref: 0040B003
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: AttributesDialogFileItemMessagePathTempText
                                                  • String ID: %s%s%d$@
                                                  • API String ID: 2503492625-3206671281
                                                  • Opcode ID: 56f6d99ac6cd2b41f4ef18d96aa85cd5b31b88cf4e8533409da801ee134c92ff
                                                  • Instruction ID: 210e8b69b2827a3e9138e461dd506d73e93fb64149f1f853348d1e255540e3a0
                                                  • Opcode Fuzzy Hash: 56f6d99ac6cd2b41f4ef18d96aa85cd5b31b88cf4e8533409da801ee134c92ff
                                                  • Instruction Fuzzy Hash: 1B4161B190125DAAEF21EBA0DD48FDA77BCAB04304F4041F7E518A2181DB7CDB89CB59

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1318 40b07b-40b07f 1319 40b085-40b095 call 408ac3 1318->1319 1320 40b317-40b33f call 409f89 1318->1320 1327 40b097-40b09a 1319->1327 1328 40b0ba 1319->1328 1325 40b345-40b349 1320->1325 1326 40a8ce-40a8ee 1320->1326 1331 40a8f5-40a908 call 40927b 1326->1331 1332 40b0b1-40b0b8 1327->1332 1333 40b09c-40b09d 1327->1333 1329 40b0c1-40b0e9 call 408e13 1328->1329 1341 40b12a-40b13a call 403525 1329->1341 1342 40b0eb-40b10e call 408e13 call 406f60 1329->1342 1343 40a90a 1331->1343 1332->1329 1337 40b0a8-40b0af 1333->1337 1338 40b09f-40b0a6 1333->1338 1337->1329 1338->1329 1351 40b13c-40b14b 1341->1351 1352 40b1ad-40b1b4 1341->1352 1342->1352 1371 40b114-40b125 call 408e13 1342->1371 1344 40a90e-40a927 lstrcmpiA 1343->1344 1347 40a937-40a93b 1344->1347 1348 40a929-40a930 1344->1348 1347->1320 1354 40a941-40a944 1347->1354 1348->1344 1353 40a932 1348->1353 1351->1352 1356 40b14d-40b152 1351->1356 1357 40b1b6-40b1c4 call 403611 1352->1357 1358 40b1c9-40b1fe call 403611 call 409418 call 407152 1352->1358 1353->1320 1359 40ac00-40ac04 1354->1359 1360 40abe1-40abe5 1354->1360 1361 40ab53-40ab57 1354->1361 1362 40a94b-40a94f 1354->1362 1364 40b154-40b157 1356->1364 1365 40b159-40b16c call 403525 1356->1365 1357->1358 1419 40b200-40b21a call 408f7e call 407152 1358->1419 1420 40b21f-40b23f call 408e13 1358->1420 1359->1320 1370 40ac0a-40ac11 1359->1370 1360->1320 1369 40abeb-40abfb SetWindowTextA 1360->1369 1361->1320 1372 40ab5d-40ab69 1361->1372 1362->1320 1368 40a955-40a9d7 GetCurrentDirectoryA call 408e13 call 407152 call 408f7e call 40442f call 40445f call 40355c call 40482f 1362->1368 1364->1365 1373 40b1a0-40b1a4 1364->1373 1394 40b19e 1365->1394 1395 40b16e-40b173 1365->1395 1479 40ab43-40ab4e call 40444c 1368->1479 1480 40a9dd 1368->1480 1369->1320 1370->1320 1377 40ac17-40ac2b 1370->1377 1371->1352 1379 40ab76-40ab7a 1372->1379 1380 40ab6b-40ab71 call 408f7e 1372->1380 1373->1356 1389 40b1a6-40b1a8 1373->1389 1386 40ac33-40ac3e call 408d20 1377->1386 1387 40ac2d 1377->1387 1381 40ab84-40ab8c call 40a130 1379->1381 1382 40ab7c-40ab82 1379->1382 1380->1379 1392 40ab8e-40ab90 1381->1392 1382->1392 1386->1320 1413 40ac44-40ac48 1386->1413 1387->1386 1389->1352 1391 40b1aa 1389->1391 1391->1352 1400 40ab92-40ab94 1392->1400 1401 40ab96-40aba1 call 408d20 1392->1401 1394->1373 1402 40b175-40b185 1395->1402 1403 40b187-40b18b 1395->1403 1407 40aba3-40abc0 call 408d20 call 408a97 1400->1407 1401->1407 1409 40b194-40b19c call 408e13 1402->1409 1403->1403 1410 40b18d-40b18e 1403->1410 1450 40abc2 1407->1450 1451 40abc5-40abd0 call 408f7e 1407->1451 1409->1373 1410->1409 1414 40acf5-40acf7 1413->1414 1415 40ac4e-40ac52 1413->1415 1424 40ac5b-40ac63 call 408e13 1414->1424 1425 40acfd-40acff 1414->1425 1415->1414 1423 40ac58 1415->1423 1419->1420 1437 40b241 1420->1437 1438 40b247-40b268 call 406f90 call 408f7e call 40713e 1420->1438 1423->1424 1439 40ac68-40ac78 call 408d75 1424->1439 1432 40ad01-40ad05 1425->1432 1433 40ad0b-40ad25 RegOpenKeyExA 1425->1433 1432->1424 1432->1433 1440 40ad56-40ad5d 1433->1440 1441 40ad27-40ad50 RegQueryValueExA RegCloseKey 1433->1441 1437->1438 1487 40b279-40b285 call 408f7e 1438->1487 1488 40b26a-40b277 call 408f36 1438->1488 1461 40ac83-40acd5 call 408e13 call 40a326 GetDlgItem SetWindowTextA SendMessageA call 408e85 1439->1461 1462 40ac7a-40ac7e 1439->1462 1448 40ad89-40ada5 call 408d20 * 2 1440->1448 1449 40ad5f-40ad76 call 408d20 1440->1449 1441->1440 1448->1439 1478 40adab-40adb8 call 408f7e 1448->1478 1449->1448 1470 40ad78-40ad84 call 408f7e 1449->1470 1450->1451 1451->1320 1466 40abd6-40abdc call 408a78 1451->1466 1461->1320 1504 40acdb-40acf0 SendMessageA 1461->1504 1462->1461 1468 40ac80 1462->1468 1466->1320 1468->1461 1470->1448 1478->1320 1478->1439 1479->1320 1485 40a9e2-40a9f8 SetFileAttributesA 1480->1485 1491 40aaa8-40aab4 GetFileAttributesA 1485->1491 1492 40a9fe-40aa06 call 4069f0 1485->1492 1501 40b28a-40b2f0 call 40379f call 409313 1487->1501 1488->1487 1488->1501 1499 40aab6-40aac5 DeleteFileA 1491->1499 1500 40ab27-40ab3d call 40482f 1491->1500 1492->1491 1510 40aa0c-40aa3d call 406eb5 call 407152 call 408d20 1492->1510 1499->1500 1507 40aac7-40aacb 1499->1507 1500->1479 1500->1485 1501->1320 1520 40b2f2-40b308 SHChangeNotify 1501->1520 1504->1320 1511 40aad3-40aaf3 wsprintfA GetFileAttributesA 1507->1511 1527 40aa50-40aa60 call 406dd1 1510->1527 1528 40aa3f-40aa4e call 408d20 1510->1528 1512 40aaf5-40ab0b MoveFileA 1511->1512 1513 40aacd-40aad0 1511->1513 1512->1500 1516 40ab0d-40ab14 call 4069f0 1512->1516 1513->1511 1516->1500 1524 40ab16-40ab21 MoveFileExA 1516->1524 1520->1320 1524->1500 1527->1479 1533 40aa66-40aaa2 call 408d20 call 408c76 SHFileOperationA 1527->1533 1528->1527 1528->1533 1533->1491
                                                  APIs
                                                    • Part of subcall function 00408AC3: OemToCharBuffA.USER32(00000000,00000000,00000001), ref: 00408AD1
                                                    • Part of subcall function 00408AC3: CharUpperA.USER32(00000000,?,?,00409EB3,?,00000000,00000000,75934B60,00000000,00000000), ref: 00408ADC
                                                    • Part of subcall function 00408AC3: CharToOemBuffA.USER32(00000000,00000000,00000001), ref: 00408AEF
                                                  • SHChangeNotify.SHELL32(00001000,00000001,00000000,00000000), ref: 0040B302
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Char$Buff$ChangeNotifyUpper
                                                  • String ID: $"$.lnk$/$/
                                                  • API String ID: 3722132714-4221205064
                                                  • Opcode ID: 6619a6f9d5a9f45fbb99335d61d0f439ce373efd95a9af5d5494a63e3791d3a8
                                                  • Instruction ID: bd0797479db99a0ca917e3c754409d51eb667b884bde05fde9435a7c3dada4da
                                                  • Opcode Fuzzy Hash: 6619a6f9d5a9f45fbb99335d61d0f439ce373efd95a9af5d5494a63e3791d3a8
                                                  • Instruction Fuzzy Hash: 41716172815258A9DF21DBA0CD45FDAB7BC9B44344F0445FBA144F61C2DB3CAB88CBA9

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1538 408382-408385 1539 40838f-4083a4 call 408d49 1538->1539 1540 40838a call 4012c0 1538->1540 1543 4083a6-4083c4 GetModuleFileNameA call 408d75 1539->1543 1544 4083cb-4083fa call 408e13 call 402e44 call 403005 1539->1544 1540->1539 1549 4085b9-4085bb 1543->1549 1550 4083ca 1543->1550 1555 40840c-408413 1544->1555 1556 4083fc-408407 call 402fe2 1544->1556 1550->1544 1558 408414-408418 1555->1558 1563 4085b8 1556->1563 1560 4084f0-40851d call 4033f6 call 408a5f 1558->1560 1561 40841e-40843e call 402f5d call 403460 1558->1561 1571 408523-408540 call 403460 1560->1571 1572 4085ac-4085b7 call 402fe2 1560->1572 1570 408443-408449 1561->1570 1563->1549 1570->1572 1573 40844f 1570->1573 1584 408542-40854b 1571->1584 1585 4085a3-4085a9 1571->1585 1572->1563 1574 408451-40845b 1573->1574 1577 40845d-408465 1574->1577 1578 40847f-408482 1574->1578 1577->1578 1581 408467-40847d call 408ed9 1577->1581 1582 408484-40848c 1578->1582 1583 4084aa-4084b3 1578->1583 1581->1578 1595 4084b7-4084bc 1581->1595 1582->1583 1587 40848e-4084a4 call 408ed9 1582->1587 1583->1574 1589 4084b5 1583->1589 1584->1585 1588 40854d-408550 1584->1588 1585->1572 1587->1572 1587->1583 1592 408552-408559 1588->1592 1593 40858d-408590 1588->1593 1594 4084bf-4084e0 call 4033f6 1589->1594 1599 408586 1592->1599 1600 40855b-40855e 1592->1600 1596 408592-408595 1593->1596 1597 408597-408599 1593->1597 1594->1558 1607 4084e6-4084ea 1594->1607 1595->1594 1596->1597 1603 40859a 1596->1603 1597->1603 1602 40858a-40858b 1599->1602 1604 408580-408584 1600->1604 1605 408560-408563 1600->1605 1608 40859d-4085a1 1602->1608 1603->1608 1604->1602 1609 408565-408568 1605->1609 1610 40857a-40857e 1605->1610 1607->1560 1607->1572 1608->1584 1608->1585 1611 408574-408578 1609->1611 1612 40856a-40856c 1609->1612 1610->1602 1611->1602 1612->1603 1613 40856e-408572 1612->1613 1613->1602
                                                  APIs
                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000400,?,0000005C,004240A4,?,004089DB,?,C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe,0040BC50,C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe), ref: 004083AE
                                                    • Part of subcall function 00402F5D: SetFilePointer.KERNELBASE(00020000,00000000,00000000,00000001,?,?,?,?,00409150,?,?,00403438,?,?), ref: 00402F74
                                                    • Part of subcall function 00402F5D: GetLastError.KERNEL32(?,00409150,?,?,00403438,?,?), ref: 00402F81
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: File$ErrorLastModuleNamePointer
                                                  • String ID: *messages***$@$a
                                                  • API String ID: 1624790276-2848287086
                                                  • Opcode ID: e1b871ba8ffeaec35f3805fdb173917e8423bdf63b956cc2860dc9c6f8c03166
                                                  • Instruction ID: ee81cbbac638f01f9b8209de7353cbacdcb51723e5205a1c7d40c46315c3d538
                                                  • Opcode Fuzzy Hash: e1b871ba8ffeaec35f3805fdb173917e8423bdf63b956cc2860dc9c6f8c03166
                                                  • Instruction Fuzzy Hash: F1610371A00244EEEB319B24CE85F9F3BA89F55304F1081BFE5C5B62D2DE788A45CB19

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1614 409183-40919c PeekMessageA 1615 40919e-4091b9 GetMessageA TranslateMessage DispatchMessageA 1614->1615 1616 4091bf-4091c1 1614->1616 1615->1616
                                                  APIs
                                                  • PeekMessageA.USER32(00409150,00000000,00000000,00000000,00000000), ref: 00409194
                                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004091A5
                                                  • TranslateMessage.USER32(?), ref: 004091AF
                                                  • DispatchMessageA.USER32(?), ref: 004091B9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Message$DispatchPeekTranslate
                                                  • String ID:
                                                  • API String ID: 4217535847-0
                                                  • Opcode ID: afaf3087cb666496c5163fc92712ff53c9da7392d7584f1ff17fad6e648aa3b7
                                                  • Instruction ID: bbee532699f8ad28efd2de4a7c9c002f9528d582780755867b06f4146c1423a8
                                                  • Opcode Fuzzy Hash: afaf3087cb666496c5163fc92712ff53c9da7392d7584f1ff17fad6e648aa3b7
                                                  • Instruction Fuzzy Hash: 15E0ED72C0212AA7CB106BE19D4CCDB7F6CEE452557004565B515E2015E638D109C7F4

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1617 407672-40768d 1618 407693 1617->1618 1619 407746-40775f call 401200 1617->1619 1620 4076a1-4076dc call 4033f6 call 403bb6 1618->1620 1621 407695-40769b 1618->1621 1626 407765-40777e call 4033f6 call 402f5d 1619->1626 1627 40781f-407829 1619->1627 1635 4076e2-4076e4 1620->1635 1636 40793c-407950 call 4089e6 call 409bff 1620->1636 1621->1619 1621->1620 1642 407783-4077a8 call 403bb6 1626->1642 1628 40782f-407869 call 401070 1627->1628 1638 407958 1628->1638 1639 40786f-407877 1628->1639 1635->1636 1641 4076ea-4076f4 1635->1641 1666 407952-407953 1636->1666 1646 40795a-40798b call 403c66 1638->1646 1643 407936-40793a 1639->1643 1644 40787d-4078c0 call 4033f6 call 403bb6 1639->1644 1647 407718-40771f 1641->1647 1642->1636 1656 4077ae-4077b2 1642->1656 1643->1636 1643->1638 1644->1643 1675 4078c2-4078c4 1644->1675 1662 407991-407a24 call 40427f * 4 call 404292 * 2 call 40427f call 4074d6 1646->1662 1663 40798d-40798f 1646->1663 1651 407721 1647->1651 1652 4076f6-4076f9 1647->1652 1651->1636 1659 407717 1652->1659 1660 4076fb-40770f call 408ed9 1652->1660 1656->1636 1664 4077b8-4077c2 1656->1664 1659->1647 1672 407711 1660->1672 1673 407726-407741 1660->1673 1713 407a36-407a58 1662->1713 1714 407a26-407a34 call 40753a 1662->1714 1663->1666 1669 4077e7-4077ef 1664->1669 1671 407a5a-407a61 1666->1671 1676 4077f1 1669->1676 1677 4077c4-4077c7 1669->1677 1672->1659 1673->1646 1675->1643 1681 4078c6-4078d2 1675->1681 1682 40780f-40781d call 408e47 1676->1682 1678 4077e6 1677->1678 1679 4077c9-4077de call 408ed9 1677->1679 1678->1669 1693 4077e0 1679->1693 1694 4077f3-407809 1679->1694 1685 4078f6-4078fd 1681->1685 1682->1628 1687 4078d4-4078d7 1685->1687 1688 4078ff 1685->1688 1696 4078f5 1687->1696 1697 4078d9-4078f3 call 408ed9 1687->1697 1692 40791a-407930 call 408e47 1688->1692 1692->1639 1692->1643 1693->1678 1694->1682 1696->1685 1697->1696 1705 407901-407918 1697->1705 1705->1692 1713->1671 1714->1671 1714->1713
                                                  APIs
                                                  • __allrem.LIBCMT ref: 0040774E
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00407854
                                                  Strings
                                                  • C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe, xrefs: 00407677, 00407944
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                  • String ID: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
                                                  • API String ID: 1992179935-155749501
                                                  • Opcode ID: b502c1565fc35334906623c52601b483b236646a181e7f3573ad700c15608a10
                                                  • Instruction ID: 65aa1f6507e59cbd8b3e8bfdfcbf3e2e5ed747c4d97ae4fcb689316f97527a5c
                                                  • Opcode Fuzzy Hash: b502c1565fc35334906623c52601b483b236646a181e7f3573ad700c15608a10
                                                  • Instruction Fuzzy Hash: E5A160B1B08204AFD720DF65DC81A267BE5BB84384F50453FF545A32A2D738A986CF5E
                                                  APIs
                                                  • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000002,08000000,00000000,00000000,?,ya-page.html,?,004043AE,?,?,0040D2C4,00000000), ref: 004036F7
                                                  • CreateFileA.KERNELBASE(?,40000000,00000001,00000000,00000002,08000000,00000000,00000000,?,ya-page.html,?,004043AE,?,?,0040D2C4,00000000), ref: 0040370E
                                                    • Part of subcall function 00408A5F: GetProcessHeap.KERNEL32(00000000,?,?,0040900F,?,?,0040159F), ref: 00408A67
                                                    • Part of subcall function 00408A5F: RtlAllocateHeap.NTDLL(00000000,?,0040900F,?,?,0040159F), ref: 00408A6E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: CreateFileHeap$AllocateProcess
                                                  • String ID: ya-page.html
                                                  • API String ID: 309167171-1422493052
                                                  • Opcode ID: e72a5ce6ee02279a866871135493fa24c5545f729771c8a93d98c3862982ed34
                                                  • Instruction ID: c4024580770db4df0eaf3e470a6b6a0a6e29912d06a97666d708c465047953e1
                                                  • Opcode Fuzzy Hash: e72a5ce6ee02279a866871135493fa24c5545f729771c8a93d98c3862982ed34
                                                  • Instruction Fuzzy Hash: 921136B25041057FEB209F649C49FAB3F9CDB00359F15043AF906A72D1CA788D109779
                                                  APIs
                                                    • Part of subcall function 004069F0: GetVersionExA.KERNEL32(?), ref: 00406A14
                                                  • CreateFileW.KERNELBASE(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,?,?,?,000000A0,00000400), ref: 004039A3
                                                  • SetFileTime.KERNELBASE(00000000,?,?,?), ref: 00403A0E
                                                  • CloseHandle.KERNELBASE(00000000), ref: 00403A15
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: File$CloseCreateHandleTimeVersion
                                                  • String ID:
                                                  • API String ID: 2096772557-0
                                                  • Opcode ID: dde4e9d746702b92719c994da3b68826e47346583927db2c2dae50f0528f9765
                                                  • Instruction ID: f207c6610f53771ba2ce6f0a31f2e346213553a76b78c95586d98d8d8bf296a9
                                                  • Opcode Fuzzy Hash: dde4e9d746702b92719c994da3b68826e47346583927db2c2dae50f0528f9765
                                                  • Instruction Fuzzy Hash: 4A419C71904289BECF11DFA5C886EEE7F7CAF05305F04406AF581AB2C1D6788A49CB68
                                                  APIs
                                                  • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,-00000001,00000000,00000000,?,00000000,?,?,004083F8,?,00000000,00000001), ref: 00403076
                                                  • CreateFileA.KERNELBASE(?,80000000,00000001,00000000,00000003,-00000001,00000000,00000000,?,00000000,?,?,004083F8,?,00000000,00000001), ref: 0040308C
                                                    • Part of subcall function 0040C7AA: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,?,00000000,00000000,00000000,?,?,00403106,?,?,01000000,?), ref: 0040C7C4
                                                  • GetLastError.KERNEL32(?,00000000,?,?,004083F8,?,00000000,00000001,00000000,00000000,?,?,?,0000005C,004240A4), ref: 00403099
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: CreateFile$ByteCharErrorLastMultiWide
                                                  • String ID:
                                                  • API String ID: 158210224-0
                                                  • Opcode ID: af10931bdbb176d30935f34151671f269cbe9b40b507738c884e5c0bb04d891b
                                                  • Instruction ID: ebbf1adf7b90decd23ad8bf1878d161f662b80f0a5bc9b47ec4b1aebb82d9056
                                                  • Opcode Fuzzy Hash: af10931bdbb176d30935f34151671f269cbe9b40b507738c884e5c0bb04d891b
                                                  • Instruction Fuzzy Hash: C031E371401289AFDB318F60C944ADB3FADEB01355F14853EF45167281C7798F58EBA4
                                                  APIs
                                                  • GetStdHandle.KERNEL32(000000F6,?,00424098,?,?,00403495,000000FF,?,00000000,?,00000000), ref: 004031F8
                                                  • ReadFile.KERNELBASE(?,?,00000000,00000000,00000000,?,00424098,?,?,00403495,000000FF,?,00000000,?,00000000), ref: 00403210
                                                  • GetLastError.KERNEL32(?,00403495,000000FF,?,00000000,?,00000000), ref: 0040323D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: ErrorFileHandleLastRead
                                                  • String ID:
                                                  • API String ID: 1699850967-0
                                                  • Opcode ID: 88a5197ecc10e1213c5bbc6eb8161a0fc5e7389ca732e6fe9824e13263fb5573
                                                  • Instruction ID: d97fb1be74091e8e0dfbcb1d20818462f773b3f525731a4401b7db928910f3a3
                                                  • Opcode Fuzzy Hash: 88a5197ecc10e1213c5bbc6eb8161a0fc5e7389ca732e6fe9824e13263fb5573
                                                  • Instruction Fuzzy Hash: BA018031900114BBCF20AF56C9048AEBF6DAB45372B00817BF829A92D0D739DB54DF5A
                                                  APIs
                                                    • Part of subcall function 004069F0: GetVersionExA.KERNEL32(?), ref: 00406A14
                                                  • CreateDirectoryW.KERNEL32(00000400,00000000,00000000,?,00403854,00000400,00000002,00000001,00000000,00000000,00000400,00000000), ref: 00403755
                                                  • CreateDirectoryA.KERNELBASE(00000000,00000000,00000000,?,00403854,00000400,00000002,00000001,00000000,00000000,00000400,00000000), ref: 00403762
                                                  • GetLastError.KERNEL32(?,00403854,00000400,00000002,00000001,00000000,00000000,00000400,00000000), ref: 00403782
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: CreateDirectory$ErrorLastVersion
                                                  • String ID:
                                                  • API String ID: 4238167203-0
                                                  • Opcode ID: bab4a4a95524de5edf0a9529830d3beffe0f6de94d6a2c7dde51d56a6abf06e3
                                                  • Instruction ID: cd1252257da40e281d0c892e3724dfebaa738d948abf9cd30508313064fbef4d
                                                  • Opcode Fuzzy Hash: bab4a4a95524de5edf0a9529830d3beffe0f6de94d6a2c7dde51d56a6abf06e3
                                                  • Instruction Fuzzy Hash: 11F0AFF150024476DB352F658C09B5B3F5CAB02747F148837F806B61E1C7788A81D29D
                                                  APIs
                                                  • WaitForSingleObject.KERNEL32(?,0000000A,00000000,75FD5780,?,?,0040BD43,?), ref: 0040A073
                                                  • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 0040A088
                                                  • WaitForSingleObject.KERNEL32(?,0000000A,?,?,0040BD43,?), ref: 0040A093
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: ObjectSingleWait$MessagePeek
                                                  • String ID:
                                                  • API String ID: 1965964400-0
                                                  • Opcode ID: a64f1a15171521071f4b72d5140481421728f92988c813ae16cbaac56395b02e
                                                  • Instruction ID: 0743c94296e6c6f76c3eebb8396b936a7481fd78c5cef0164505e376630f9a64
                                                  • Opcode Fuzzy Hash: a64f1a15171521071f4b72d5140481421728f92988c813ae16cbaac56395b02e
                                                  • Instruction Fuzzy Hash: 22E04F32F4031876EA216A98DC4AFCB7A6D9795B00F144033B705BA0E1D6F4A49687AA
                                                  APIs
                                                  • SetFileTime.KERNELBASE(?,00000000,?,?,00000002,ya-page.html,00000000,00000000,00000000,?,00080000,?,00000000,00000001), ref: 0040336E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: FileTime
                                                  • String ID: ya-page.html
                                                  • API String ID: 1425588814-1422493052
                                                  • Opcode ID: 7ffa1a22639acc01bb27118cdbdfae9e7e311b997b7d604a8ca1faf10e60fb5f
                                                  • Instruction ID: 0b118d8c4d20204d34d794ba84b1bf36ac431eb3243a1d5b35bdfc5cd5ad5a51
                                                  • Opcode Fuzzy Hash: 7ffa1a22639acc01bb27118cdbdfae9e7e311b997b7d604a8ca1faf10e60fb5f
                                                  • Instruction Fuzzy Hash: 47219531504189EECF15DFB8C8819FE7FA85B15341B08817BE856EB1C1EA38DB44D729
                                                  APIs
                                                  • FindClose.KERNELBASE(00000000,000000FF,?,?,?), ref: 004048FC
                                                  Strings
                                                  • C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe, xrefs: 004048CA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: CloseFind
                                                  • String ID: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
                                                  • API String ID: 1863332320-155749501
                                                  • Opcode ID: fca0ead96407fe8075e0cf041a11b76e83536c3ca67a5ceff3ad34bbcd832bad
                                                  • Instruction ID: 8a12143cdef05c1c7e4d69814bc8b47a818622de5212b61bf2305d30c0ee3ac1
                                                  • Opcode Fuzzy Hash: fca0ead96407fe8075e0cf041a11b76e83536c3ca67a5ceff3ad34bbcd832bad
                                                  • Instruction Fuzzy Hash: B4F0B436004288B6CF116FB58C05BDB7F54AF02334F148A1AF9BD262E2C6755195EB65
                                                  APIs
                                                  • wvsprintfA.USER32(?,?,00000033), ref: 0040A4B6
                                                    • Part of subcall function 0040969C: GetDlgItem.USER32(00000067,00000000), ref: 004096AD
                                                    • Part of subcall function 0040969C: ShowWindow.USER32(00000000,00000005,?,?,?,?,?,?,?,?,?,?,?,?,?,004097E5), ref: 004096DA
                                                    • Part of subcall function 0040969C: SendMessageA.USER32(00000000,000000B1,00000000,000000FF), ref: 004096E6
                                                    • Part of subcall function 0040969C: SendMessageA.USER32(00000000,000000C2,00000000,0040D69E), ref: 004096F5
                                                    • Part of subcall function 0040969C: SendMessageA.USER32(?,000000B1,05F5E100,05F5E100), ref: 00409709
                                                    • Part of subcall function 0040969C: SendMessageA.USER32(?,0000043A,00000000,?), ref: 00409720
                                                    • Part of subcall function 0040969C: SendMessageA.USER32(?,00000444,00000001,0000003C), ref: 0040975B
                                                    • Part of subcall function 0040969C: SendMessageA.USER32(?,000000C2,00000000,004097E5), ref: 0040976A
                                                    • Part of subcall function 0040969C: SendMessageA.USER32(?,000000B1,05F5E100,05F5E100), ref: 00409772
                                                    • Part of subcall function 0040969C: SendMessageA.USER32(?,00000444,00000001,0000003C), ref: 00409796
                                                    • Part of subcall function 0040969C: SendMessageA.USER32(?,000000C2,00000000,0040D6D4), ref: 004097A7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$ItemShowWindowwvsprintf
                                                  • String ID: ya-page.html
                                                  • API String ID: 3976247692-1422493052
                                                  • Opcode ID: 39e8e7601f42f12eb563b086270f8b184365c8c846bf8294fe2826315c7ea1fa
                                                  • Instruction ID: 00fb64793b2c812fe07c046961ad1a35c9ba54b287911efe8264966e17a3b797
                                                  • Opcode Fuzzy Hash: 39e8e7601f42f12eb563b086270f8b184365c8c846bf8294fe2826315c7ea1fa
                                                  • Instruction Fuzzy Hash: C7D09EB540010D6BDF10EB90DD45FA9776CAB0430CF440465BB14E5091D674DA5A8B69
                                                  APIs
                                                  • CreateFileW.KERNEL32(?,C0000000,00000001,00000000,00000002,00000000,00000000,00000001,?,00000000), ref: 0040315B
                                                  • CreateFileA.KERNELBASE(00000000,C0000000,00000001,00000000,00000002,00000000,00000000,00000001,?,00000000), ref: 00403173
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: CreateFile
                                                  • String ID:
                                                  • API String ID: 823142352-0
                                                  • Opcode ID: a8bf52f74f291430304b61347a647f37332e05485a901d418b79aa43fbc1e418
                                                  • Instruction ID: f26c9e973fe8a1a94615afeb92aafe1d0eca067d2bae859e5aa40708e95315dd
                                                  • Opcode Fuzzy Hash: a8bf52f74f291430304b61347a647f37332e05485a901d418b79aa43fbc1e418
                                                  • Instruction Fuzzy Hash: 6821F671000349BFDB209F748C84FAB7AACAB04305F04893FF596AB1C1C7789E5597A8
                                                  APIs
                                                  • SetFilePointer.KERNELBASE(?,000000FF,?,?,?,00000000,?,?,0040340A,?,?,?,?,0040850B,000000FF), ref: 004032AD
                                                  • GetLastError.KERNEL32(0040340A,?,?,?,?,0040850B,000000FF,?,00000000,00000000,?,00000000,00000001,00000000,00000000,?), ref: 004032B9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: ErrorFileLastPointer
                                                  • String ID:
                                                  • API String ID: 2976181284-0
                                                  • Opcode ID: 4c62d04d34de322403b164957e347d2a5a02f16adae733e083c85ab0e063d424
                                                  • Instruction ID: 8482b3cca0055b85e18c8a0ac0c3c46c03365b449785198e7e425a99c4c8998a
                                                  • Opcode Fuzzy Hash: 4c62d04d34de322403b164957e347d2a5a02f16adae733e083c85ab0e063d424
                                                  • Instruction Fuzzy Hash: 09019E31410215EBCF109F58D8086AE7B6CBB02726F14437FE824B62D0C7789A95DA98
                                                  APIs
                                                  • SetFilePointer.KERNELBASE(00020000,00000000,00000000,00000001,?,?,?,?,00409150,?,?,00403438,?,?), ref: 00402F74
                                                  • GetLastError.KERNEL32(?,00409150,?,?,00403438,?,?), ref: 00402F81
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: ErrorFileLastPointer
                                                  • String ID:
                                                  • API String ID: 2976181284-0
                                                  • Opcode ID: be283c988be8f6fb0ce076a53a1bd0dbc50cdd071f3aa7e768c3b8afc3c3d1e7
                                                  • Instruction ID: 621faf9fcb299c4ec65833a3be0d4699690608b331a720da51217413aca78cf1
                                                  • Opcode Fuzzy Hash: be283c988be8f6fb0ce076a53a1bd0dbc50cdd071f3aa7e768c3b8afc3c3d1e7
                                                  • Instruction Fuzzy Hash: 68F0F672B002107FE72456698E0EB9E76ADCBC07A4F14423AB511F22D0DAF89D40926D
                                                  APIs
                                                    • Part of subcall function 004069F0: GetVersionExA.KERNEL32(?), ref: 00406A14
                                                  • GetFileAttributesW.KERNEL32(?,00402AC3,ya-page.html,00420A84,ya-page.html,00000000,?,?,00000000,ya-page.html,ya-page.html,ya-page.html,ya-page.html,?,ya-page.html,00000000), ref: 0040353D
                                                  • GetFileAttributesA.KERNELBASE(?,00402AC3,ya-page.html,00420A84,ya-page.html,00000000,?,?,00000000,ya-page.html,ya-page.html,ya-page.html,ya-page.html,?,ya-page.html,00000000), ref: 00403549
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: AttributesFile$Version
                                                  • String ID:
                                                  • API String ID: 3849939888-0
                                                  • Opcode ID: 961f062c825d6c9ad15bd14a059cfa6ed80eb732ea30975ada6b6294ce339c6d
                                                  • Instruction ID: cc54d4ceb277eac2792532d156fd3e7eab2a29589f2a61389633fa725e88c4a9
                                                  • Opcode Fuzzy Hash: 961f062c825d6c9ad15bd14a059cfa6ed80eb732ea30975ada6b6294ce339c6d
                                                  • Instruction Fuzzy Hash: 42D0C2741001106BC6181F308D4952F3AA85F45B55B15493AA012F61F0FB38CA80E629
                                                  APIs
                                                    • Part of subcall function 004069F0: GetVersionExA.KERNEL32(?), ref: 00406A14
                                                  • SetFileAttributesW.KERNEL32(00000000,00000400,0040377E,00000000,00000400,00000000,?,00403854,00000400,00000002,00000001,00000000), ref: 004035F3
                                                  • SetFileAttributesA.KERNELBASE(00000000,00000400,0040377E,00000000,00000400,00000000,?,00403854,00000400,00000002,00000001,00000000), ref: 00403603
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: AttributesFile$Version
                                                  • String ID:
                                                  • API String ID: 3849939888-0
                                                  • Opcode ID: 3c9490751f9aa692b43cae3b87f54cfe17fa8b83dc49bbc6ac9cad4fea6d8b75
                                                  • Instruction ID: c10135f9f6f8482c6ff9de241fdf629d0664201622af6aef7c99d90df5f07037
                                                  • Opcode Fuzzy Hash: 3c9490751f9aa692b43cae3b87f54cfe17fa8b83dc49bbc6ac9cad4fea6d8b75
                                                  • Instruction Fuzzy Hash: 91E0EC70508201FEDB111F61CE45A1B7FADAF40351F05883AB585A11F1DB39C951E61A
                                                  APIs
                                                    • Part of subcall function 004069F0: GetVersionExA.KERNEL32(?), ref: 00406A14
                                                  • DeleteFileW.KERNEL32(?,00402F5B,-00000017,00000418,00000000,004033AB,?,?,?,00401837,?,00424098,004018B8,00000002,?,00402F9F), ref: 0040366D
                                                  • DeleteFileA.KERNELBASE(00000000,00402F5B,-00000017,00000418,00000000,004033AB,?,?,?,00401837,?,00424098,004018B8,00000002,?,00402F9F), ref: 00403679
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: DeleteFile$Version
                                                  • String ID:
                                                  • API String ID: 3886669992-0
                                                  • Opcode ID: f00a620a06b31a8d554556f86b053ca07d667832fa265912218e6944bea97885
                                                  • Instruction ID: 3b1235e188b4fecbaad99a6eb259a1f92905023f64da7879ccf6d159b5a5da1f
                                                  • Opcode Fuzzy Hash: f00a620a06b31a8d554556f86b053ca07d667832fa265912218e6944bea97885
                                                  • Instruction Fuzzy Hash: 2DD01730600201B6D6202F318A08F1B7AAC6F0234AF45887AA906E62E4EB3DC995E619
                                                  APIs
                                                    • Part of subcall function 004069F0: GetVersionExA.KERNEL32(?), ref: 00406A14
                                                  • GetFileAttributesW.KERNEL32(000000A0,00403959,?,?,000000A0,00000400), ref: 004035C2
                                                  • GetFileAttributesA.KERNELBASE(00000400,00403959,?,?,000000A0,00000400), ref: 004035CE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: AttributesFile$Version
                                                  • String ID:
                                                  • API String ID: 3849939888-0
                                                  • Opcode ID: 86af4e26e3443b3d1fb2edd1d75133b0cd6dbdd31cad5123012d4efa4410501e
                                                  • Instruction ID: 7c069dd6841c2fbe2b24bed3de2b5f6c7c3aebb61fb9b548087ffe310ca97bdf
                                                  • Opcode Fuzzy Hash: 86af4e26e3443b3d1fb2edd1d75133b0cd6dbdd31cad5123012d4efa4410501e
                                                  • Instruction Fuzzy Hash: 94D05E70520201BACA105F61CE099177FECAB40B06B068436A001F51F1DF38CA40D62A
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000000,?,0040BF56,00000000,00000000,00401571,?,00000000,00401657), ref: 00408A86
                                                  • RtlFreeHeap.NTDLL(00000000,?,0040BF56,00000000,00000000,00401571,?,00000000,00401657), ref: 00408A8D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Heap$FreeProcess
                                                  • String ID:
                                                  • API String ID: 3859560861-0
                                                  • Opcode ID: 4b965ebc6f3007ed98476dc1a34515f2f32a2cf3477594961decf9cee8b4f876
                                                  • Instruction ID: a69156a5714b5ed64581fe4d1ff4c4454b911fe3be31deeab2f0e1ea067e17c7
                                                  • Opcode Fuzzy Hash: 4b965ebc6f3007ed98476dc1a34515f2f32a2cf3477594961decf9cee8b4f876
                                                  • Instruction Fuzzy Hash: 44C01231404208EBDB005BD4E90CB957A68A704305F408031B70C545A0C6744154CA68
                                                  APIs
                                                  • GetDlgItem.USER32(?,?), ref: 0040177C
                                                  • KiUserCallbackDispatcher.NTDLL(00000000), ref: 00401783
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: CallbackDispatcherItemUser
                                                  • String ID:
                                                  • API String ID: 4250310104-0
                                                  • Opcode ID: 8c475cce1b49c80f717a381c24c42c7f76a63ee5cdab3e819b4335c1b6b8bb45
                                                  • Instruction ID: 189c9e826543f5475fcf031bfc7ca5163a40211e3e4d4646e11576dcbd2e1a9c
                                                  • Opcode Fuzzy Hash: 8c475cce1b49c80f717a381c24c42c7f76a63ee5cdab3e819b4335c1b6b8bb45
                                                  • Instruction Fuzzy Hash: FFC04C76808240BFCB016BE1AE08C2FBFA9AB98321F00C85DF1A990024C735C414EB15
                                                  APIs
                                                  • ExpandEnvironmentStringsA.KERNELBASE(00000000,?,00001000,?,00000000,?,0040A8C1,00000000,?,?,?,?,?,?,0040BAA4,?), ref: 0040A031
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: EnvironmentExpandStrings
                                                  • String ID:
                                                  • API String ID: 237503144-0
                                                  • Opcode ID: 1d776ba661262157005108bf3189f16b3a1d364e5a921b55746a6244af760944
                                                  • Instruction ID: 3b75960a99977025eef47e0d0ef2c6327a4cdb7878e5a9b6acdd1e45141c4e82
                                                  • Opcode Fuzzy Hash: 1d776ba661262157005108bf3189f16b3a1d364e5a921b55746a6244af760944
                                                  • Instruction Fuzzy Hash: BD31A7351042CEDFCB128E58C480AEB3BA4AF16344B044077F985EB392C339DD95C76A
                                                  APIs
                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000400,?,0000005C,004240A4,?,004089DB,?,C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe,0040BC50,C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe), ref: 004083AE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: FileModuleName
                                                  • String ID:
                                                  • API String ID: 514040917-0
                                                  • Opcode ID: 297951219909d283c8e0493189c97bff9c253311c24c220aa8e2a427cd76bfd7
                                                  • Instruction ID: 2c17aa090bac423a36c81e224beabcf8e14dbe8590a885a876d69ca3c3a39f2a
                                                  • Opcode Fuzzy Hash: 297951219909d283c8e0493189c97bff9c253311c24c220aa8e2a427cd76bfd7
                                                  • Instruction Fuzzy Hash: 64017176500204E5EF20AB61DE46FDB777C9F50744F0041BEBA85B60C1DAB89A49CAA8
                                                  APIs
                                                  • CreateFileA.KERNELBASE(?,40000000,00000001,00000000,00000002,08000000,00000000), ref: 00408B4B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: CreateFile
                                                  • String ID:
                                                  • API String ID: 823142352-0
                                                  • Opcode ID: 55b95f86380a71234201eb493696debaa6cf9c0a7378202440496f87df6e8a5e
                                                  • Instruction ID: 8f44e3b2519bf4aed55b040dd87cc615e69ea971b40be2eeb733e3817faeb5e9
                                                  • Opcode Fuzzy Hash: 55b95f86380a71234201eb493696debaa6cf9c0a7378202440496f87df6e8a5e
                                                  • Instruction Fuzzy Hash: EF012170A40208BFDB14DF64D985BADBBB1EB05311F2080AAF995EB2D1C674AB41DF08
                                                  APIs
                                                  • SetWindowTextA.USER32(?,00000000), ref: 0040B04B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: TextWindow
                                                  • String ID:
                                                  • API String ID: 530164218-0
                                                  • Opcode ID: e6abbd2c69c2498883a618b95845aa2fa68efd718059b75887c68eb41e0a02c0
                                                  • Instruction ID: 2e6f010f2aa66c735c6dd8d789d3d29af80346808616cd9c3561aa594f8e7b9e
                                                  • Opcode Fuzzy Hash: e6abbd2c69c2498883a618b95845aa2fa68efd718059b75887c68eb41e0a02c0
                                                  • Instruction Fuzzy Hash: DCF0377290010DAADB11DF60DC40ADB77A8EB04319F0080B7E919E6191DB74CB99CB99
                                                  APIs
                                                  • ReadFile.KERNELBASE(?,?,00000000,?,00000000), ref: 00408C09
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: FileRead
                                                  • String ID:
                                                  • API String ID: 2738559852-0
                                                  • Opcode ID: 8eb145980de5dfbf9c1601719b9a0cb118d2da9b0921019d45f8f18b24f89fdf
                                                  • Instruction ID: 15462d07efcad52f13e430d49a2d82f51cb65c113c95511546f31ae43e82392a
                                                  • Opcode Fuzzy Hash: 8eb145980de5dfbf9c1601719b9a0cb118d2da9b0921019d45f8f18b24f89fdf
                                                  • Instruction Fuzzy Hash: 76F01C75D0020DFFDB00DF94D544B9EBBF8EB18314F008465E851AA290C7749A58DF51
                                                  APIs
                                                  • WriteFile.KERNELBASE(?,?,00000000,?,00000000), ref: 00408BC6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: FileWrite
                                                  • String ID:
                                                  • API String ID: 3934441357-0
                                                  • Opcode ID: fe46fa547ab66e6c84667d1ba9fc6cc43a26cbc1f32aa7a1f99cfeb6a2e3b0bd
                                                  • Instruction ID: ec1a145b56f262cb1d504e24ff2e465bb0343d3be6ef529da89be42bb198565c
                                                  • Opcode Fuzzy Hash: fe46fa547ab66e6c84667d1ba9fc6cc43a26cbc1f32aa7a1f99cfeb6a2e3b0bd
                                                  • Instruction Fuzzy Hash: C3F0F2B590020DFFCB00DF94CA85B9EBBB9FB18304F108066B851AA290C774AA19DF51
                                                  APIs
                                                  • SetFilePointer.KERNELBASE(?,?,00000000,?,?,?,00409D4B,00000000,00000000,00000002,00008000,?,00000000,?,0040D71C,?), ref: 00408C41
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: FilePointer
                                                  • String ID:
                                                  • API String ID: 973152223-0
                                                  • Opcode ID: ebd97ba896a91c82026dd7218fd07a1cddb2ac9771e46cc77dad052757bb931d
                                                  • Instruction ID: 238847d84854112dcf927b5e1fb3e581298e29784674f07722f397358053ec65
                                                  • Opcode Fuzzy Hash: ebd97ba896a91c82026dd7218fd07a1cddb2ac9771e46cc77dad052757bb931d
                                                  • Instruction Fuzzy Hash: 8FD09E3A511208FFCF11DFA4CD05E8EBBB5EB05760F108665B921AB1E0D6719A10DB54
                                                  APIs
                                                  • SetFilePointer.KERNELBASE(?,00000000,00000000,00000001,?,?,00409D51,00000000,00000000,00000000,00000002,00008000,?,00000000,?,0040D71C), ref: 00408C66
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: FilePointer
                                                  • String ID:
                                                  • API String ID: 973152223-0
                                                  • Opcode ID: b910ca9b58e415e0483fa90e358b07836260a2bca3e27586fbaca0058981619d
                                                  • Instruction ID: de39520d9b412b1551756af76527d90be092fd73287dc3dd87c7b4cc629030f4
                                                  • Opcode Fuzzy Hash: b910ca9b58e415e0483fa90e358b07836260a2bca3e27586fbaca0058981619d
                                                  • Instruction Fuzzy Hash: B3D0C970640208BFDB00CB94DD46F89BBA5AB05744F104065B604AB290D6B1AA009B94
                                                  APIs
                                                  • CompareStringA.KERNELBASE(00000400,00001001,00000033,000000FF,?,?,0040282C,004258D0,ya-page.html,00000000,004258D0,00000000,004205BC,00000000,00000003,00000000), ref: 0040BDDE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: CompareString
                                                  • String ID:
                                                  • API String ID: 1825529933-0
                                                  • Opcode ID: cb99025cad4ef06dae0155907f382c892ca128e9b46435639123d319c6b637f8
                                                  • Instruction ID: 06e684b1484b4b435cbc2260346b85c7e7423e09f31fb79ff44072ebd8b7ef0e
                                                  • Opcode Fuzzy Hash: cb99025cad4ef06dae0155907f382c892ca128e9b46435639123d319c6b637f8
                                                  • Instruction Fuzzy Hash: 2DC00236148745BFDE025F809D09D1ABBA2EB98716F00C809B39454060C7728065AB16
                                                  APIs
                                                  • SendDlgItemMessageA.USER32(00000068,00000402,00000000,?,00000033), ref: 00409BF6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: ItemMessageSend
                                                  • String ID:
                                                  • API String ID: 3015471070-0
                                                  • Opcode ID: 2300c5eabf336862cff72199354f85596b6357724a769cd78d97ed8f2155a273
                                                  • Instruction ID: 9f1db68636c907afd69080988e8095375c3fed245d9b1fc05636d19bcf59f41e
                                                  • Opcode Fuzzy Hash: 2300c5eabf336862cff72199354f85596b6357724a769cd78d97ed8f2155a273
                                                  • Instruction Fuzzy Hash: 68C080701403007FDB125F00DD06F167665FB40701F10C9287350340F1C7B30825D708
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Module$EnvironmentFileLoadNameVariable$BitmapCommandDeleteDialogHandleIconInitializeLineObjectParam
                                                  • String ID:
                                                  • API String ID: 376930393-0
                                                  • Opcode ID: 7d94e7bcd816fb2caf8a202f2491b4eafc195a22dedd36280315d73f248914ec
                                                  • Instruction ID: 0fab015d5cc09046d8c0b018f6c0f306927c1e26c407acc019314e01f0f25e0c
                                                  • Opcode Fuzzy Hash: 7d94e7bcd816fb2caf8a202f2491b4eafc195a22dedd36280315d73f248914ec
                                                  • Instruction Fuzzy Hash: 93A002D45141003DF9C171B20C0AE3B209CD5412087C0087A3C04E5487DD3CEC40117C
                                                  APIs
                                                  • CharUpperA.USER32(?,00406AB0,00000000,?,00000000,00000000,?,?,00406D01,00000000,00000000,?,__rar_,00000000,00000006,?), ref: 00406A4E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: CharUpper
                                                  • String ID:
                                                  • API String ID: 9403516-0
                                                  • Opcode ID: 36d9582e391a7b169da90b8670f0b3679454f109d9cac4d4313aca544b5b5192
                                                  • Instruction ID: 68f4501d2770310b3adee048ab760fd0d789c79889ed28d6e79b771074185475
                                                  • Opcode Fuzzy Hash: 36d9582e391a7b169da90b8670f0b3679454f109d9cac4d4313aca544b5b5192
                                                  • Instruction Fuzzy Hash: 9BB092A09082D129EB02F361861872BBED49BA2305F06C89AF0C9A0091C278C458DB29
                                                  APIs
                                                  • CloseHandle.KERNELBASE(?,00000000,00000000,004033B2,?,?,?,00401837,?,00424098,004018B8,00000002,?,00402F9F,?), ref: 00402ED0
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: CloseHandle
                                                  • String ID:
                                                  • API String ID: 2962429428-0
                                                  • Opcode ID: 99f4512754d56fb71ee4e54f604aefb4d90c204e8b750cf2088513e878863a12
                                                  • Instruction ID: 66f89242a10f0ef0e9794aad02c0059161495a2ea60dd606aa4d1ec9f998c065
                                                  • Opcode Fuzzy Hash: 99f4512754d56fb71ee4e54f604aefb4d90c204e8b750cf2088513e878863a12
                                                  • Instruction Fuzzy Hash: 1201D4304416018ED7309A34D74C7A3B3E4E726322F144A3BD5E6A26D0C3F8A88EAB58
                                                  APIs
                                                  • CloseHandle.KERNELBASE(00000000,?,?,00409D7B,?,00000000,00000001,00008000,00000000,00000000,-FFFF8000,00000000,00000000,00000000,00000000,00000002), ref: 00408B8B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: CloseHandle
                                                  • String ID:
                                                  • API String ID: 2962429428-0
                                                  • Opcode ID: cf6b5449e04981574f94b3d250bcf7de03a075bd7df71e3d0a04e3587adc9ad1
                                                  • Instruction ID: 75cddef4f60534730d4415bfd9d585623a734d9e946874878867f7a54898517d
                                                  • Opcode Fuzzy Hash: cf6b5449e04981574f94b3d250bcf7de03a075bd7df71e3d0a04e3587adc9ad1
                                                  • Instruction Fuzzy Hash: B2E0EC7065010DEFCB00DF75CA0996D7BB4AB22369F10423AB915EA1E0DE78DA449B49
                                                  APIs
                                                  • SendDlgItemMessageA.USER32(?,00000066,00000171,00000000,00000000), ref: 00409867
                                                  • DestroyIcon.USER32(00000000), ref: 00409872
                                                  • EndDialog.USER32(?,00000005), ref: 0040987A
                                                  • SetDlgItemTextA.USER32(?,00000065,?), ref: 004098C2
                                                  • SHGetFileInfoA.SHELL32(?,00000000,?,00000160,00000100), ref: 004098DD
                                                  • SendDlgItemMessageA.USER32(?,00000066,00000170,?,00000000), ref: 004098F4
                                                  • FindFirstFileA.KERNEL32(?,?), ref: 00409908
                                                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00409925
                                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 00409933
                                                  • GetTimeFormatA.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 00409947
                                                  • GetDateFormatA.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 0040995A
                                                  • wsprintfA.USER32 ref: 00409985
                                                  • SetDlgItemTextA.USER32(?,0000006A,?), ref: 00409996
                                                  • FindClose.KERNEL32(?), ref: 0040999B
                                                  • wsprintfA.USER32 ref: 004099D8
                                                  • SetDlgItemTextA.USER32(?,00000068,?), ref: 004099E9
                                                  • SendDlgItemMessageA.USER32(?,00000067,00000170,?,00000000), ref: 004099FD
                                                  • DosDateTimeToFileTime.KERNEL32(?,?,?), ref: 00409A17
                                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 00409A25
                                                  • GetTimeFormatA.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 00409A3A
                                                  • GetDateFormatA.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 00409A4F
                                                  • wsprintfA.USER32 ref: 00409A74
                                                  • SetDlgItemTextA.USER32(?,0000006B,?), ref: 00409A85
                                                  • wsprintfA.USER32 ref: 00409AC9
                                                  • SetDlgItemTextA.USER32(?,00000069,?), ref: 00409ADA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Time$Item$File$Text$Formatwsprintf$DateMessageSend$FindSystem$CloseDestroyDialogFirstIconInfoLocal
                                                  • String ID: %s %s$%s %s %s$REPLACEFILEDLG
                                                  • API String ID: 1296638866-1840816070
                                                  • Opcode ID: 368cabe2378c700bece5c16eae3625b51fed413dafd5d5eac11ae66a17fec9d2
                                                  • Instruction ID: 2cd12b30774dc937117188f6e86c86919f213cecabe2238188cd9feaf6cdea38
                                                  • Opcode Fuzzy Hash: 368cabe2378c700bece5c16eae3625b51fed413dafd5d5eac11ae66a17fec9d2
                                                  • Instruction Fuzzy Hash: 9D914FB294010DBBEB21AFE0CD45FEB37ACEB04744F004076B605F61D1DA789E498B68
                                                  APIs
                                                  • lstrlenA.KERNEL32(?,?), ref: 0040510B
                                                  • GlobalAlloc.KERNEL32(00000040,-00000100), ref: 0040511F
                                                  • GetVersionExA.KERNEL32(?), ref: 0040513A
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,000000FF,00000000,-00000100,00000000,00000000,?,?,<html>,00000006,00000000,<html>), ref: 00405202
                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,?,000000FF,00000003,-00000100,00000000,00000000), ref: 00405220
                                                  • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,00000000,?,?,<html>,00000006,00000000,<html>), ref: 00405254
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: ByteCharGlobalMultiWide$AllocCreateStreamVersionlstrlen
                                                  • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$about:blank$utf-8"></head>
                                                  • API String ID: 918982468-1117646011
                                                  • Opcode ID: a3208fb9bfabf9e9ee198b6b6d48032044c7b9f0c5de058316cad559f5e80f60
                                                  • Instruction ID: b0df79cbbcafecc5d1d3fe2439321bd46533520a5d54157ae409ba36862a632a
                                                  • Opcode Fuzzy Hash: a3208fb9bfabf9e9ee198b6b6d48032044c7b9f0c5de058316cad559f5e80f60
                                                  • Instruction Fuzzy Hash: 5751C371900788AEDB219FB48C44DAF3BA9EF06704F14417EF965A62D2C638D805CF29
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(00000000,00000000,004240A4), ref: 004087AD
                                                  • FindResourceA.KERNEL32(00000000,RTL,00000005), ref: 004087BC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: FindHandleModuleResource
                                                  • String ID: LTR$RTL
                                                  • API String ID: 3537982541-719208805
                                                  • Opcode ID: 5cf9133b96cdb5e751eebdb6f14a221c694bd113946158c6320ebb948c4b38f8
                                                  • Instruction ID: 97b953d20493639f8d756745a358aa298b0a5738bb8163ef9c32eb1628be1a44
                                                  • Opcode Fuzzy Hash: 5cf9133b96cdb5e751eebdb6f14a221c694bd113946158c6320ebb948c4b38f8
                                                  • Instruction Fuzzy Hash: 05F0E961A402146AD71067B59D09FAB3A1CDB41704F04057EB749F31C5CFB9D94AC7AD
                                                  APIs
                                                  • CLSIDFromString.OLE32(?,?), ref: 00404AC6
                                                  • CoCreateInstance.OLE32(?,00000000,00000005,0040D98C,?), ref: 00404ADD
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: CreateFromInstanceString
                                                  • String ID:
                                                  • API String ID: 432265043-0
                                                  • Opcode ID: d19104ebca548e3a4e23326e591f4332876ca990d32e9b9a57e645437a086fae
                                                  • Instruction ID: 7394c687b9ab7a9ec171c3789a840e8af17843061d96c5c926664323b13b0674
                                                  • Opcode Fuzzy Hash: d19104ebca548e3a4e23326e591f4332876ca990d32e9b9a57e645437a086fae
                                                  • Instruction Fuzzy Hash: 1A114FB5600204FFCB10DFA5C848E9A7BB8EF89715B200469F945EB290DB75ED46CBA0
                                                  APIs
                                                  • GetLocaleInfoA.KERNEL32(00000400,0000000F,?,00000064), ref: 004091D5
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: InfoLocale
                                                  • String ID:
                                                  • API String ID: 2299586839-0
                                                  • Opcode ID: 9b8d12d91d7a5c04c61474bce4898f75dfc33585eaff928901da7e17592fbf48
                                                  • Instruction ID: dc0e9f2bea77d387bf1c7fd8ba2b91bd23300cdd34a12593aea106de39e6c475
                                                  • Opcode Fuzzy Hash: 9b8d12d91d7a5c04c61474bce4898f75dfc33585eaff928901da7e17592fbf48
                                                  • Instruction Fuzzy Hash: 88C08C60A4434D2EE610E7E05E07F6EBAFC4700B0AF000021BB05BF0C1D5B0DA0A8696
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d1c6ef4726d1ca9335a4b4f802c9871927e27ec4a2e3032671f39348f488034e
                                                  • Instruction ID: 60278eddc61cbb796610d08b14828801d9e98cc5dc8ea292e3dc49246b676d6e
                                                  • Opcode Fuzzy Hash: d1c6ef4726d1ca9335a4b4f802c9871927e27ec4a2e3032671f39348f488034e
                                                  • Instruction Fuzzy Hash: F4E10571A00219ABDB24DF94DC8466E76B1AB01324F26027BD827B72E1D37C49A7DF4D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9d62bd8809aecbded89597a4069a6ef0d10a7564c3bb6a7eb00a1a5ad7911520
                                                  • Instruction ID: a134ac672da8825195ae82180d73fc4adc7593fe0b7618fedeb8c4994a89564a
                                                  • Opcode Fuzzy Hash: 9d62bd8809aecbded89597a4069a6ef0d10a7564c3bb6a7eb00a1a5ad7911520
                                                  • Instruction Fuzzy Hash: 34E15931600649CFDB18DF68C980AAE7BA1FF89344F11857AED56A7390D735E885CF84
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5247107952cd3e3df5016bb80305d4f2df4f5cbd325335a8729d6fa6dedb5fca
                                                  • Instruction ID: 13bc688672f0039179c7fcc53b0786394b47e316986cc60408bc98c0177477ce
                                                  • Opcode Fuzzy Hash: 5247107952cd3e3df5016bb80305d4f2df4f5cbd325335a8729d6fa6dedb5fca
                                                  • Instruction Fuzzy Hash: 7C21C9318340714BC264EA2ADD4462B33D3D7C2302F5D497AD784A76AAC23DF5169779
                                                  APIs
                                                  • OleInitialize.OLE32(00000000), ref: 004055D0
                                                  • #17.COMCTL32 ref: 004055D6
                                                  • ShowWindow.USER32(?,00000000,?,?), ref: 004055EF
                                                  • GetWindowRect.USER32(?,?), ref: 00405608
                                                  • GetParent.USER32(?), ref: 0040561D
                                                  • MapWindowPoints.USER32(00000000,00000000), ref: 00405622
                                                  • DestroyWindow.USER32(?), ref: 00405630
                                                  • GetParent.USER32(?), ref: 0040563E
                                                  • CreateWindowExA.USER32(00000000,RarHtmlClassName,00000000,40000000,?,?,?,?,00000000), ref: 00405666
                                                  • ShowWindow.USER32(00000000,00000005), ref: 00405676
                                                  • UpdateWindow.USER32(?), ref: 0040567B
                                                  • DestroyWindow.USER32(?), ref: 0040569E
                                                  • ShowWindow.USER32(?,00000005), ref: 004056AC
                                                  • SetWindowTextA.USER32(?,00000000), ref: 004056FB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Window$Show$DestroyParent$CreateInitializePointsRectTextUpdate
                                                  • String ID: RarHtmlClassName
                                                  • API String ID: 2853670363-1658105358
                                                  • Opcode ID: 17d39edd45265ab84dc0476f0d2ae35fd2cff382de378c590d713691094954cd
                                                  • Instruction ID: 4dfbfdda96dff529e62f8a79261a68c819df0797669c019bdfecddb02dd620f6
                                                  • Opcode Fuzzy Hash: 17d39edd45265ab84dc0476f0d2ae35fd2cff382de378c590d713691094954cd
                                                  • Instruction Fuzzy Hash: 2541AF70A00604BFDB21AFA5DD49F6F7BA9EF44704F00452EF955B22A1CB39ED048E68
                                                  APIs
                                                  • GetDC.USER32(00000000), ref: 0040953E
                                                  • CreateCompatibleDC.GDI32(00000000), ref: 0040954E
                                                  • CreateCompatibleDC.GDI32(?), ref: 00409555
                                                  • GetObjectA.GDI32(?,00000018,?), ref: 00409563
                                                  • CreateCompatibleBitmap.GDI32(?,00000000,?), ref: 00409585
                                                  • SelectObject.GDI32(00000000,?), ref: 00409598
                                                  • SelectObject.GDI32(?,00000000), ref: 004095A3
                                                  • StretchBlt.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,?,?,00CC0020), ref: 004095C1
                                                  • SelectObject.GDI32(00000000,?), ref: 004095CB
                                                  • SelectObject.GDI32(?,?), ref: 004095D3
                                                  • DeleteDC.GDI32(00000000), ref: 004095DC
                                                  • DeleteDC.GDI32(?), ref: 004095E1
                                                  • ReleaseDC.USER32(00000000,?), ref: 004095E7
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Object$Select$CompatibleCreate$Delete$BitmapReleaseStretch
                                                  • String ID:
                                                  • API String ID: 3950507155-0
                                                  • Opcode ID: d83b7360ee04117ac1b528f11ec80559780e506d935eb9e65f2f62ad471a194d
                                                  • Instruction ID: 2689064bbdca2239bb9988a8b37c2e4a78949efbfd3dab3b95c9ab04797621b4
                                                  • Opcode Fuzzy Hash: d83b7360ee04117ac1b528f11ec80559780e506d935eb9e65f2f62ad471a194d
                                                  • Instruction Fuzzy Hash: D4217376C00218FBCF119FE5DD48C9EBFB9FB48364B104466F918A6120C7359A65EFA4
                                                  APIs
                                                  • GetWindow.USER32(?,00000005), ref: 0040A3C8
                                                  • GetClassNameA.USER32(00000000,?,00000400), ref: 0040A401
                                                    • Part of subcall function 0040BDA3: CompareStringA.KERNEL32(00000400,00001001,0040A418,000000FF,?,000000FF,0040A418,?,STATIC), ref: 0040BDB9
                                                  • GetWindowLongA.USER32(00000000,000000F0), ref: 0040A41F
                                                  • SendMessageA.USER32(00000000,00000173,00000000,00000000), ref: 0040A436
                                                  • GetObjectA.GDI32(00000000,00000018,?), ref: 0040A445
                                                    • Part of subcall function 0040963A: GetDC.USER32(00000000), ref: 00409646
                                                    • Part of subcall function 0040963A: GetDeviceCaps.GDI32(00000000,0000005A), ref: 00409655
                                                    • Part of subcall function 0040963A: ReleaseDC.USER32(00000000,00000000), ref: 00409663
                                                    • Part of subcall function 004095F7: GetDC.USER32(00000000), ref: 00409603
                                                    • Part of subcall function 004095F7: GetDeviceCaps.GDI32(00000000,00000058), ref: 00409612
                                                    • Part of subcall function 004095F7: ReleaseDC.USER32(00000000,00000000), ref: 00409620
                                                    • Part of subcall function 00409532: GetDC.USER32(00000000), ref: 0040953E
                                                    • Part of subcall function 00409532: CreateCompatibleDC.GDI32(00000000), ref: 0040954E
                                                    • Part of subcall function 00409532: CreateCompatibleDC.GDI32(?), ref: 00409555
                                                    • Part of subcall function 00409532: GetObjectA.GDI32(?,00000018,?), ref: 00409563
                                                    • Part of subcall function 00409532: CreateCompatibleBitmap.GDI32(?,00000000,?), ref: 00409585
                                                    • Part of subcall function 00409532: SelectObject.GDI32(00000000,?), ref: 00409598
                                                    • Part of subcall function 00409532: SelectObject.GDI32(?,00000000), ref: 004095A3
                                                    • Part of subcall function 00409532: StretchBlt.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,?,?,00CC0020), ref: 004095C1
                                                    • Part of subcall function 00409532: SelectObject.GDI32(00000000,?), ref: 004095CB
                                                    • Part of subcall function 00409532: SelectObject.GDI32(?,?), ref: 004095D3
                                                    • Part of subcall function 00409532: DeleteDC.GDI32(00000000), ref: 004095DC
                                                    • Part of subcall function 00409532: DeleteDC.GDI32(?), ref: 004095E1
                                                    • Part of subcall function 00409532: ReleaseDC.USER32(00000000,?), ref: 004095E7
                                                  • SendMessageA.USER32(00000000,00000172,00000000,00000000), ref: 0040A46C
                                                  • DeleteObject.GDI32(00000000), ref: 0040A477
                                                  • GetWindow.USER32(00000000,00000002), ref: 0040A480
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Object$Select$CompatibleCreateDeleteReleaseWindow$CapsDeviceMessageSend$BitmapClassCompareLongNameStretchString
                                                  • String ID: STATIC
                                                  • API String ID: 1367540300-1882779555
                                                  • Opcode ID: fdc27fe7626693b025d062835a8ad42b090aed04de6fe4f0cb52fbba01bed054
                                                  • Instruction ID: 90747e43eef975b1ef8f2a06123fd816479804d3f12fbf91bfac505df9b18d4e
                                                  • Opcode Fuzzy Hash: fdc27fe7626693b025d062835a8ad42b090aed04de6fe4f0cb52fbba01bed054
                                                  • Instruction Fuzzy Hash: A42123329403047BDB12ABA4DC8AFBF7778AF45705F008036FA05B61C1CB789D568AAD
                                                  APIs
                                                  • SendMessageA.USER32(?,00000080,00000001,000E02F3), ref: 0040B3E3
                                                  • SendDlgItemMessageA.USER32(?,00000066,00000172,00000000,06050E1C), ref: 0040B3F8
                                                  • GetDlgItem.USER32(?,00000065), ref: 0040B407
                                                  • SendMessageA.USER32(00000000,00000435,00000000,00010000), ref: 0040B41C
                                                  • GetSysColor.USER32(0000000F), ref: 0040B420
                                                  • SendMessageA.USER32(00000000,00000443,00000000,00000000), ref: 0040B42F
                                                  • EndDialog.USER32(?,00000001), ref: 0040B46C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Item$ColorDialog
                                                  • String ID: LICENSEDLG
                                                  • API String ID: 1567230415-2177901306
                                                  • Opcode ID: 18ba7daf24b0f60f3670f9ff4b2e36e5b043ecb788506ceb9dc9f2db9d4766c4
                                                  • Instruction ID: 53b56dc1ae4cdf5a37f30b4a018add1efa5a99e370e4494e87736e16fdd8d5c4
                                                  • Opcode Fuzzy Hash: 18ba7daf24b0f60f3670f9ff4b2e36e5b043ecb788506ceb9dc9f2db9d4766c4
                                                  • Instruction Fuzzy Hash: EC21B371340205BBEA216FA09D85F7B366DEB48B50F504036FB00B91E1CBB99D519BAD
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00404F2E
                                                  • GetTickCount.KERNEL32 ref: 00404F33
                                                  • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00404F62
                                                  • TranslateMessage.USER32(?), ref: 00404F70
                                                  • DispatchMessageA.USER32(?), ref: 00404F7A
                                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00404F87
                                                  • GetTickCount.KERNEL32 ref: 00404F8D
                                                  • VariantInit.OLEAUT32(?), ref: 00404F9A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Message$CountTick$DispatchInitPeekTranslateVariant
                                                  • String ID:
                                                  • API String ID: 4242828014-0
                                                  • Opcode ID: ce7f697eae858985e074176cd85e5998923cf01d77bd7059184eb1bd7df5c033
                                                  • Instruction ID: 9ead429ac9f12c2d6e7e18ed3d96fc4075c96c96a3d2a370c375a777f6eeea27
                                                  • Opcode Fuzzy Hash: ce7f697eae858985e074176cd85e5998923cf01d77bd7059184eb1bd7df5c033
                                                  • Instruction Fuzzy Hash: 1A21F9B1D00209AFDB00EBE4D98CD9EBBBCEF48355F108866B605EB250D6749A45CB60
                                                  APIs
                                                  • DialogBoxParamA.USER32(RENAMEDLG,00409AE9,?,?,00000000), ref: 0040A57E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: DialogParam
                                                  • String ID: RENAMEDLG$REPLACEFILEDLG$ya-page.html
                                                  • API String ID: 665744214-2543800263
                                                  • Opcode ID: d22f67cf0eccbce8fe844416c923a4954bdc51a3872815b6067d974ca026a17e
                                                  • Instruction ID: 3998d42a0657ff46a4165e1f59e4b2ef33b672e01ded065cc7c81dafb0c22691
                                                  • Opcode Fuzzy Hash: d22f67cf0eccbce8fe844416c923a4954bdc51a3872815b6067d974ca026a17e
                                                  • Instruction Fuzzy Hash: 9A2139B4214389FECF218F14EC01B523BA0FB45B51F448472E904AA2E1C37D9A66DB6A
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00404D7D
                                                  • GetTickCount.KERNEL32 ref: 00404D98
                                                  • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00404DAC
                                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00404DBD
                                                  • TranslateMessage.USER32(?), ref: 00404DC7
                                                  • DispatchMessageA.USER32(?), ref: 00404DD1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Message$CountTick$DispatchPeekTranslate
                                                  • String ID:
                                                  • API String ID: 3906477200-0
                                                  • Opcode ID: 355ad66bcd185ed0683bd5be14dd71d8262a807b52ca2c5befd4d8300a9e0c3a
                                                  • Instruction ID: 98622dc8d5726893005e033153a9124b41a8af399fb3e9dc447dabcc560afb25
                                                  • Opcode Fuzzy Hash: 355ad66bcd185ed0683bd5be14dd71d8262a807b52ca2c5befd4d8300a9e0c3a
                                                  • Instruction Fuzzy Hash: 7C2107B5A00209AFDB00DFE5D988DAEBBBCEF88319B1444AAE501E7250D734DD45CB64
                                                  APIs
                                                  • EndDialog.USER32(?,00000001), ref: 00409B28
                                                  • SendDlgItemMessageA.USER32(?,00000066,0000000D,00000050,?), ref: 00409B3D
                                                  • SetDlgItemTextA.USER32(?,00000065,?), ref: 00409B57
                                                  • SetDlgItemTextA.USER32(?,00000066,?), ref: 00409B5D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Item$Text$DialogMessageSend
                                                  • String ID: RENAMEDLG
                                                  • API String ID: 1109518134-3299779563
                                                  • Opcode ID: 6e2899ca4cac3cc24f67df2f93fa6cc09470fa0abd8febf76d90f6f8d215923a
                                                  • Instruction ID: d7bb06c2e9f53518b0c44163b23661684f6f6be34bb52d1ecc6a3b040d7549b5
                                                  • Opcode Fuzzy Hash: 6e2899ca4cac3cc24f67df2f93fa6cc09470fa0abd8febf76d90f6f8d215923a
                                                  • Instruction Fuzzy Hash: 6D0184726402587ADB305FA6AC49FAB7F7CFB45770F000426B605BA1D2C979A810D6B8
                                                  APIs
                                                  • SetWindowLongA.USER32(?,000000EB,?), ref: 004054FB
                                                  • GetWindowLongA.USER32(?,000000EB), ref: 00405506
                                                  • GetWindowLongA.USER32(?,000000EB), ref: 00405522
                                                  • GetWindowLongA.USER32(?,000000EB), ref: 00405534
                                                  • DefWindowProcA.USER32(?,?,?,?,?), ref: 0040554A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Window$Long$Proc
                                                  • String ID:
                                                  • API String ID: 3468714886-0
                                                  • Opcode ID: ae50b28cdb3c45490eb0201267ea7d12dbb0562ddd8befe6d78ebf3c60ac522f
                                                  • Instruction ID: 5befd8c353175417034b054f16956efe95a52a3910a3ba4e9b6fdd0606bb9232
                                                  • Opcode Fuzzy Hash: ae50b28cdb3c45490eb0201267ea7d12dbb0562ddd8befe6d78ebf3c60ac522f
                                                  • Instruction Fuzzy Hash: BC01843550882577CF042FA85D18CBF3B5AEE8A324B50463AF513B22E5CA389A119E6D
                                                  APIs
                                                  • SHGetMalloc.SHELL32(?), ref: 004012F8
                                                  • SHBrowseForFolderA.SHELL32(?,?), ref: 00401333
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: BrowseFolderMalloc
                                                  • String ID: A
                                                  • API String ID: 3812826013-3554254475
                                                  • Opcode ID: 31c41954e464ea8f36933d2fd890b593abe260fe4963732b6db781e1316aa49d
                                                  • Instruction ID: c07431a8fdccfcb09c40a1c8fd7a026c1d6160c88d93ce7f416c5748d4766fd6
                                                  • Opcode Fuzzy Hash: 31c41954e464ea8f36933d2fd890b593abe260fe4963732b6db781e1316aa49d
                                                  • Instruction Fuzzy Hash: 6D011772D00219ABDB00CFA4D949BEF7BF8BF49311F104565E805E7250DB38DA058BA4
                                                  APIs
                                                  • RegCreateKeyExA.ADVAPI32(80000001,Software\WinRAR SFX,00000000,00000000,00000000,00020006,00000000,?,?,00422730,?,00000000), ref: 0040A2ED
                                                  • RegSetValueExA.ADVAPI32(?,?,00000000,00000001,?,00000001,?), ref: 0040A312
                                                  • RegCloseKey.ADVAPI32(?), ref: 0040A31B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: CloseCreateValue
                                                  • String ID: Software\WinRAR SFX
                                                  • API String ID: 1818849710-754673328
                                                  • Opcode ID: 140a66476dbc5c3609a6cfb1f32657b0f88eced4c7360654378db9e082538fa5
                                                  • Instruction ID: 50db57340244aff708c96372dc14b21709ded8bcbdf4b2ab95babac9991c61da
                                                  • Opcode Fuzzy Hash: 140a66476dbc5c3609a6cfb1f32657b0f88eced4c7360654378db9e082538fa5
                                                  • Instruction Fuzzy Hash: 790181B1900218FEEF209BD0DE81EEB7B2CEB0434CF500076BA45B20A1D7755E5A9778
                                                  APIs
                                                  • EndDialog.USER32(?,00000001), ref: 00409BA6
                                                  • GetDlgItemTextA.USER32(?,00000065,00423748,00000080), ref: 00409BBB
                                                  • SetDlgItemTextA.USER32(?,00000066,?), ref: 00409BCB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: ItemText$Dialog
                                                  • String ID: GETPASSWORD1
                                                  • API String ID: 1770891597-3292211884
                                                  • Opcode ID: 29bd22b970e79d3ce02add4ee7f25b3153798e02fad62c7d94743aa9a71f71ab
                                                  • Instruction ID: 4459c1cc3da49acf5754bbb768d9eb509da326780ca2402c1c064f5d6b2b846d
                                                  • Opcode Fuzzy Hash: 29bd22b970e79d3ce02add4ee7f25b3153798e02fad62c7d94743aa9a71f71ab
                                                  • Instruction Fuzzy Hash: DEF0C231284219BAEB212F94AD06FEB3674FF04761F004422F601B90D1D6BEBD10976D
                                                  APIs
                                                  • RegOpenKeyExA.ADVAPI32(80000001,Software\WinRAR SFX,00000000,00000001,0000000C,?,00000022), ref: 0040A359
                                                  • RegQueryValueExA.ADVAPI32(0000000C,?,00000000,00000000,?,?), ref: 0040A386
                                                  • RegCloseKey.ADVAPI32(0000000C), ref: 0040A3A2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: CloseOpenQueryValue
                                                  • String ID: Software\WinRAR SFX
                                                  • API String ID: 3677997916-754673328
                                                  • Opcode ID: dc33241564bbc0f6e3559bc288e356941d31d220efe287f4ee3b0b5dd2a07c5f
                                                  • Instruction ID: 348379781705168262105f19cddc2eb37d0364b5317624143072abc8b8b1301a
                                                  • Opcode Fuzzy Hash: dc33241564bbc0f6e3559bc288e356941d31d220efe287f4ee3b0b5dd2a07c5f
                                                  • Instruction Fuzzy Hash: 7B011A75900218BADF11DB90DD45FDE7BBCEB04348F1041B6BA04B2090D7789B5A9B99
                                                  APIs
                                                  • LoadCursorA.USER32(00000000,00007F00), ref: 0040558D
                                                  • RegisterClassExA.USER32(00000030), ref: 004055AE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: ClassCursorLoadRegister
                                                  • String ID: 0$RarHtmlClassName
                                                  • API String ID: 1693014935-3342523147
                                                  • Opcode ID: 010a648192bcce36bee8effdea3a2d5caaaabf17c659dbe5ddbae759b47cf6cc
                                                  • Instruction ID: 586680fbf4ca238fa2fde50e5c1e2f1c39d62c57558c5a96ba43bd0c9b0511b1
                                                  • Opcode Fuzzy Hash: 010a648192bcce36bee8effdea3a2d5caaaabf17c659dbe5ddbae759b47cf6cc
                                                  • Instruction Fuzzy Hash: E4F0C4B1D00219ABDB019FDAD944AEEFBF8FF99315F10806BE510B7250C7B816058FA8
                                                  APIs
                                                  • GetLastError.KERNEL32(00424098,?,0040187A,00000000,00000000,00000076,?,00000000,00402F22,00000017,00000000,00000000,004033B2,?), ref: 00409C1E
                                                  • wvsprintfA.USER32(?,?,84@), ref: 00409C34
                                                    • Part of subcall function 004097B0: wvsprintfA.USER32(?,?,?), ref: 004097D1
                                                  • SetLastError.KERNEL32(00000000,?,0040187A,00000000,00000000,00000076,?,00000000,00402F22,00000017,00000000,00000000,004033B2,?), ref: 00409C52
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: ErrorLastwvsprintf
                                                  • String ID: 84@
                                                  • API String ID: 2157943386-416276317
                                                  • Opcode ID: 099d9fcfdfd0abb558066334728ce0564fc7f4266850570df45829d0b6ae13cc
                                                  • Instruction ID: 5ad1827fabc9a2481898a3fb1758f903ddd74db165321497a9a6725a78f664e2
                                                  • Opcode Fuzzy Hash: 099d9fcfdfd0abb558066334728ce0564fc7f4266850570df45829d0b6ae13cc
                                                  • Instruction Fuzzy Hash: BDF08276804259EBDB12AF94DC04BEA33ACEB05355F4400B6F900B6295DB78DE88CB9C
                                                  APIs
                                                  • GetDC.USER32(00000000), ref: 00409603
                                                  • GetDeviceCaps.GDI32(00000000,00000058), ref: 00409612
                                                  • ReleaseDC.USER32(00000000,00000000), ref: 00409620
                                                  Strings
                                                  • C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe, xrefs: 00409600
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: CapsDeviceRelease
                                                  • String ID: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
                                                  • API String ID: 127614599-155749501
                                                  • Opcode ID: 1a1ebba51d98459a22b853aa640b42f81edd3dfff86fa16ea8e33b6d1adb7b35
                                                  • Instruction ID: dc34b730860ec105271f22cc56a71c82c41f894b9059c57f30de03ec1e384494
                                                  • Opcode Fuzzy Hash: 1a1ebba51d98459a22b853aa640b42f81edd3dfff86fa16ea8e33b6d1adb7b35
                                                  • Instruction Fuzzy Hash: 90E04F76E42710EBD2245B50ED1DF5BBF54EB19712F40003EF605AA1D4CB769806CB9C
                                                  APIs
                                                  • OleInitialize.OLE32(00000000), ref: 00409320
                                                  • CoCreateInstance.OLE32(0040D9CC,00000000,00000001,0040D91C,?), ref: 00409337
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 004093DB
                                                  • OleUninitialize.OLE32 ref: 0040940B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: ByteCharCreateInitializeInstanceMultiUninitializeWide
                                                  • String ID:
                                                  • API String ID: 2968213145-0
                                                  • Opcode ID: e3d30a5dc041db76ae0ffe594783bd22d1a51641a5756bedbbdc59179d40c081
                                                  • Instruction ID: 9968d1dce90ce409cd03d185e590d58b435a4268f2979d2d6bbbf321111772d5
                                                  • Opcode Fuzzy Hash: e3d30a5dc041db76ae0ffe594783bd22d1a51641a5756bedbbdc59179d40c081
                                                  • Instruction Fuzzy Hash: 9131D7B5A00209EFDF00DFA0C988EAA7B79AF88304F1444A9F905EB291C775DE55DF64
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ya-page.html$ya-page.html
                                                  • API String ID: 0-3785280954
                                                  • Opcode ID: a55ff3d4b88d9528ac417d13ac00c67db43c38f3a10a660d839860c85ccbeb77
                                                  • Instruction ID: 42a8a48695ce9647df0486e4a66efce0a820137707f4b6972cc230aab0cd0772
                                                  • Opcode Fuzzy Hash: a55ff3d4b88d9528ac417d13ac00c67db43c38f3a10a660d839860c85ccbeb77
                                                  • Instruction Fuzzy Hash: 7241F7B1604110AFC720EB28DC89E673BE8AB95348F44453FF640F72D2D73C98868A9D
                                                  APIs
                                                  • IsWindowVisible.USER32(0001044C), ref: 0040A5FB
                                                  • DialogBoxParamA.USER32(GETPASSWORD1,0001044C,00409B69,?,?), ref: 0040A623
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: DialogParamVisibleWindow
                                                  • String ID: GETPASSWORD1
                                                  • API String ID: 3157717868-3292211884
                                                  • Opcode ID: e3ca5bf099fcb78085ab7cfa6dc35946d6707158ce17ab433fbdd83721c44345
                                                  • Instruction ID: b92803b1d29aa7e565dd06d43062644e98e25ac5081392048c50ae78eddeab10
                                                  • Opcode Fuzzy Hash: e3ca5bf099fcb78085ab7cfa6dc35946d6707158ce17ab433fbdd83721c44345
                                                  • Instruction Fuzzy Hash: F30125B26403957BCF308F60AC01A537AB4BB00711B58443AF8C0332D0D67E68A1979E
                                                  APIs
                                                  • FreeLibrary.KERNEL32(00000000,00000000,C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe,0040BCC1), ref: 0040CCB9
                                                  • FreeLibrary.KERNEL32(?,00000000,C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe,0040BCC1), ref: 0040CCC3
                                                  Strings
                                                  • C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe, xrefs: 0040CCA8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.3324911196.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.3324829250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3324975000.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325083284.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.3325224800.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: FreeLibrary
                                                  • String ID: C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
                                                  • API String ID: 3664257935-155749501
                                                  • Opcode ID: c960052bc573e9d22d0eccc5bbfc13a804a57d14caca9005fd91cdeaa639b38c
                                                  • Instruction ID: 704669044e8851c13d82bdc28e6d9538e25662768ad7cea90585f79a98261614
                                                  • Opcode Fuzzy Hash: c960052bc573e9d22d0eccc5bbfc13a804a57d14caca9005fd91cdeaa639b38c
                                                  • Instruction Fuzzy Hash: BEE01232B055209BC720AF69ED84D4BF3EC9FD571030A056BE809F7350CB74EC428AA8
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.3329216015.0000000006BD0000.00000010.00000800.00020000.00000000.sdmp, Offset: 06BD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_6bd0000_mshta.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1a9ce593b8061fe11d005a8fadf4466c64fb9f615bec526e67dbe7247faadaf0
                                                  • Instruction ID: d3fadd55c5fd5dd6de8cce5ebc8c0ee4aa768219fa5b4737226a32ce9e565413
                                                  • Opcode Fuzzy Hash: 1a9ce593b8061fe11d005a8fadf4466c64fb9f615bec526e67dbe7247faadaf0
                                                  • Instruction Fuzzy Hash:

                                                  Execution Graph

                                                  Execution Coverage:4.4%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:2000
                                                  Total number of Limit Nodes:84
                                                  execution_graph 52374 47aa5d 52379 47aa34 GetConsoleMode 52374->52379 52376 47aa6e 52377 47aa72 52376->52377 52378 47aa79 WSAEnumNetworkEvents 52376->52378 52378->52377 52379->52376 52386 426a65 52448 425106 52386->52448 52391 426aa5 52396 426ab5 52391->52396 52473 42ea9b 9 API calls 52391->52473 52392 42f125 strlen 52392->52391 52393 426c16 free free 52397 426c51 52393->52397 52485 43023d 52393->52485 52394 426b07 52394->52393 52475 434708 52394->52475 52396->52394 52401 42f125 strlen 52396->52401 52458 43b899 52397->52458 52402 426ad6 52401->52402 52403 426ae8 52402->52403 52407 42f125 strlen 52402->52407 52474 42a175 195 API calls 52403->52474 52405 426cd5 52410 426ce2 52405->52410 52411 426e0d 52405->52411 52406 426b9f 52406->52393 52478 423ef3 52406->52478 52407->52403 52489 48b5a0 80 API calls 52410->52489 52422 426e24 52411->52422 52490 42ebc7 27 API calls 52411->52490 52416 426c9a 52416->52405 52427 423ef3 2 API calls 52416->52427 52417 426cf9 52420 423ef3 2 API calls 52417->52420 52418 42700b 52423 427019 52418->52423 52498 420f20 40 API calls 52418->52498 52426 426d25 52420->52426 52422->52418 52491 460b8c strlen 52422->52491 52424 427030 52423->52424 52499 424937 105 API calls 52423->52499 52429 427053 52424->52429 52500 403062 148 API calls 52424->52500 52425 426be9 52425->52393 52430 423ef3 2 API calls 52425->52430 52426->52411 52427->52405 52461 423763 52429->52461 52430->52393 52434 426e9d 52437 460b8c 3 API calls 52434->52437 52435 427058 52436 42705d exit 52435->52436 52438 426eb9 52437->52438 52494 429d2c free 52438->52494 52440 426eca 52441 426f14 time 52440->52441 52495 434664 52441->52495 52444 423ef3 2 API calls 52445 426f68 free free 52444->52445 52445->52418 52446 426fa9 52445->52446 52446->52418 52447 423ef3 2 API calls 52446->52447 52447->52418 52449 425118 52448->52449 52450 425189 52449->52450 52501 424eb0 19 API calls 52449->52501 52457 425213 52450->52457 52502 424eb0 19 API calls 52450->52502 52452 425172 52452->52450 52454 460b8c 3 API calls 52452->52454 52454->52450 52455 4251fc 52456 460b8c 3 API calls 52455->52456 52455->52457 52456->52457 52457->52394 52469 42f125 52457->52469 52459 43b8a5 free free free free 52458->52459 52460 426c5c 52458->52460 52459->52460 52460->52405 52488 42e07d 208 API calls 52460->52488 52462 423772 52461->52462 52463 423777 52461->52463 52509 4338a0 102 API calls 52462->52509 52503 424179 52463->52503 52467 423797 52467->52435 52468 423785 fclose 52468->52467 52470 42f16b 52469->52470 52471 426a93 52470->52471 52472 42f134 strlen 52470->52472 52471->52391 52471->52392 52472->52470 52473->52396 52474->52394 52511 47cf40 52475->52511 52477 434720 52477->52406 52479 423f00 52478->52479 52480 423f7f memset 52479->52480 52482 423ff3 52479->52482 52481 423fa1 52480->52481 52481->52482 52483 423fdd exit 52481->52483 52484 480098 8 API calls 52482->52484 52483->52481 52484->52425 52486 43034d 52485->52486 52487 43024d 11 API calls 52485->52487 52486->52397 52487->52486 52488->52416 52489->52417 52490->52422 52517 460b61 52491->52517 52493 460bad 52493->52434 52494->52440 52525 4345f8 52495->52525 52498->52423 52499->52424 52500->52429 52501->52452 52502->52455 52504 424188 52503->52504 52508 4241a6 52503->52508 52505 424199 fclose 52504->52505 52504->52508 52505->52508 52506 42377c 52506->52467 52506->52468 52508->52506 52510 4237a8 free 52508->52510 52509->52463 52510->52508 52512 47cf5d 52511->52512 52513 47cfc4 strlen 52512->52513 52515 47cfdf 52512->52515 52514 47cff1 52513->52514 52513->52515 52514->52515 52516 47cffb strcpy 52514->52516 52515->52477 52516->52515 52520 460a42 52517->52520 52519 460b72 memcpy 52519->52493 52523 466e40 malloc 52520->52523 52522 460a53 52522->52519 52524 466e5a 52523->52524 52524->52522 52532 4664f0 localtime 52525->52532 52528 434612 abort 52529 434617 strftime 52528->52529 52530 426f30 52529->52530 52531 43463d abort 52529->52531 52530->52444 52531->52530 52533 434609 52532->52533 52533->52528 52533->52529 52618 41ef6f 769 API calls 52621 425a72 550 API calls 54809 40b204 54810 40b217 54809->54810 54811 40b37a 54809->54811 54814 40b221 54810->54814 54815 40b312 54810->54815 54812 40b381 54811->54812 54813 40b3a6 54811->54813 54836 40a740 54812->54836 54817 40b3d4 54813->54817 54818 40b3ac 54813->54818 54831 40b274 54814->54831 54835 40b2c5 54814->54835 54854 40b7ba free free free 54814->54854 54815->54811 54856 40b7ba free free free 54815->54856 54819 40b3a1 54817->54819 54821 40b3da 54817->54821 54857 460686 6 API calls 54818->54857 54859 40b841 free free free 54819->54859 54858 409b0b 71 API calls 54821->54858 54822 40b3ba 54825 423ef3 2 API calls 54822->54825 54825->54819 54826 40b2fd 54855 40b841 free free free 54826->54855 54828 40b308 54832 4603aa 7 API calls 54831->54832 54833 40b29d 54832->54833 54834 423ef3 2 API calls 54833->54834 54834->54835 54835->54811 54835->54826 54853 40a76c 54836->54853 54837 40ad1e 54840 40a77b 54837->54840 54866 40adb4 22 API calls 54837->54866 54838 460b8c 3 API calls 54838->54853 54840->54819 54842 47cf40 2 API calls 54842->54853 54843 409b0b 71 API calls 54843->54853 54844 460686 6 API calls 54844->54853 54845 423ef3 memset exit 54845->54853 54846 40ac91 free 54865 4301fe 12 API calls 54846->54865 54848 40acc4 free 54848->54837 54848->54853 54849 40abab _chmod 54849->54853 54850 423ef3 2 API calls 54850->54846 54851 434708 2 API calls 54851->54853 54853->54837 54853->54838 54853->54840 54853->54842 54853->54843 54853->54844 54853->54845 54853->54846 54853->54849 54853->54850 54853->54851 54860 4301fe 12 API calls 54853->54860 54861 43467f time _utime 54853->54861 54854->54814 54855->54828 54856->54815 54857->54822 54858->54828 54859->54828 54860->54853 54862 4346e1 54861->54862 54863 4346b1 54861->54863 54862->54853 54864 423ef3 2 API calls 54863->54864 54864->54862 54865->54848 54866->54840 54909 401409 54910 401423 _amsg_exit 54909->54910 54911 401227 54909->54911 54912 40143d _initterm 54910->54912 54916 40124c 54910->54916 54911->54912 54911->54916 54913 401463 54912->54913 54912->54916 54915 40127e SetUnhandledExceptionFilter 54917 40129f 54915->54917 54916->54913 54930 66fbf0 54916->54930 54918 401322 malloc 54917->54918 54919 40134f 54918->54919 54920 401353 strlen malloc memcpy 54919->54920 54920->54920 54921 40138a 54920->54921 54964 66f700 54921->54964 54923 4013a5 54924 4013e4 54923->54924 54925 4014ab exit 54923->54925 54927 4013f8 54924->54927 54928 4013ee _cexit 54924->54928 54969 66f740 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 54925->54969 54928->54927 54929 4014d2 54931 66fbf9 54930->54931 54933 66fc00 54930->54933 54931->54915 54932 66fcf0 54932->54915 54933->54932 54934 66fcf8 54933->54934 54948 66fc8e 54933->54948 54934->54932 54935 66fd05 54934->54935 54944 66fd2c 54935->54944 54971 66fab0 29 API calls 54935->54971 54936 66fe6a 54973 66fa50 29 API calls 54936->54973 54939 66fe7a 54940 66fee0 54939->54940 54941 66ff50 signal 54939->54941 54942 66fea0 54939->54942 54945 66ff10 signal 54940->54945 54955 66fef2 54940->54955 54956 66ff8f signal 54940->54956 54951 66ff69 signal 54941->54951 54963 66fec8 54941->54963 54949 66ff84 54942->54949 54950 66feab signal 54942->54950 54943 66fd62 VirtualQuery 54953 66fe45 54943->54953 54954 66fd88 VirtualProtect 54943->54954 54944->54932 54944->54943 54958 66ffc0 signal 54945->54958 54945->54963 54946 66fab0 29 API calls 54952 66fdde 54946->54952 54947 66fce0 54970 66fa50 29 API calls 54947->54970 54948->54932 54948->54936 54948->54944 54948->54947 54948->54952 54949->54956 54949->54963 54959 66ffe0 signal 54950->54959 54950->54963 54962 66fecc 54951->54962 54952->54946 54952->54948 54972 66fa50 29 API calls 54953->54972 54954->54944 54955->54941 54955->54963 54960 670000 signal 54956->54960 54956->54963 54958->54962 54959->54962 54960->54962 54962->54915 54963->54945 54963->54962 54965 66f709 54964->54965 54966 66f6b0 54964->54966 54965->54923 54967 66f660 4 API calls 54966->54967 54968 66f6db 54967->54968 54968->54923 54969->54929 54970->54932 54971->54935 54972->54936 54973->54939 55001 42de12 55002 43023d 11 API calls 55001->55002 55003 42de1d 55002->55003 55063 42f58c 55003->55063 55007 42de66 55008 42de8f free 55007->55008 55134 460686 6 API calls 55007->55134 55010 460b8c 3 API calls 55008->55010 55012 42deae 55010->55012 55011 42de7f 55011->55008 55013 42d751 free 55012->55013 55016 42d861 55012->55016 55055 42e979 55013->55055 55017 42d790 55126 43b7a3 memcpy strlen malloc 55017->55126 55019 42d795 55127 43b900 9 API calls 55019->55127 55021 42d951 55025 42d9bc 55021->55025 55129 413add 10 API calls 55021->55129 55022 42d7b4 55024 42f58c 53 API calls 55022->55024 55028 42d7dc 55024->55028 55029 43023d 11 API calls 55025->55029 55030 42dad1 free 55025->55030 55026 42d9a4 55026->55025 55027 423ef3 2 API calls 55026->55027 55027->55025 55128 42fc92 10 API calls 55028->55128 55029->55030 55035 42db1a 55030->55035 55032 42d7fb 55034 423ef3 2 API calls 55032->55034 55036 42d820 free free free 55034->55036 55130 4313cd 19 API calls 55035->55130 55038 43b899 4 API calls 55036->55038 55038->55016 55039 42db33 free 55040 42db63 55039->55040 55041 42db7f 55039->55041 55131 43b900 9 API calls 55040->55131 55132 43b9b9 9 API calls 55041->55132 55044 42db92 free 55045 42f58c 53 API calls 55044->55045 55046 42dbcb 55045->55046 55133 42fc92 10 API calls 55046->55133 55048 42dbea 55049 424617 4 API calls 55048->55049 55050 42dbf8 55049->55050 55051 423ef3 2 API calls 55050->55051 55052 42dc17 55051->55052 55053 42dc2a free free free 55052->55053 55054 43023d 11 API calls 55052->55054 55053->55016 55054->55053 55056 42d783 55055->55056 55057 42e99c 55055->55057 55056->55017 55056->55021 55135 42eada strlen strlen 55057->55135 55059 42e9b4 55059->55056 55136 42f380 strlen strpbrk strspn 55059->55136 55061 42ea80 55061->55056 55137 47d5ac malloc strlen memcpy 55061->55137 55064 42f125 strlen 55063->55064 55067 42f5bb 55064->55067 55065 42f650 55066 42f6c4 strlen 55065->55066 55140 42f019 malloc 55065->55140 55141 42f295 strpbrk 55066->55141 55067->55065 55068 42f5c4 55067->55068 55138 43b6ba 24 API calls 55067->55138 55075 42fc6b free 55068->55075 55119 42de3f strcmp 55068->55119 55071 42f6c1 55071->55066 55072 42f6f3 55077 42f7d3 55072->55077 55078 42f751 strchr 55072->55078 55074 42f63b 55074->55065 55076 42f659 free 55074->55076 55075->55119 55080 460b8c 3 API calls 55076->55080 55142 42f498 strpbrk strchr 55077->55142 55078->55068 55081 42f780 55078->55081 55082 42f67c 55080->55082 55081->55068 55085 42f7a5 strchr 55081->55085 55139 42f019 malloc 55082->55139 55084 42f68f 55084->55065 55086 42f69a free 55084->55086 55085->55068 55087 42f7e5 55085->55087 55086->55065 55087->55068 55098 42f83b 55087->55098 55143 42f498 strpbrk strchr 55087->55143 55088 42f8e3 55091 42f927 55088->55091 55145 42f498 strpbrk strchr 55088->55145 55092 42f96b 55091->55092 55146 42f498 strpbrk strchr 55091->55146 55093 42f9af 55092->55093 55147 42f498 strpbrk strchr 55092->55147 55096 42f9e6 55093->55096 55148 42f2cb memcpy memcpy strlen malloc 55093->55148 55096->55068 55099 460b09 calloc 55096->55099 55098->55068 55098->55088 55144 42f498 strpbrk strchr 55098->55144 55101 42fa0d 55099->55101 55149 4342e2 memcpy memcpy strlen malloc 55101->55149 55103 42fa2b 55150 4342e2 memcpy memcpy strlen malloc 55103->55150 55105 42fa60 55151 42fd4b strrchr memcpy memcpy strlen malloc 55105->55151 55107 42faa2 55108 42fab0 strchr 55107->55108 55109 42fb77 55108->55109 55113 42fad1 55108->55113 55110 42fb8f 55109->55110 55152 4342e2 memcpy memcpy strlen malloc 55109->55152 55112 42fbaf 55110->55112 55153 4342e2 memcpy memcpy strlen malloc 55110->55153 55115 42fbcf 55112->55115 55154 4342e2 memcpy memcpy strlen malloc 55112->55154 55120 42fb02 55113->55120 55121 42fb25 55113->55121 55117 42fbfe 55115->55117 55122 42fc34 55115->55122 55118 42fc20 free 55117->55118 55117->55119 55118->55119 55119->55007 55123 43023d 11 API calls 55120->55123 55121->55109 55124 42fb52 free 55121->55124 55122->55119 55125 460b8c 3 API calls 55122->55125 55123->55068 55124->55109 55125->55119 55126->55019 55127->55022 55128->55032 55129->55026 55130->55039 55131->55041 55132->55044 55133->55048 55134->55011 55135->55059 55136->55061 55137->55056 55138->55074 55139->55084 55140->55071 55141->55072 55142->55087 55143->55098 55144->55088 55145->55091 55146->55092 55147->55093 55148->55096 55149->55103 55150->55105 55151->55107 55152->55110 55153->55112 55154->55115 55156 41ee13 55157 41ee1a 55156->55157 55158 434708 2 API calls 55157->55158 55168 41ee8f 55157->55168 55159 41ee5b 55158->55159 55163 41ee71 55159->55163 55159->55168 55160 41ef3a 55161 42e5e7 6 API calls 55160->55161 55182 41ef43 55160->55182 55164 41ef7d time 55161->55164 55162 41ef4b 55162->55160 55166 434708 2 API calls 55162->55166 55196 419352 10 API calls 55163->55196 55167 434664 4 API calls 55164->55167 55166->55160 55170 41ef91 55167->55170 55168->55160 55168->55162 55171 434708 2 API calls 55168->55171 55169 41ee83 55173 41ffb6 55169->55173 55174 41ff8e free 55169->55174 55177 423ef3 2 API calls 55170->55177 55180 41efbb 55170->55180 55172 41ef1a 55171->55172 55172->55162 55175 41ef1e 55172->55175 55198 419289 40 API calls 55173->55198 55174->55173 55176 41ffab 55174->55176 55197 41a5e1 8 API calls 55175->55197 55181 460b8c 3 API calls 55176->55181 55177->55180 55183 41efe4 55180->55183 55184 41f02f 55180->55184 55187 41f06e 55180->55187 55181->55173 55188 423ef3 2 API calls 55183->55188 55185 423ef3 2 API calls 55184->55185 55186 41f02d 55185->55186 55189 43f01b 7 API calls 55186->55189 55191 41c4b7 719 API calls 55187->55191 55188->55186 55190 41f05c free 55189->55190 55190->55187 55192 41f1ea time 55191->55192 55193 434664 4 API calls 55192->55193 55194 41f201 55193->55194 55194->55169 55195 460b8c 3 API calls 55194->55195 55195->55169 55196->55169 55197->55160 55198->55182 55201 42621e 55202 47d13c 8 API calls 55201->55202 55204 426236 55202->55204 55203 426293 55209 47d13c 8 API calls 55203->55209 55210 4262c3 55203->55210 55204->55203 55206 47d13c 8 API calls 55204->55206 55205 42635a 55208 4263a2 55205->55208 55214 426396 exit 55205->55214 55207 42627b 55206->55207 55315 424b8d 8 API calls 55207->55315 55218 4263c9 exit 55208->55218 55220 4263d5 55208->55220 55209->55210 55210->55205 55212 47d13c 8 API calls 55210->55212 55215 426308 55212->55215 55213 426287 exit 55213->55203 55214->55208 55316 424b8d 8 API calls 55215->55316 55216 42644a 55225 47d13c 8 API calls 55216->55225 55226 426489 55216->55226 55229 4264bf 55216->55229 55217 42641d 55217->55216 55221 47d13c 8 API calls 55217->55221 55218->55220 55220->55216 55220->55217 55223 47d13c 8 API calls 55220->55223 55224 42643e exit 55221->55224 55222 426314 55227 47d13c 8 API calls 55222->55227 55228 426411 exit 55223->55228 55224->55216 55230 42647d exit 55225->55230 55226->55229 55233 47d13c 8 API calls 55226->55233 55231 42632c 55227->55231 55228->55217 55232 4265a2 55229->55232 55238 426538 55229->55238 55239 42656e 55229->55239 55230->55226 55234 47d13c 8 API calls 55231->55234 55235 4265fb 55232->55235 55241 4265c1 55232->55241 55317 43b102 8 API calls 55232->55317 55236 4264b3 exit 55233->55236 55237 42634e exit 55234->55237 55240 42663f 55235->55240 55319 424e4f 23 API calls 55235->55319 55236->55229 55237->55205 55247 426555 free 55238->55247 55245 42658b free 55239->55245 55242 426677 55240->55242 55249 47d13c 8 API calls 55240->55249 55241->55235 55318 43b102 8 API calls 55241->55318 55246 426685 55242->55246 55320 43efb3 27 API calls 55242->55320 55245->55232 55255 42669b 55246->55255 55321 4279e8 strchr strlen strncmp abort 55246->55321 55247->55232 55248 42661a 55248->55240 55252 426633 exit 55248->55252 55253 42666b exit 55249->55253 55252->55240 55253->55242 55256 4266fd 55255->55256 55257 47d13c 8 API calls 55255->55257 55259 424073 17 API calls 55256->55259 55258 4266f1 exit 55257->55258 55258->55256 55260 4267b0 55259->55260 55264 4267be 55260->55264 55322 4335b4 127 API calls 55260->55322 55262 426956 55263 43f281 15 API calls 55262->55263 55265 42695b 55263->55265 55264->55262 55267 464696 6 API calls 55264->55267 55273 42680d 55264->55273 55266 47c7e4 signal 55265->55266 55268 42696f 55266->55268 55269 426869 55267->55269 55272 424896 78 API calls 55268->55272 55275 42697d 55268->55275 55270 426890 _fileno 55269->55270 55271 426877 perror exit 55269->55271 55270->55273 55271->55270 55272->55275 55274 426914 55273->55274 55281 47d13c 8 API calls 55273->55281 55274->55262 55284 47d13c 8 API calls 55274->55284 55276 426cd5 55275->55276 55323 42e07d 208 API calls 55275->55323 55277 426ce2 55276->55277 55278 426e0d 55276->55278 55324 48b5a0 80 API calls 55277->55324 55293 426e24 55278->55293 55325 42ebc7 27 API calls 55278->55325 55283 426908 exit 55281->55283 55282 426cf9 55289 423ef3 2 API calls 55282->55289 55283->55274 55287 42694a exit 55284->55287 55285 42700b 55288 427019 55285->55288 55327 420f20 40 API calls 55285->55327 55287->55262 55292 427030 55288->55292 55328 424937 105 API calls 55288->55328 55294 426d25 55289->55294 55290 426c9a 55290->55276 55295 423ef3 2 API calls 55290->55295 55297 427053 55292->55297 55329 403062 148 API calls 55292->55329 55293->55285 55298 460b8c 3 API calls 55293->55298 55294->55278 55295->55276 55300 423763 105 API calls 55297->55300 55301 426e9d 55298->55301 55302 427058 55300->55302 55304 460b8c 3 API calls 55301->55304 55303 42705d exit 55302->55303 55305 426eb9 55304->55305 55326 429d2c free 55305->55326 55307 426eca 55308 426f14 time 55307->55308 55309 434664 4 API calls 55308->55309 55310 426f30 55309->55310 55311 423ef3 2 API calls 55310->55311 55312 426f68 free free 55311->55312 55312->55285 55313 426fa9 55312->55313 55313->55285 55314 423ef3 2 API calls 55313->55314 55314->55285 55315->55213 55316->55222 55317->55241 55318->55235 55319->55248 55320->55246 55321->55255 55322->55264 55323->55290 55324->55282 55325->55293 55326->55307 55327->55288 55328->55292 55329->55297 55379 402429 55380 40242c 55379->55380 55382 402566 55380->55382 55383 43f5f7 55380->55383 55384 43f612 55383->55384 55385 43f6bb 55384->55385 55386 47d13c 8 API calls 55384->55386 55385->55380 55387 43f691 55386->55387 55388 43f6b6 abort 55387->55388 55388->55385 55390 423c2f 25 API calls 55406 607610 55424 56db30 EnterCriticalSection 55406->55424 55408 607630 55409 607780 55408->55409 55422 60763a 55408->55422 55434 53d6f0 malloc 55409->55434 55411 607794 55420 6076ee 55411->55420 55435 51b0f0 free malloc memmove 55411->55435 55413 607770 55415 6077a6 55436 51e160 9 API calls 55415->55436 55433 56db50 LeaveCriticalSection 55420->55433 55422->55415 55422->55420 55425 56d1a0 malloc 55422->55425 55426 53d840 55422->55426 55430 56d390 memmove 55422->55430 55431 56d640 free memmove 55422->55431 55432 51ab20 9 API calls 55422->55432 55424->55408 55425->55422 55427 53d864 55426->55427 55429 53d8d1 55426->55429 55428 53fea0 free 55427->55428 55427->55429 55428->55429 55429->55422 55430->55422 55431->55422 55432->55422 55433->55413 55434->55411 55435->55415 55436->55420 55437 41da32 127 API calls 55489 41ef6f 771 API calls 52368 41f0d0 761 API calls 52535 412ee8 52536 412ef8 52535->52536 52559 412899 52536->52559 52539 412f57 52548 412f9d 52539->52548 52578 485b10 wcstombs FormatMessageW 52539->52578 52540 412fa7 52562 412608 52540->52562 52544 412f72 52546 423ef3 2 API calls 52544->52546 52545 412fcb 52547 423ef3 2 API calls 52545->52547 52546->52548 52547->52548 52549 413103 52549->52548 52580 412c22 7 API calls 52549->52580 52551 412fe9 52558 413037 52551->52558 52579 43a5b5 7 API calls 52551->52579 52553 4130d1 52554 4130ef 52553->52554 52568 423bc1 52553->52568 52555 423bc1 25 API calls 52554->52555 52555->52549 52557 423bc1 25 API calls 52557->52558 52558->52549 52558->52553 52558->52557 52581 43f39c 52559->52581 52563 41261d 52562->52563 52567 41264b 52563->52567 52600 460b09 52563->52600 52565 412669 52566 460a42 malloc 52565->52566 52566->52567 52567->52545 52567->52551 52569 423bce 52568->52569 52576 423cb7 52569->52576 52605 47d344 ferror 52569->52605 52572 423c95 52573 423ca9 52572->52573 52615 423adc 16 API calls 52572->52615 52573->52576 52616 423e4d fflush fflush 52573->52616 52574 47d344 7 API calls 52574->52572 52576->52554 52578->52544 52579->52558 52580->52548 52582 43f3bc 52581->52582 52583 43f40a CreateThread 52582->52583 52585 43f3e2 52582->52585 52583->52585 52586 43f477 52583->52586 52598 43f355 52583->52598 52584 4128dd 52584->52539 52584->52540 52590 401870 52585->52590 52593 41284e getaddrinfo 52585->52593 52587 43f50d CloseHandle 52586->52587 52587->52584 52594 461869 52590->52594 52592 40189d 52592->52584 52593->52584 52595 46187a 52594->52595 52596 461897 connect 52595->52596 52597 461883 52595->52597 52596->52597 52597->52592 52599 43f371 52598->52599 52601 460b1c 52600->52601 52602 460b36 calloc 52601->52602 52603 460b57 52601->52603 52602->52603 52604 460b51 52602->52604 52603->52565 52604->52603 52606 47d370 fputs 52605->52606 52607 47d359 fputs 52605->52607 52608 423c7d 52606->52608 52610 47d39c 52606->52610 52607->52608 52608->52572 52608->52574 52610->52608 52611 47d3aa ferror 52610->52611 52611->52608 52612 47d3b9 _fileno 52611->52612 52612->52608 52613 47d3cd 52612->52613 52613->52608 52617 485a9e exit raise 52613->52617 52615->52573 52616->52576 52617->52608 52624 4258f6 52787 421602 52624->52787 52627 47d13c 8 API calls 52628 425933 exit 52627->52628 52629 42593f 52628->52629 52631 425990 52629->52631 52802 421835 memset getenv 52629->52802 52632 47d13c 8 API calls 52631->52632 52635 425e3e 52631->52635 52632->52635 52633 425f3b 52634 425f7d 52633->52634 52639 47d13c 8 API calls 52633->52639 52642 47d13c 8 API calls 52634->52642 52645 425fbf 52634->52645 52635->52633 52636 47d13c 8 API calls 52635->52636 52637 425f23 52636->52637 52883 424b8d 8 API calls 52637->52883 52638 4260cb 52647 4260f9 52638->52647 52652 47d13c 8 API calls 52638->52652 52658 4261e2 52638->52658 52641 425f65 52639->52641 52884 424b8d 8 API calls 52641->52884 52648 425fa7 52642->52648 52643 425f2f exit 52643->52633 52644 426026 52660 426054 52644->52660 52661 423ef3 2 API calls 52644->52661 52645->52638 52645->52644 52650 47d344 7 API calls 52645->52650 52649 426121 52647->52649 52655 47d13c 8 API calls 52647->52655 52885 424b8d 8 API calls 52648->52885 52656 426155 52649->52656 52663 47d13c 8 API calls 52649->52663 52659 42600e 52650->52659 52651 425f71 exit 52651->52634 52652->52647 52654 425fb3 exit 52654->52645 52655->52649 52669 426185 52656->52669 52670 47d13c 8 API calls 52656->52670 52657 426293 52676 47d13c 8 API calls 52657->52676 52677 4262c3 52657->52677 52658->52657 52668 47d13c 8 API calls 52658->52668 52886 424b8d 8 API calls 52659->52886 52662 426079 52660->52662 52665 423ef3 2 API calls 52660->52665 52661->52660 52662->52638 52672 434708 2 API calls 52662->52672 52667 426149 exit 52663->52667 52665->52662 52666 42635a 52674 4263a2 52666->52674 52684 426396 exit 52666->52684 52667->52656 52673 42627b 52668->52673 52675 4261cd 52669->52675 52680 47d13c 8 API calls 52669->52680 52670->52669 52671 42601a exit 52671->52644 52678 42609e 52672->52678 52887 424b8d 8 API calls 52673->52887 52689 4263c9 exit 52674->52689 52692 4263d5 52674->52692 52675->52658 52681 460b8c 3 API calls 52675->52681 52676->52677 52677->52666 52682 47d13c 8 API calls 52677->52682 52678->52638 52687 423ef3 2 API calls 52678->52687 52680->52675 52681->52658 52685 426308 52682->52685 52683 426287 exit 52683->52657 52684->52674 52888 424b8d 8 API calls 52685->52888 52686 42644a 52694 426489 52686->52694 52698 47d13c 8 API calls 52686->52698 52704 4264bf 52686->52704 52691 4260bf exit 52687->52691 52688 42641d 52688->52686 52693 47d13c 8 API calls 52688->52693 52689->52692 52691->52638 52692->52686 52692->52688 52696 47d13c 8 API calls 52692->52696 52697 42643e exit 52693->52697 52694->52704 52705 47d13c 8 API calls 52694->52705 52695 426314 52699 47d13c 8 API calls 52695->52699 52700 426411 exit 52696->52700 52697->52686 52701 42647d exit 52698->52701 52702 42632c 52699->52702 52700->52688 52701->52694 52706 47d13c 8 API calls 52702->52706 52703 4265a2 52707 4265fb 52703->52707 52713 4265c1 52703->52713 52889 43b102 8 API calls 52703->52889 52704->52703 52710 426538 52704->52710 52711 42656e 52704->52711 52708 4264b3 exit 52705->52708 52709 42634e exit 52706->52709 52712 42663f 52707->52712 52891 424e4f 23 API calls 52707->52891 52708->52704 52709->52666 52719 426555 free 52710->52719 52717 42658b free 52711->52717 52714 426677 52712->52714 52721 47d13c 8 API calls 52712->52721 52713->52707 52890 43b102 8 API calls 52713->52890 52718 426685 52714->52718 52892 43efb3 27 API calls 52714->52892 52717->52703 52727 42669b 52718->52727 52893 4279e8 strchr strlen strncmp abort 52718->52893 52719->52703 52720 42661a 52720->52712 52724 426633 exit 52720->52724 52725 42666b exit 52721->52725 52724->52712 52725->52714 52728 4266fd 52727->52728 52729 47d13c 8 API calls 52727->52729 52833 424073 52728->52833 52730 4266f1 exit 52729->52730 52730->52728 52733 4267be 52735 426956 52733->52735 52745 42680d 52733->52745 52841 464696 strcmp 52733->52841 52855 43f281 WSAStartup 52735->52855 52737 42695b 52866 47c7e4 52737->52866 52741 426869 52742 426890 _fileno 52741->52742 52743 426877 perror exit 52741->52743 52742->52745 52743->52742 52746 426914 52745->52746 52753 47d13c 8 API calls 52745->52753 52746->52735 52852 47d13c 52746->52852 52747 42697d 52748 426cd5 52747->52748 52895 42e07d 208 API calls 52747->52895 52749 426ce2 52748->52749 52750 426e0d 52748->52750 52896 48b5a0 80 API calls 52749->52896 52765 426e24 52750->52765 52897 42ebc7 27 API calls 52750->52897 52755 426908 exit 52753->52755 52754 426cf9 52761 423ef3 2 API calls 52754->52761 52755->52746 52757 42700b 52760 427019 52757->52760 52899 420f20 40 API calls 52757->52899 52764 427030 52760->52764 52900 424937 105 API calls 52760->52900 52766 426d25 52761->52766 52762 426c9a 52762->52748 52767 423ef3 2 API calls 52762->52767 52769 427053 52764->52769 52901 403062 148 API calls 52764->52901 52765->52757 52770 460b8c 3 API calls 52765->52770 52766->52750 52767->52748 52772 423763 105 API calls 52769->52772 52773 426e9d 52770->52773 52774 427058 52772->52774 52776 460b8c 3 API calls 52773->52776 52775 42705d exit 52774->52775 52777 426eb9 52776->52777 52898 429d2c free 52777->52898 52779 426eca 52780 426f14 time 52779->52780 52781 434664 4 API calls 52780->52781 52782 426f30 52781->52782 52783 423ef3 2 API calls 52782->52783 52784 426f68 free free 52783->52784 52784->52757 52785 426fa9 52784->52785 52785->52757 52786 423ef3 2 API calls 52785->52786 52786->52757 52902 434a31 52787->52902 52791 421688 52793 42180b free fclose 52791->52793 52797 4217c3 free free 52791->52797 52799 47d13c 8 API calls 52791->52799 52800 4217ba abort 52791->52800 52916 421a7b 6 API calls 52791->52916 52917 421d16 8 API calls 52791->52917 52918 460686 6 API calls 52791->52918 52919 464834 realloc fgetc realloc 52791->52919 52792 421641 52794 47d13c 8 API calls 52792->52794 52795 421681 52793->52795 52794->52795 52795->52627 52795->52629 52797->52791 52799->52791 52800->52791 52803 4218e4 52802->52803 52804 42186f 52802->52804 52805 434708 2 API calls 52803->52805 52806 434708 2 API calls 52804->52806 52807 4218f7 52805->52807 52808 421881 52806->52808 52809 42190e 52807->52809 52810 421602 44 API calls 52807->52810 52808->52803 52812 421602 44 API calls 52808->52812 52811 42195c 52809->52811 52813 47d13c 8 API calls 52809->52813 52810->52809 52920 42156b 52811->52920 52815 421897 52812->52815 52816 421950 exit 52813->52816 52815->52809 52820 47d13c 8 API calls 52815->52820 52816->52811 52818 421a25 52818->52631 52819 42196e strcmp 52821 421985 52819->52821 52822 4219ba 52819->52822 52823 4218d8 exit 52820->52823 52932 460686 6 API calls 52821->52932 52824 434708 2 API calls 52822->52824 52823->52803 52826 4219cc 52824->52826 52829 4219b8 52826->52829 52830 421602 44 API calls 52826->52830 52827 421990 52828 47d13c 8 API calls 52827->52828 52828->52829 52831 421a10 free 52829->52831 52832 421a04 exit 52829->52832 52830->52829 52831->52818 52832->52831 52834 42413f _fileno _isatty 52833->52834 52835 424089 52833->52835 52837 42409c 52834->52837 52836 464696 6 API calls 52835->52836 52835->52837 52838 4240d9 52836->52838 52837->52733 52894 4335b4 127 API calls 52837->52894 52838->52837 52839 47d13c 8 API calls 52838->52839 52840 424127 exit 52839->52840 52840->52837 52842 4646b3 52841->52842 52843 4646ba strlen 52841->52843 52842->52843 52844 4646d2 52843->52844 52845 4647c3 52843->52845 52844->52845 52847 4646e7 52844->52847 52965 46467c fopen 52845->52965 52851 4646f9 52847->52851 52966 468a51 _open strcmp 52847->52966 52849 464723 52850 464780 _fdopen 52849->52850 52849->52851 52850->52851 52851->52741 52967 47d18f ferror 52852->52967 52856 43f2e7 52855->52856 52857 43f2b9 52855->52857 52859 43f328 52856->52859 52862 47d13c 8 API calls 52856->52862 52858 47d13c 8 API calls 52857->52858 52861 43f2db exit 52858->52861 52981 66f660 52859->52981 52861->52856 52863 43f315 exit 52862->52863 52863->52859 52865 43f334 52865->52737 52867 47c7f0 52866->52867 52868 42696f 52866->52868 52867->52868 52992 47c439 signal 52867->52992 52868->52747 52870 424896 52868->52870 52871 424934 52870->52871 52872 4248a9 52870->52872 52871->52747 52993 424836 52872->52993 52875 42490e 52877 423ef3 2 API calls 52875->52877 52876 4248b7 53001 413dd4 52876->53001 52879 424922 free 52877->52879 52879->52871 52883->52643 52884->52651 52885->52654 52886->52671 52887->52683 52888->52695 52889->52713 52890->52707 52891->52720 52892->52718 52893->52727 52894->52733 52895->52762 52896->52754 52897->52765 52898->52779 52899->52760 52900->52764 52901->52769 52903 464696 6 API calls 52902->52903 52904 434a49 52903->52904 52905 434a52 52904->52905 52906 434a77 _fileno 52904->52906 52907 423ef3 2 API calls 52905->52907 52908 434a8b 52906->52908 52909 434ab8 memset 52906->52909 52913 421638 52907->52913 52910 423ef3 2 API calls 52908->52910 52912 434ae5 52909->52912 52911 434aa6 fclose 52910->52911 52911->52913 52912->52913 52914 423ef3 2 API calls 52912->52914 52913->52791 52913->52792 52915 434b05 fclose 52914->52915 52915->52913 52916->52791 52917->52791 52918->52791 52919->52791 52933 42144c getenv 52920->52933 52925 421588 52925->52818 52925->52819 52927 4215a0 52927->52925 52928 434708 2 API calls 52927->52928 52929 4215d2 52928->52929 52930 4215eb free 52929->52930 52931 4215d9 free 52929->52931 52930->52925 52931->52930 52932->52827 52934 421467 52933->52934 52939 4214da 52933->52939 52935 434708 2 API calls 52934->52935 52934->52939 52936 421482 52935->52936 52937 4214cf 52936->52937 52940 47d13c 8 API calls 52936->52940 52938 460b8c 3 API calls 52937->52938 52938->52939 52939->52925 52942 4214e3 52939->52942 52941 4214c3 exit 52940->52941 52941->52937 52957 4213d9 52942->52957 52944 421514 free 52946 421533 52944->52946 52947 42152c 52944->52947 52945 4214f5 52945->52944 52948 434708 2 API calls 52946->52948 52947->52925 52951 43f195 52947->52951 52949 421546 52948->52949 52949->52947 52950 42154d free 52949->52950 52950->52947 52952 43f1ed 52951->52952 52953 43f1ab 52951->52953 52952->52927 52953->52952 52954 43f1f4 strrchr 52953->52954 52954->52952 52955 43f21a 52954->52955 52956 460b8c 3 API calls 52955->52956 52956->52952 52958 4213e8 getenv 52957->52958 52963 421407 52957->52963 52959 421402 52958->52959 52958->52963 52962 43f195 4 API calls 52959->52962 52960 460b8c 3 API calls 52964 421422 free 52960->52964 52962->52963 52963->52960 52963->52964 52964->52945 52965->52851 52966->52849 52968 47d1a4 52967->52968 52969 47d1c2 52967->52969 52978 47d0e8 EnterCriticalSection _lock LeaveCriticalSection 52968->52978 52979 47d0e8 EnterCriticalSection _lock LeaveCriticalSection 52969->52979 52971 42694a exit 52971->52735 52973 47d1ec 52973->52971 52974 47d203 ferror 52973->52974 52974->52971 52975 47d212 _fileno 52974->52975 52975->52971 52976 47d226 52975->52976 52976->52971 52980 485a9e exit raise 52976->52980 52978->52971 52979->52973 52980->52971 52984 66f5a0 52981->52984 52983 66f66f 52983->52865 52985 66f5b1 52984->52985 52986 66f640 _onexit 52985->52986 52987 66f5be _lock 52985->52987 52986->52983 52988 66f5d7 52987->52988 52989 66f5e8 __dllonexit 52988->52989 52990 66f616 52989->52990 52991 66f627 _unlock 52990->52991 52991->52983 52992->52868 52994 424854 52993->52994 52995 424845 52993->52995 52997 4213d9 6 API calls 52994->52997 52996 460b8c 3 API calls 52995->52996 52998 424852 52996->52998 52999 424859 52997->52999 52998->52875 52998->52876 52999->52998 53000 424875 free 52999->53000 53000->52998 53002 460b09 calloc 53001->53002 53003 413df5 53002->53003 53027 411ba2 53003->53027 53005 413e14 53028 460a42 malloc 53027->53028 53029 411bb4 53028->53029 53038 411b5c 53029->53038 53032 460a42 malloc 53033 411c6d memset 53032->53033 53033->53005 53039 411b6c 53038->53039 53040 411b9b abort 53039->53040 53041 411b7b 53039->53041 53040->53041 53041->53032 53043 41f4fb 53044 41f50e 53043->53044 53045 423ef3 2 API calls 53044->53045 53047 41f52c 53045->53047 53046 41ef6f 53048 41f21c 53046->53048 53080 42e5e7 53046->53080 53047->53046 53428 42eb7f 24 API calls 53047->53428 53054 41ffb6 53048->53054 53056 41ff8e free 53048->53056 53051 41f598 53053 423ef3 2 API calls 53051->53053 53057 41f5ac 53053->53057 53429 419289 40 API calls 53054->53429 53055 434664 4 API calls 53058 41ef91 53055->53058 53056->53054 53059 41ffab 53056->53059 53063 423bc1 25 API calls 53057->53063 53065 423ef3 2 API calls 53058->53065 53066 41efbb 53058->53066 53061 460b8c 3 API calls 53059->53061 53061->53054 53062 41ffcb 53064 41f62e free 53063->53064 53064->53046 53064->53048 53065->53066 53067 41efe4 53066->53067 53068 41f02f 53066->53068 53071 41f06e 53066->53071 53072 423ef3 2 API calls 53067->53072 53069 423ef3 2 API calls 53068->53069 53070 41f02d 53069->53070 53095 43f01b free free strlen 53070->53095 53101 41c4b7 53071->53101 53072->53070 53074 41f05c free 53074->53071 53077 434664 4 API calls 53078 41f201 53077->53078 53078->53048 53079 460b8c 3 API calls 53078->53079 53079->53048 53081 42e602 53080->53081 53091 41ef7d time 53080->53091 53082 42e61e 53081->53082 53086 42e65a 53081->53086 53083 42e630 53082->53083 53084 42e647 53082->53084 53430 43e8d8 Sleep Sleep 53083->53430 53431 43e8d8 Sleep Sleep 53084->53431 53085 42e682 53432 43e8d8 Sleep Sleep 53085->53432 53086->53085 53089 42e692 53086->53089 53086->53091 53433 439cb4 time _getpid srand rand 53089->53433 53091->53055 53093 42e697 53434 43e8d8 Sleep Sleep 53093->53434 53096 460a42 malloc 53095->53096 53097 43f065 53096->53097 53098 460b8c 3 API calls 53097->53098 53099 43f075 53098->53099 53100 43f0a3 SetConsoleTitleA 53099->53100 53100->53074 53103 41c582 53101->53103 53102 41c5f5 free 53500 41977d 53102->53500 53103->53102 53435 43f8f3 53103->53435 53107 41c5c9 53111 423ef3 2 API calls 53107->53111 53108 41ec51 free free free 53782 418152 53108->53782 53340 41c5e9 53111->53340 53118 41eca9 time 53118->53077 53121 41c882 53122 41c8a2 53121->53122 53124 41c89b 53121->53124 53125 402c9b 25 API calls 53122->53125 53123 41ca98 53126 41cab8 53123->53126 53130 41cab1 53123->53130 53804 419089 27 API calls 53124->53804 53125->53340 53127 402c9b 25 API calls 53126->53127 53132 41cab6 53127->53132 53823 419089 27 API calls 53130->53823 53135 41cad6 fclose 53132->53135 53132->53340 53133 41ca4b 53224 41c6db 53133->53224 53821 6720c0 fgetpos 53133->53821 53822 417855 19 API calls 53133->53822 53135->53340 53141 41cc2b 53146 41cc90 53141->53146 53147 41cc38 53141->53147 53154 423ef3 2 API calls 53146->53154 53149 423bc1 25 API calls 53147->53149 53152 41cc4c 53149->53152 53150 41cbcc 53153 41cbec 53150->53153 53157 41cbe5 53150->53157 53156 41cc6c 53152->53156 53161 41cc65 53152->53161 53158 402c9b 25 API calls 53153->53158 53159 41ccb6 53154->53159 53155 41cd69 time 53160 434664 4 API calls 53155->53160 53163 402c9b 25 API calls 53156->53163 53827 419089 27 API calls 53157->53827 53158->53340 53164 41ccd6 53159->53164 53168 41cccf 53159->53168 53165 41cd7d 53160->53165 53828 419089 27 API calls 53161->53828 53163->53340 53171 402c9b 25 API calls 53164->53171 53169 423ef3 2 API calls 53165->53169 53166 41ce2e free 53170 418152 2 API calls 53166->53170 53829 419089 27 API calls 53168->53829 53174 41cd9e 53169->53174 53170->53224 53171->53340 53172 41ce7c free 53175 460b8c 3 API calls 53172->53175 53176 4603aa 7 API calls 53174->53176 53175->53224 53177 41cdb2 53176->53177 53179 423ef3 2 API calls 53177->53179 53178 423ef3 memset exit 53178->53224 53181 41cddb 53179->53181 53180 4603aa 7 API calls 53180->53224 53183 41cdfb 53181->53183 53184 41cdf4 53181->53184 53185 402c9b 25 API calls 53183->53185 53830 419089 27 API calls 53184->53830 53185->53340 53187 417e55 strlen memcpy 53187->53224 53191 41d60b 53707 41a719 53191->53707 53193 41d27f free 53196 41d2ac 53193->53196 53193->53340 53194 41d221 53194->53193 53206 460b8c 3 API calls 53194->53206 53195 417ed1 5 API calls 53195->53224 53199 41d2cc 53196->53199 53202 41d2c5 53196->53202 53198 41d115 memcpy 53833 4055fc 89 API calls 53198->53833 53203 402c9b 25 API calls 53199->53203 53839 419089 27 API calls 53202->53839 53203->53340 53204 41d676 53209 460b8c 3 API calls 53204->53209 53205 41d68c 53210 41d698 53205->53210 53211 41d6ae 53205->53211 53212 41d277 53206->53212 53207 41d3a3 free 53213 41d3ce 53207->53213 53207->53224 53221 41d682 53209->53221 53217 460b8c 3 API calls 53210->53217 53214 460b8c 3 API calls 53211->53214 53212->53193 53215 41d3ee 53213->53215 53218 41d3e7 53213->53218 53214->53221 53219 402c9b 25 API calls 53215->53219 53217->53221 53840 419089 27 API calls 53218->53840 53219->53340 53227 417ed1 5 API calls 53221->53227 53248 41d76b 53221->53248 53223 419089 27 API calls 53223->53224 53224->53121 53224->53123 53224->53133 53224->53141 53224->53150 53224->53155 53224->53166 53224->53172 53224->53178 53224->53180 53224->53187 53224->53191 53224->53194 53224->53195 53224->53198 53224->53207 53224->53213 53224->53223 53225 41d592 free 53224->53225 53226 402c9b 25 API calls 53224->53226 53224->53340 53572 419f22 53224->53572 53670 41734d strlen strlen 53224->53670 53687 417b0b 53224->53687 53690 417b36 53224->53690 53785 405bee 19 API calls 53224->53785 53786 417078 53224->53786 53795 4171b0 12 API calls 53224->53795 53796 419e8f 11 API calls 53224->53796 53797 433903 53224->53797 53805 402126 memset abort memset abort 53224->53805 53806 402aef 53224->53806 53810 6720c0 fgetpos 53224->53810 53811 47d4c9 ferror 53224->53811 53824 43289d time strftime gmtime 53224->53824 53825 432a2f time _getpid srand rand 53224->53825 53826 43397c 96 API calls 53224->53826 53831 418253 10 API calls 53224->53831 53832 671290 8 API calls 53224->53832 53834 417cdb 53224->53834 53838 4190fc 30 API calls 53224->53838 53841 418599 16 API calls 53224->53841 53842 41a97a 102 API calls 53224->53842 53229 418152 2 API calls 53225->53229 53226->53224 53230 41d6f4 53227->53230 53233 41d5b8 free free 53229->53233 53843 418ef3 10 API calls 53230->53843 53231 41d844 strchr 53232 41d8df 53231->53232 53242 41d860 53231->53242 53235 417ed1 5 API calls 53232->53235 53233->53224 53237 41d8f5 53235->53237 53236 41d71c 53236->53248 53844 413c37 19 API calls 53236->53844 53238 417ed1 5 API calls 53237->53238 53240 41d913 53238->53240 53241 41d93b 53240->53241 53243 417ed1 5 API calls 53240->53243 53242->53232 53845 43b01c 12 API calls 53242->53845 53243->53241 53247 41d8b2 53249 41d8cd free 53247->53249 53846 43b9b9 9 API calls 53247->53846 53725 417ed1 53248->53725 53249->53232 53340->53108 53428->53051 53429->53062 53430->53091 53431->53091 53432->53091 53433->53093 53434->53091 53436 43f909 53435->53436 53437 43f915 53435->53437 54024 4f6ee0 10 API calls 53436->54024 53497 41c5c2 53437->53497 53879 43f708 53437->53879 53443 43f957 53903 4f60a0 53443->53903 53444 43f93e 53445 423ef3 2 API calls 53444->53445 53498 43f952 53445->53498 53449 43fd46 54039 43f798 43 API calls 53449->54039 53454 43f97d 53942 4a11d0 53454->53942 53456 43f999 53457 4a11d0 9 API calls 53456->53457 53458 43f9b5 53457->53458 53459 423ef3 2 API calls 53458->53459 53460 43fa18 53459->53460 53461 423ef3 2 API calls 53460->53461 53462 43fa2c abort 53461->53462 53463 43fa31 53462->53463 53949 4a5bc0 53463->53949 53465 43fa3c 53466 43fa87 53465->53466 53465->53498 54025 4a5570 12 API calls 53465->54025 53497->53102 53497->53107 53498->53449 54038 4a60d0 12 API calls 53498->54038 53501 4197a9 53500->53501 53502 4197e6 53501->53502 53503 4197d4 53501->53503 54195 42ff39 7 API calls 53502->54195 53505 460b8c 3 API calls 53503->53505 53506 4197e1 53505->53506 54177 416f88 53506->54177 53509 417078 7 API calls 53510 41982e 53509->53510 53511 419880 53510->53511 53512 417078 7 API calls 53510->53512 53522 41991d 53511->53522 54196 4196b5 memset exit gmtime 53511->54196 53515 41985d 53512->53515 53514 419972 53517 4199bb 53514->53517 53518 41997b 53514->53518 53519 417078 7 API calls 53515->53519 53516 4198af 53520 4198cc 53516->53520 53523 423bc1 25 API calls 53516->53523 53521 4199b9 53517->53521 53525 417078 7 API calls 53517->53525 53527 417078 7 API calls 53518->53527 53519->53511 53524 460b8c 3 API calls 53520->53524 53526 417078 7 API calls 53521->53526 53522->53514 53530 417078 7 API calls 53522->53530 53523->53520 53528 4198fc 53524->53528 53525->53521 53529 419a0e 53526->53529 53527->53521 53531 417078 7 API calls 53528->53531 53532 419a18 53529->53532 53533 419a3d 53529->53533 53530->53514 53531->53522 53535 417078 7 API calls 53532->53535 53534 417078 7 API calls 53533->53534 53536 419a3b 53534->53536 53535->53536 53539 419b87 53536->53539 54182 4270ae 53536->54182 53537 419bd3 53540 419bee strchr 53537->53540 53539->53537 54197 4176e3 14 API calls 53539->54197 53542 419c4c 53540->53542 53543 417078 7 API calls 53542->53543 53544 419c6d 53543->53544 53545 419c73 53544->53545 53546 419c98 53544->53546 53548 417078 7 API calls 53545->53548 53547 417078 7 API calls 53546->53547 53549 419cbb 53547->53549 53553 419c96 53548->53553 53550 417078 7 API calls 53549->53550 53549->53553 53550->53553 53551 419dc4 53551->53224 53552 419d07 53554 417078 7 API calls 53552->53554 53553->53551 53553->53552 53558 419e16 53553->53558 53555 419d2a 53554->53555 53556 419d33 strlen 53555->53556 53557 419d52 53555->53557 53559 419dd7 53556->53559 54198 43477f 14 API calls 53557->54198 53558->53551 53561 417078 7 API calls 53558->53561 53563 460b8c 3 API calls 53559->53563 53561->53551 53562 419d5f 53562->53559 53566 419d7d 53562->53566 53564 419df3 53563->53564 53565 417078 7 API calls 53564->53565 53565->53551 54199 460686 6 API calls 53566->54199 53568 419d9d 53569 423ef3 2 API calls 53568->53569 53570 419db9 53569->53570 54200 417648 7 API calls 53570->54200 53573 419f59 53572->53573 53574 41a089 53572->53574 54244 41917c 47 API calls 53573->54244 53595 41a0c3 53574->53595 54202 401d26 53574->54202 53577 419fa3 53578 41a08b 53577->53578 53579 419fab 53577->53579 53578->53574 53581 41a092 53578->53581 54245 4022ae memset abort 53579->54245 54247 460686 6 API calls 53581->54247 53582 41a503 53582->53595 54215 440184 53582->54215 53583 419fc0 53585 41a015 53583->53585 53586 419fdc 53583->53586 53588 4603aa 7 API calls 53585->53588 53590 4603aa 7 API calls 53586->53590 53587 41a0a0 53591 423ef3 2 API calls 53587->53591 53592 41a030 53588->53592 53596 419ff7 53590->53596 53591->53595 53597 423ef3 2 API calls 53592->53597 53593 41a0fc 53593->53582 53593->53595 53598 416f88 2 API calls 53593->53598 53594 41a52f 53595->53224 53601 423ef3 2 API calls 53596->53601 53603 41a013 53597->53603 53604 41a187 53598->53604 53601->53603 53603->53574 54246 41729c free free free free memmove 53603->54246 53607 41a1d3 53604->53607 53608 41a193 53604->53608 53612 41a1d1 53607->53612 53616 417078 7 API calls 53607->53616 53620 417078 7 API calls 53608->53620 53613 41a22d 53612->53613 53617 417078 7 API calls 53612->53617 53622 417078 7 API calls 53613->53622 53616->53612 53617->53613 53620->53612 53623 41a277 53622->53623 53624 41734d 25 API calls 53623->53624 53625 41a291 53624->53625 54248 417648 7 API calls 53625->54248 53627 41a29f 53628 41a2a5 53627->53628 53629 41a2db 53627->53629 53631 41a2bf 53628->53631 53634 41a2b8 53628->53634 53630 417b0b 12 API calls 53629->53630 53633 41a2e6 53630->53633 53632 402c9b 25 API calls 53631->53632 53632->53595 53635 41a348 53633->53635 53636 41a2ef 53633->53636 54249 419089 27 API calls 53634->54249 53671 4173d4 53670->53671 53672 41738f strlen strlen 53671->53672 53673 4173df 53671->53673 53672->53671 53674 460a42 malloc 53673->53674 53675 4173ee strlen memcpy strlen memcpy memcpy 53674->53675 53676 41754c 53675->53676 53677 41755b 53676->53677 53678 41749e strlen memcpy strlen memcpy 53676->53678 53679 402aef 3 API calls 53677->53679 53678->53676 53680 4175c2 53679->53680 53681 4175f0 53680->53681 53682 4175cb 53680->53682 53683 41762d free 53681->53683 53684 47d4c9 7 API calls 53681->53684 53685 423ef3 2 API calls 53682->53685 53683->53224 53686 4175ee 53684->53686 53685->53686 53686->53683 54370 42d25d 53687->54370 53691 460b09 calloc 53690->53691 53697 417b50 53691->53697 53693 417c1b strchr 53696 417c40 strlen 53693->53696 53693->53697 53694 417c65 53695 417b64 free 53694->53695 54393 460a6c free realloc 53694->54393 53699 417f19 53695->53699 53696->53697 53697->53693 53697->53694 53697->53695 54392 460a6c free realloc 53697->54392 53700 417f29 53699->53700 53701 417f4c 53699->53701 53703 460b8c 3 API calls 53700->53703 53704 417f3b 53700->53704 53702 417f82 strncmp 53701->53702 53701->53704 53702->53704 53705 417fab 53702->53705 53703->53704 53704->53224 53705->53704 54394 4342e2 memcpy memcpy strlen malloc 53705->54394 53708 41a7eb 53707->53708 53709 41a72d 53707->53709 53714 41a80b 53708->53714 54396 434de7 23 API calls 53708->54396 53710 417e55 2 API calls 53709->53710 53721 41a77a 53709->53721 53713 41a761 53710->53713 53712 41a86b 53718 434708 2 API calls 53712->53718 53719 41a934 53712->53719 53713->53721 54395 418cc2 12 API calls 53713->54395 53714->53712 53717 41a847 free 53714->53717 53715 41a7d9 free 53715->53708 53717->53712 53723 41a892 53718->53723 53722 41a8ac 53719->53722 54397 41a5e1 8 API calls 53719->54397 53721->53715 53722->53204 53722->53205 53722->53340 53723->53719 53723->53722 53724 41a91c free 53723->53724 53724->53719 54398 417e1b 53725->54398 53728 417efe 53728->53231 53728->53232 53783 418166 free free 53782->53783 53784 41819b 53782->53784 53783->53784 53878 417648 7 API calls 53784->53878 53785->53224 53787 417085 53786->53787 53790 4170ac 53786->53790 53788 417095 free 53787->53788 53792 4170ef 53787->53792 53788->53792 53789 41711c 53789->53792 54463 460a6c free realloc 53789->54463 53790->53789 53793 4170e4 53790->53793 53792->53224 54462 416ff0 free free free free 53793->54462 53795->53224 53796->53224 54464 460716 53797->54464 53799 433938 53800 43393d 53799->53800 54484 46744c 6 API calls 53799->54484 53800->53224 53802 433957 53802->53800 53803 433967 _fdopen 53802->53803 53803->53800 53804->53340 53805->53224 53808 402b0a 53806->53808 53807 402b9b 53807->53224 53808->53807 54491 4026ab exit _write raise 53808->54491 53810->53224 53812 47d503 fwrite 53811->53812 53813 47d4de fwrite 53811->53813 53815 47d53f 53812->53815 53820 47d599 53812->53820 53813->53820 53816 47d54d ferror 53815->53816 53815->53820 53817 47d55c _fileno 53816->53817 53816->53820 53818 47d570 53817->53818 53817->53820 53818->53820 54492 485a9e exit raise 53818->54492 53820->53224 53821->53133 53822->53133 53823->53132 53824->53224 53825->53224 53826->53224 53827->53340 53828->53340 53829->53340 53830->53340 53831->53224 53832->53224 53833->53224 53835 417cf0 53834->53835 53837 417cfc 53834->53837 53836 417d06 strlen 53835->53836 53835->53837 53836->53837 53837->53224 53838->53224 53839->53340 53840->53340 53841->53224 53842->53224 53843->53236 53844->53248 53845->53247 53846->53249 53878->53118 53880 55a950 9 API calls 53879->53880 53881 43f716 53880->53881 53884 43f723 53881->53884 53891 43f78b 53881->53891 54058 55af10 13 API calls 53881->54058 53883 43f76f 53885 55a950 9 API calls 53883->53885 53884->53883 54040 55ac70 53884->54040 53887 43f774 53885->53887 53888 55a950 9 API calls 53887->53888 53887->53891 53889 43f77d 53888->53889 53890 55a950 9 API calls 53889->53890 53889->53891 53890->53891 53892 55a950 53891->53892 53894 55a968 53892->53894 53893 43f939 53893->53443 53893->53444 53894->53893 54075 56db30 EnterCriticalSection 53894->54075 53896 55a982 53899 55a98c 53896->53899 54079 51d5a0 9 API calls 53896->54079 53900 55a999 53899->53900 54076 56db50 LeaveCriticalSection 53899->54076 53900->53893 54077 51acd0 9 API calls 53900->54077 54078 56db50 LeaveCriticalSection 53900->54078 54080 5af600 53903->54080 53911 43f95c 53912 519210 53911->53912 54106 4f6f80 53912->54106 53914 519218 54116 53c260 53914->54116 53916 43f961 53917 4f66a0 53916->53917 54136 4f5980 53917->54136 53920 4f66c3 53927 4f66f3 53920->53927 54140 4f5a20 9 API calls 53920->54140 53921 4f6740 getenv 53923 4f6793 53921->53923 53924 4f6750 53921->53924 53930 4f6798 strlen 53923->53930 54144 54bfb0 strlen memcpy 53924->54144 53925 4f66d7 53928 4f66db 53925->53928 53929 4f6710 53925->53929 53927->53454 54141 4f60c0 45 API calls 53928->54141 53929->53927 54142 521600 9 API calls 53929->54142 53934 4f67bb 53930->53934 53933 4f671e 53933->53927 54143 51e760 9 API calls 53933->54143 53934->53927 54145 54c170 strlen 53934->54145 53937 4f67d6 54146 54c1d0 strlen 53937->54146 53939 4f67ea 54147 54c1d0 strlen 53939->54147 53941 4f67fe 53941->53941 53943 4a1240 53942->53943 53944 4a11e6 53942->53944 53945 53c260 9 API calls 53943->53945 53948 4a11ef 53944->53948 54149 51e160 9 API calls 53944->54149 53945->53948 53947 4a1230 53947->53456 53948->53456 53950 4a5f93 53949->53950 53951 4a5bd1 53949->53951 54170 51e160 9 API calls 53950->54170 53953 4a11d0 9 API calls 53951->53953 53958 4a5bed 53953->53958 53954 4a5fbf 54171 51e160 9 API calls 53954->54171 53956 4a5eae 53956->53465 53957 4a5f50 54169 51e160 9 API calls 53957->54169 53958->53956 53958->53957 53960 4a5e56 53958->53960 53961 4a5c17 53958->53961 54164 51e160 9 API calls 53960->54164 53963 540010 malloc 53961->53963 53965 4a5c33 53963->53965 53964 4a5e82 53965->53964 54024->53437 54025->53466 54038->53449 54039->53497 54041 55adc6 54040->54041 54042 55ac90 54040->54042 54041->53883 54042->54041 54059 54bdc0 strlen MultiByteToWideChar 54042->54059 54044 55aca8 54044->54041 54045 55acb2 _fileno _fstat 54044->54045 54046 55ace7 54045->54046 54047 55adaf fclose 54045->54047 54074 55a6e0 9 API calls 54046->54074 54047->53883 54049 55ad07 54050 55ad30 54049->54050 54051 55ae20 54049->54051 54052 55ad20 setbuf 54049->54052 54053 55add3 fread 54050->54053 54054 55ad57 fread 54050->54054 54055 55ad52 54050->54055 54052->54050 54053->54055 54056 55ad9f 54053->54056 54054->54055 54054->54056 54055->54050 54055->54054 54055->54056 54057 55a6e0 9 API calls 54055->54057 54056->54047 54057->54055 54058->53884 54060 54bee0 54059->54060 54061 54be11 54059->54061 54063 54bf18 MultiByteToWideChar 54060->54063 54068 54bef5 54060->54068 54062 54be27 MultiByteToWideChar 54061->54062 54064 54be57 54062->54064 54065 54be61 strlen MultiByteToWideChar 54062->54065 54066 54bf4d 54063->54066 54063->54068 54064->54044 54065->54064 54067 54be9f _wfopen 54065->54067 54067->54064 54069 54beb3 _errno 54067->54069 54068->54064 54070 54bf07 fopen 54068->54070 54071 54bec7 fopen 54069->54071 54072 54bec0 _errno 54069->54072 54073 54bed6 54070->54073 54071->54073 54072->54064 54072->54071 54073->54044 54074->54049 54075->53896 54076->53900 54077->53900 54078->53900 54079->53899 54081 4f6a90 5 API calls 54080->54081 54082 4f60a8 54081->54082 54083 5afa20 54082->54083 54084 4f6a90 5 API calls 54083->54084 54085 4f60ad 54084->54085 54086 519830 54085->54086 54087 4f6a90 5 API calls 54086->54087 54088 4f60b2 54087->54088 54089 4f6a90 54088->54089 54090 4f6aa1 54089->54090 54091 4f6b60 54089->54091 54098 4f6b0f 54090->54098 54099 540010 54090->54099 54105 56d1a0 malloc 54091->54105 54096 4f6ae9 54096->54098 54104 56d640 free memmove 54096->54104 54098->53911 54100 540025 54099->54100 54101 5400a4 malloc 54100->54101 54102 4f6abd 54100->54102 54101->54102 54102->54098 54103 54bfb0 strlen memcpy 54102->54103 54103->54096 54104->54098 54105->54090 54107 4f6f8a 54106->54107 54108 4f6f90 getenv 54106->54108 54107->53914 54109 4f6fb6 sscanf 54108->54109 54113 4f7043 54108->54113 54110 4f7065 strtoul 54109->54110 54115 4f6fe3 54109->54115 54110->54115 54111 4f70e1 54112 4f6ff5 strchr 54112->54113 54114 4f7017 strtoul 54112->54114 54113->53914 54114->54113 54115->54111 54115->54112 54117 53c272 54116->54117 54120 53c290 54116->54120 54129 53c280 54117->54129 54131 51e160 9 API calls 54117->54131 54119 53c39b 54119->53916 54124 53c2e5 54120->54124 54120->54129 54132 56db30 EnterCriticalSection 54120->54132 54122 53c6b3 54123 53c55d 54123->54122 54125 53c592 54123->54125 54126 53c610 54123->54126 54124->54129 54135 51aa60 9 API calls 54124->54135 54133 56db50 LeaveCriticalSection 54125->54133 54134 56db50 LeaveCriticalSection 54126->54134 54129->53916 54131->54119 54132->54123 54133->54124 54134->54129 54135->54122 54137 4f598b 54136->54137 54139 4f5995 54137->54139 54148 51e160 9 API calls 54137->54148 54139->53920 54139->53921 54139->53927 54140->53925 54141->53927 54142->53933 54143->53927 54144->53920 54145->53937 54146->53939 54147->53941 54148->54139 54149->53947 54164->53964 54169->53956 54170->53954 54171->53956 54178 460b09 calloc 54177->54178 54179 416fa2 54178->54179 54180 460a42 malloc 54179->54180 54181 416fc8 54180->54181 54181->53509 54183 4270c4 54182->54183 54194 427224 54182->54194 54184 4213d9 6 API calls 54183->54184 54185 427190 54183->54185 54186 4270d6 54184->54186 54190 427209 strcmp 54185->54190 54185->54194 54186->54185 54187 4270f7 strlen 54186->54187 54188 427124 54187->54188 54189 427158 free 54188->54189 54191 47cf40 2 API calls 54189->54191 54190->54194 54192 42717c 54191->54192 54192->54185 54201 4273c0 38 API calls 54192->54201 54194->53539 54195->53506 54196->53516 54197->53537 54198->53562 54199->53568 54200->53551 54201->54185 54207 401d3f 54202->54207 54203 401d48 54254 460686 6 API calls 54203->54254 54205 401d53 54206 423ef3 2 API calls 54205->54206 54212 401d76 54206->54212 54207->54203 54208 401e45 54207->54208 54211 401dd8 54207->54211 54256 412562 abort memset exit 54207->54256 54257 4127c5 free free 54207->54257 54258 4127c5 free free 54208->54258 54255 4127c5 free free 54211->54255 54212->53593 54216 440198 54215->54216 54259 4a1e00 54216->54259 54218 4401b1 54231 44021b 54218->54231 54300 4132d6 strlen 54218->54300 54220 4401c9 54225 44023e 54220->54225 54334 440131 strlen memcpy malloc 54220->54334 54222 440281 54222->54231 54224 4401db 54225->54222 54225->54231 54335 4ae440 12 API calls 54225->54335 54337 43f798 43 API calls 54231->54337 54235 4402dd 54243 44038f 54235->54243 54338 4a3520 54235->54338 54243->53594 54244->53577 54245->53583 54246->53574 54247->53587 54248->53627 54249->53595 54254->54205 54255->54212 54256->54207 54257->54207 54258->54212 54260 4a243e 54259->54260 54261 4a1e13 54259->54261 54355 51e160 9 API calls 54260->54355 54263 4a1e1e 54261->54263 54264 4a23c0 54261->54264 54266 540010 malloc 54263->54266 54353 51e160 9 API calls 54264->54353 54265 4a246a 54356 4f74d0 31 API calls 54265->54356 54268 4a1e3a 54266->54268 54269 4a22e0 54268->54269 54342 56daa0 malloc InitializeCriticalSectionAndSpinCount 54268->54342 54350 51e160 9 API calls 54269->54350 54273 4a248d 54273->54218 54274 4a1e49 54275 4a23f3 54274->54275 54276 4a1e57 54274->54276 54354 51e160 9 API calls 54275->54354 54343 49f100 19 API calls 54276->54343 54278 4a230c 54278->54218 54280 4a1ec9 54280->54265 54281 4a226a 54280->54281 54282 4a1f22 54280->54282 54281->54269 54301 413303 54300->54301 54301->54220 54334->54224 54335->54222 54337->54235 54339 4a355c 54338->54339 54340 4a352c 54338->54340 54339->54243 54340->54339 54342->54274 54343->54280 54350->54278 54353->54278 54354->54278 54355->54265 54356->54273 54371 460a42 malloc 54370->54371 54373 42d274 54371->54373 54372 42d2b1 free 54377 417b34 54372->54377 54373->54372 54375 42d385 free 54373->54375 54376 42d3b8 54373->54376 54373->54377 54379 42d41d free 54373->54379 54380 460a6c free realloc 54373->54380 54381 4028f5 54373->54381 54375->54377 54376->54377 54378 42d3be free 54376->54378 54377->53224 54378->54377 54379->54377 54380->54373 54383 402910 54381->54383 54382 402995 54382->54373 54383->54382 54384 4029d6 54383->54384 54385 4029ad 54383->54385 54391 402670 _read 54384->54391 54388 43fdd1 54385->54388 54389 43f39c 4 API calls 54388->54389 54390 43fe0c 54389->54390 54390->54382 54391->54382 54392->53697 54393->53695 54394->53704 54395->53721 54396->53714 54397->53722 54399 417cdb strlen 54398->54399 54400 417e49 54399->54400 54400->53728 54401 4342e2 memcpy memcpy strlen malloc 54400->54401 54401->53728 54462->53792 54463->53792 54465 46072f 54464->54465 54466 460738 54464->54466 54465->54466 54467 460748 strlen 54465->54467 54473 460790 54466->54473 54485 47aa20 getenv 54466->54485 54467->54466 54469 460851 strlen 54470 460865 54469->54470 54476 4608c7 memcpy 54470->54476 54483 46083a 54470->54483 54471 460778 54472 46078c 54471->54472 54486 4606d4 strlen strcpy 54471->54486 54472->54473 54487 4606d4 strlen strcpy 54472->54487 54473->54469 54474 4607f9 54473->54474 54488 4606d4 strlen strcpy 54473->54488 54482 4607fd 54474->54482 54489 4606d4 strlen strcpy 54474->54489 54476->54483 54480 460814 54480->54482 54490 4606d4 strlen strcpy 54480->54490 54482->54469 54482->54483 54483->53799 54484->53802 54485->54471 54486->54472 54487->54473 54488->54474 54489->54480 54490->54482 54491->53808 54492->53820 55155 425893 572 API calls 55332 42d89d 92 API calls 52364 425b43 556 API calls 54672 4dad70 54673 4dadba 54672->54673 54674 4db4d7 54672->54674 54676 4daf57 54673->54676 54677 4daf82 54673->54677 54721 4daddc 54673->54721 54775 51e160 9 API calls 54674->54775 54679 4dafc8 54676->54679 54676->54721 54764 51e160 9 API calls 54677->54764 54765 51e160 9 API calls 54679->54765 54681 4db658 54779 4d8df0 11 API calls 54681->54779 54684 4d87b0 9 API calls 54684->54721 54686 4db000 54766 51e160 9 API calls 54686->54766 54687 4db680 54691 4db7e7 54687->54691 54695 4db503 54687->54695 54688 4db4a6 54774 51e160 9 API calls 54688->54774 54786 51e160 9 API calls 54691->54786 54693 4dae8f 54762 51e160 9 API calls 54693->54762 54694 4daf23 54763 51e160 9 API calls 54694->54763 54699 4db6a8 54695->54699 54700 4db5e0 54695->54700 54734 4db6d4 54695->54734 54776 51e160 9 API calls 54695->54776 54777 4d87b0 9 API calls 54695->54777 54697 4dae52 54738 4daebb 54697->54738 54761 51e160 9 API calls 54697->54761 54780 51e160 9 API calls 54699->54780 54778 51e160 9 API calls 54700->54778 54704 4db837 54719 4db856 54704->54719 54788 4d8f70 9 API calls 54704->54788 54706 4db77f 54784 51e160 9 API calls 54706->54784 54707 4db223 54769 51e160 9 API calls 54707->54769 54711 4db817 54787 4e2720 11 API calls 54711->54787 54713 4db850 54718 4db87f 54713->54718 54713->54719 54715 4db7ab 54785 51e160 9 API calls 54715->54785 54790 51e160 9 API calls 54718->54790 54789 4e2740 12 API calls 54719->54789 54720 4db355 54720->54738 54782 51e160 9 API calls 54720->54782 54721->54681 54721->54684 54721->54686 54721->54688 54721->54694 54721->54695 54721->54697 54721->54700 54721->54704 54721->54706 54721->54707 54721->54711 54721->54715 54721->54720 54724 4db2e0 54721->54724 54725 4db190 54721->54725 54726 4db370 54721->54726 54735 4db1a8 54721->54735 54721->54738 54751 4f3b40 54721->54751 54767 4daa70 15 API calls 54721->54767 54770 4da820 9 API calls 54721->54770 54783 51e160 9 API calls 54721->54783 54724->54738 54771 51e160 9 API calls 54724->54771 54768 5a7e80 11 API calls 54725->54768 54739 5a56d0 54726->54739 54727 4db8ab 54727->54727 54781 51e160 9 API calls 54734->54781 54735->54738 54772 4e2740 12 API calls 54735->54772 54773 5aadb0 11 API calls 54735->54773 54740 5a56e7 54739->54740 54747 5a5835 54739->54747 54741 5a5815 54740->54741 54742 5a56f9 54740->54742 54792 4e1f80 9 API calls 54741->54792 54745 5a57d3 54742->54745 54748 5a570e 54742->54748 54791 51e160 9 API calls 54745->54791 54793 51e160 9 API calls 54747->54793 54748->54747 54749 5a575d memcpy 54748->54749 54750 5a5792 54748->54750 54749->54750 54750->54735 54752 4f3b90 54751->54752 54755 4f3b55 54751->54755 54753 4f3c16 54752->54753 54752->54755 54758 4f3bc2 54752->54758 54759 4f3bfc 54752->54759 54794 5400f0 54753->54794 54755->54721 54757 4f3cc0 54757->54721 54758->54759 54760 4f3be7 memcpy 54758->54760 54759->54755 54807 51e160 9 API calls 54759->54807 54760->54759 54761->54693 54762->54738 54763->54693 54764->54738 54765->54738 54766->54693 54767->54721 54768->54735 54769->54738 54770->54721 54771->54735 54772->54735 54773->54735 54774->54693 54775->54695 54776->54695 54777->54695 54778->54738 54779->54687 54780->54734 54781->54720 54782->54735 54783->54721 54784->54715 54785->54738 54786->54711 54787->54704 54788->54713 54789->54734 54790->54727 54791->54750 54792->54748 54793->54750 54795 540117 54794->54795 54800 5401f3 54794->54800 54797 54011f 54795->54797 54795->54800 54796 5401b4 54796->54759 54797->54796 54799 540190 malloc 54797->54799 54803 540139 54797->54803 54798 540272 free 54804 540174 54798->54804 54801 5401a8 54799->54801 54802 54014c memcpy 54799->54802 54800->54798 54800->54801 54801->54759 54805 540164 54802->54805 54803->54801 54803->54802 54804->54759 54805->54804 54806 5401d0 free 54805->54806 54806->54759 54807->54757 54908 42d70a 97 API calls 54977 423d0c 54978 423d12 54977->54978 54980 423d30 54977->54980 54979 47d18f 8 API calls 54978->54979 54983 423d2b 54979->54983 54981 423da7 54980->54981 54982 423d74 54980->54982 54986 423dde 54981->54986 54987 423daf 54981->54987 54996 460a6c free realloc 54982->54996 54988 423d90 54983->54988 54999 423e4d fflush fflush 54983->54999 54990 423df2 54986->54990 54998 423adc 16 API calls 54986->54998 54997 460a6c free realloc 54987->54997 54992 47d344 7 API calls 54990->54992 54993 423e04 54992->54993 54994 423e1c free 54993->54994 54995 47d344 7 API calls 54993->54995 54994->54983 54995->54994 54996->54988 54997->54988 54998->54990 54999->54988 55330 41e11c 124 API calls 55439 426d3a 55441 426db8 55439->55441 55442 426d45 55439->55442 55440 426df4 55448 426e02 55440->55448 55476 48af40 33 API calls 55440->55476 55441->55440 55475 460686 6 API calls 55441->55475 55442->55441 55474 43a5b5 7 API calls 55442->55474 55446 426ddc 55447 423ef3 2 API calls 55446->55447 55447->55440 55454 426e24 55448->55454 55477 42ebc7 27 API calls 55448->55477 55449 42700b 55451 427019 55449->55451 55479 420f20 40 API calls 55449->55479 55453 427030 55451->55453 55480 424937 105 API calls 55451->55480 55456 427053 55453->55456 55481 403062 148 API calls 55453->55481 55454->55449 55457 460b8c 3 API calls 55454->55457 55459 423763 105 API calls 55456->55459 55461 426e9d 55457->55461 55460 427058 55459->55460 55462 42705d exit 55460->55462 55463 460b8c 3 API calls 55461->55463 55464 426eb9 55463->55464 55478 429d2c free 55464->55478 55466 426eca 55467 426f14 time 55466->55467 55468 434664 4 API calls 55467->55468 55469 426f30 55468->55469 55470 423ef3 2 API calls 55469->55470 55471 426f68 free free 55470->55471 55471->55449 55472 426fa9 55471->55472 55472->55449 55473 423ef3 2 API calls 55472->55473 55473->55449 55474->55442 55475->55446 55476->55448 55477->55454 55478->55466 55479->55451 55480->55453 55481->55456 55487 423f38 memset exit 52367 43f9c8 141 API calls 52369 4253d0 603 API calls 52381 4023dd 12 API calls 52619 4269ef 466 API calls 54503 4193fb 54504 433903 13 API calls 54503->54504 54505 419400 54504->54505 54506 419416 strlen 54505->54506 54507 419445 54505->54507 54508 47d4c9 7 API calls 54506->54508 54509 419463 54507->54509 54510 41947c 54507->54510 54508->54507 54511 419474 54509->54511 54512 419469 fclose 54509->54512 54513 41949a strlen 54510->54513 54515 4194c3 54510->54515 54512->54511 54514 47d4c9 7 API calls 54513->54514 54514->54515 54517 42c79e 54515->54517 54518 460a42 malloc 54517->54518 54519 42c7e5 54518->54519 54520 460a42 malloc 54519->54520 54523 42c948 54519->54523 54528 42c888 54520->54528 54521 42ca07 54522 42ca2e 54521->54522 54576 42c3b8 memset 54521->54576 54554 42ca50 54522->54554 54577 429ce7 calloc 54522->54577 54523->54521 54525 42c9b0 strlen 54523->54525 54526 42c9ca 54523->54526 54525->54526 54558 427aba 54526->54558 54528->54523 54529 42c8f6 free 54528->54529 54546 42c90f 54528->54546 54529->54546 54531 42d12b 54537 42d152 54531->54537 54580 429d2c free 54531->54580 54533 42d1c7 54536 42d23f free 54533->54536 54535 42d4ac 12 API calls 54535->54554 54536->54511 54537->54533 54538 42d19c free 54537->54538 54538->54533 54539 4028f5 5 API calls 54539->54554 54540 42cb18 strtol free 54540->54546 54540->54554 54541 42caef strlen 54542 47d4c9 7 API calls 54541->54542 54542->54540 54543 42cb6e 54578 42d4ac 12 API calls 54543->54578 54545 42cb80 54545->54546 54547 42cbc4 free 54545->54547 54548 42cb9b strlen 54545->54548 54546->54531 54573 427b91 54546->54573 54547->54546 54549 47d4c9 7 API calls 54548->54549 54549->54547 54551 42c621 11 API calls 54551->54554 54554->54535 54554->54539 54554->54540 54554->54541 54554->54543 54554->54546 54554->54551 54555 42cf80 strlen 54554->54555 54556 42cfa9 free 54554->54556 54564 427b3b 54554->54564 54568 43f0b8 54554->54568 54579 42c412 Sleep Sleep 54554->54579 54557 47d4c9 7 API calls 54555->54557 54556->54554 54557->54556 54559 427af6 54558->54559 54560 427ae1 54558->54560 54581 42871f 54559->54581 54560->54559 54594 4279e8 strchr strlen strncmp abort 54560->54594 54565 427b7e 54564->54565 54644 428922 54565->54644 54569 43f0d7 54568->54569 54570 43f18d 54568->54570 54569->54570 54571 43f14f SetConsoleTitleA 54569->54571 54570->54554 54655 43ae20 54571->54655 54662 428a28 54573->54662 54574 427bba 54574->54531 54576->54522 54577->54554 54578->54545 54579->54554 54580->54537 54582 460b09 calloc 54581->54582 54583 428751 54582->54583 54586 4287b2 54583->54586 54595 439c03 54583->54595 54585 460a42 malloc 54587 428809 54585->54587 54586->54585 54588 423bc1 25 API calls 54587->54588 54589 428825 54588->54589 54598 428db5 54589->54598 54591 42883e 54633 4298b7 54591->54633 54593 427b2c 54593->54521 54594->54559 54596 439c17 GetConsoleScreenBufferInfo 54595->54596 54597 439c32 54596->54597 54597->54586 54639 428d36 strlen 54598->54639 54600 428e2b memset 54601 428e74 54600->54601 54602 428e83 54601->54602 54604 428ed0 54601->54604 54603 428ea8 memset 54602->54603 54605 429026 54603->54605 54606 428f38 memset 54604->54606 54607 428f71 54604->54607 54608 4290c8 memset 54605->54608 54609 429044 54605->54609 54606->54607 54610 428fc9 memcpy memset 54607->54610 54608->54609 54611 42910f memset 54609->54611 54617 429286 54609->54617 54610->54605 54612 429213 memset 54611->54612 54613 429241 memset 54611->54613 54612->54613 54613->54617 54615 429389 memset 54616 4293cf 54615->54616 54618 429506 memcpy 54616->54618 54625 429405 54616->54625 54640 428d36 strlen 54617->54640 54618->54625 54619 429730 strlen 54643 428d36 strlen 54619->54643 54621 42970c memset 54632 4296d0 54621->54632 54623 4296eb 54623->54621 54623->54632 54624 429871 memset 54624->54591 54625->54619 54627 429536 54625->54627 54627->54623 54630 4295d1 54627->54630 54628 42975c 54629 429825 memset 54628->54629 54629->54632 54642 428d59 strlen strlen 54630->54642 54641 428d36 strlen 54632->54641 54634 4298c9 54633->54634 54635 423bc1 25 API calls 54634->54635 54636 4298e0 54635->54636 54637 423bc1 25 API calls 54636->54637 54638 4298f3 54637->54638 54638->54593 54639->54600 54640->54615 54641->54624 54642->54632 54643->54628 54645 4289af 54644->54645 54646 42893f 54644->54646 54648 428db5 17 API calls 54645->54648 54649 427b8e 54645->54649 54647 439c03 GetConsoleScreenBufferInfo 54646->54647 54652 42894c 54647->54652 54650 428a09 54648->54650 54649->54554 54651 4298b7 25 API calls 54650->54651 54651->54649 54652->54645 54654 460a6c free realloc 54652->54654 54654->54645 54656 43ae31 54655->54656 54657 43ae65 GetConsoleWindow 54656->54657 54658 43ae7a 54656->54658 54660 43aec1 54656->54660 54657->54658 54659 43ae89 CoInitializeEx 54657->54659 54658->54570 54659->54658 54659->54660 54660->54658 54661 43aff9 CoUninitialize 54660->54661 54661->54658 54664 428a4e 54662->54664 54663 428db5 17 API calls 54665 428abb 54663->54665 54664->54663 54666 4298b7 25 API calls 54665->54666 54667 428ac9 54666->54667 54668 423bc1 25 API calls 54667->54668 54669 428add 54668->54669 54670 423bc1 25 API calls 54669->54670 54671 428af1 free free 54670->54671 54671->54574 54867 412d87 54868 412d99 54867->54868 54871 412dcd 54868->54871 54903 412ce8 free free 54868->54903 54869 412eab memset 54876 412ed6 54869->54876 54871->54869 54872 412e63 54871->54872 54874 412de1 54871->54874 54904 43b6a7 memcpy strlen malloc 54871->54904 54878 4603aa 7 API calls 54872->54878 54875 412e2b 54875->54872 54881 412e4e free 54875->54881 54877 412899 4 API calls 54876->54877 54879 412f47 54877->54879 54880 412e81 54878->54880 54882 412f57 54879->54882 54884 412fa7 54879->54884 54883 423ef3 2 API calls 54880->54883 54881->54872 54882->54874 54905 485b10 wcstombs FormatMessageW 54882->54905 54885 412e99 free 54883->54885 54886 412608 2 API calls 54884->54886 54885->54869 54887 412fb2 54886->54887 54890 412fcb 54887->54890 54894 412fe9 54887->54894 54889 412f72 54891 423ef3 2 API calls 54889->54891 54892 423ef3 2 API calls 54890->54892 54891->54874 54892->54874 54893 413103 54893->54874 54907 412c22 7 API calls 54893->54907 54902 413037 54894->54902 54906 43a5b5 7 API calls 54894->54906 54897 4130d1 54898 4130ef 54897->54898 54900 423bc1 25 API calls 54897->54900 54899 423bc1 25 API calls 54898->54899 54899->54893 54900->54898 54901 423bc1 25 API calls 54901->54902 54902->54893 54902->54897 54902->54901 54903->54871 54904->54875 54905->54889 54906->54902 54907->54874 55334 4019a8 free 55335 4019c3 55334->55335 55336 424617 4 API calls 55335->55336 55337 4019ce 55336->55337 55338 423ef3 2 API calls 55337->55338 55339 4019f9 free 55338->55339 55340 401a67 55339->55340 55355 401570 55340->55355 55344 401c1b 55367 401740 55344->55367 55348 401bef 55348->55344 55350 401740 abort 55348->55350 55349 401aa3 55349->55348 55354 423ef3 2 API calls 55349->55354 55350->55344 55352 401c8a 55353 423ef3 2 API calls 55353->55352 55354->55348 55356 401580 55355->55356 55357 40158a memset 55355->55357 55358 401585 abort 55356->55358 55359 4015dd memset 55356->55359 55361 4015c5 55357->55361 55358->55361 55359->55361 55362 47cd45 55361->55362 55374 4840f2 55362->55374 55365 47cda2 _open_osfhandle 55366 47cd96 55365->55366 55366->55349 55368 401756 55367->55368 55369 40175d 55367->55369 55368->55369 55370 40176b abort 55368->55370 55371 4018a8 55369->55371 55370->55369 55372 43f39c 4 API calls 55371->55372 55373 4018e6 55372->55373 55373->55352 55373->55353 55375 47cd57 WSASocketA 55374->55375 55376 484105 55374->55376 55375->55365 55375->55366 55376->55375 55378 483858 abort 55376->55378 55378->55375 55392 4f39a0 55393 4f39b5 55392->55393 55399 4f39ba 55392->55399 55394 4f3a38 55393->55394 55395 4f3a19 55393->55395 55398 4f3a81 55393->55398 55393->55399 55394->55399 55405 51e160 9 API calls 55394->55405 55401 53fea0 55395->55401 55398->55394 55400 4f3aa6 memcpy 55398->55400 55400->55394 55403 53febe 55401->55403 55402 53ff04 55402->55394 55403->55402 55404 53ff43 free 55403->55404 55404->55402 55405->55399 55483 43e9ba 55484 43ae20 3 API calls 55483->55484 55485 43e9cc free 55484->55485 55486 43e9ea 55485->55486 55488 4259be 551 API calls
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: exit$free$ferrorfputs
                                                  • String ID: ,=j$8$8Pj$=<j$>Lj$@Fu$A:Ea:bKB:ckdP:D:X:e:xFhEI:46i:l:mn:O:o:pY:qQ:rR:LSHT:Nt:U:vVw:$Both --no-clobber and --convert-links were specified, only --convert-links will be used.$XWj$`F:v$R$Uj$s$e
                                                  • API String ID: 983530446-765883185
                                                  • Opcode ID: 50697fd4cd2db638f64f7e0ebeeda54edeb645cc6318f9b0b873f03cdedbfe86
                                                  • Instruction ID: eaf85c739d9e76ae82a660a242de8c978cac2729e79e1cec6857fb70612b78a7
                                                  • Opcode Fuzzy Hash: 50697fd4cd2db638f64f7e0ebeeda54edeb645cc6318f9b0b873f03cdedbfe86
                                                  • Instruction Fuzzy Hash: 85A258706043508FDB40EF65E8417AABBF1EF45349F85885EE4C8AB352DBBC9841CB5A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: !Nj$8$8Pj$=<j$@Fu$A:Ea:bKB:ckdP:D:X:e:xFhEI:46i:l:mn:O:o:pY:qQ:rR:LSHT:Nt:U:vVw:$Both --no-clobber and --convert-links were specified, only --convert-links will be used.$XWj$XWj$`F:v$noclobber$noparent$R$Uj$s$e
                                                  • API String ID: 0-3546124017
                                                  • Opcode ID: 74045fb9b780ecf6025611efa76f26c58cf73cde54ba2279338cecbd0657bf72
                                                  • Instruction ID: 50084f1a93d7d78ce774408522d0a82746cb4447fab56503e9ea60b21ac7752a
                                                  • Opcode Fuzzy Hash: 74045fb9b780ecf6025611efa76f26c58cf73cde54ba2279338cecbd0657bf72
                                                  • Instruction Fuzzy Hash: D88258706043508BDB50EF25E8407AA7BE1EF46349F85C85EE4C4AB362CBBDD841CB5A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: exit
                                                  • String ID: #Nj$8$8Pj$=<j$@Fu$A:Ea:bKB:ckdP:D:X:e:xFhEI:46i:l:mn:O:o:pY:qQ:rR:LSHT:Nt:U:vVw:$Both --no-clobber and --convert-links were specified, only --convert-links will be used.$XWj$XWj$`F:v$R$Uj$s$e
                                                  • API String ID: 2483651598-3860630875
                                                  • Opcode ID: 2eb076f7cc238af49990b28957db0cf6a962b8a3e624e32b7323dc583be65332
                                                  • Instruction ID: 5ccd1b95994ffb7a792bb568a1e349549d9ffdac54a46c675c9e0c6f39ab7644
                                                  • Opcode Fuzzy Hash: 2eb076f7cc238af49990b28957db0cf6a962b8a3e624e32b7323dc583be65332
                                                  • Instruction Fuzzy Hash: 558258706043508FDB50EF25E8407AA7BE1EF45349F85C85EE4C8AB362CBBD9845CB5A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: exit
                                                  • String ID: !Nj$8$8Pj$=<j$@Fu$A:Ea:bKB:ckdP:D:X:e:xFhEI:46i:l:mn:O:o:pY:qQ:rR:LSHT:Nt:U:vVw:$Both --no-clobber and --convert-links were specified, only --convert-links will be used.$XWj$XWj$`F:v$noclobber$R$Uj$s$e
                                                  • API String ID: 2483651598-2739010732
                                                  • Opcode ID: 0e7829838e323e7803e853a9ff601b2753126c34a5e41d2b24e59c5e26fe740b
                                                  • Instruction ID: 287ccbf726af5d45b232ad3dd880b998ed50be22871c3e156b27e4e6f6803728
                                                  • Opcode Fuzzy Hash: 0e7829838e323e7803e853a9ff601b2753126c34a5e41d2b24e59c5e26fe740b
                                                  • Instruction Fuzzy Hash: DD8258706043508FDB50EF25E8407AA7BE1EF45349F85C85EE4C8AB362CBBD9845CB5A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: exit
                                                  • String ID: !Nj$8$8Pj$=<j$@Fu$A:Ea:bKB:ckdP:D:X:e:xFhEI:46i:l:mn:O:o:pY:qQ:rR:LSHT:Nt:U:vVw:$Both --no-clobber and --convert-links were specified, only --convert-links will be used.$XWj$XWj$`F:v$noparent$R$Uj$s$e
                                                  • API String ID: 2483651598-2819477804
                                                  • Opcode ID: bdda34dbb05908cd585c00d97ac015b8bb24284f4665d06693c1d34acc3b833c
                                                  • Instruction ID: a761e7ab7a6f0465a3e3b648583a611f6bf216ab54a44888726ee20e274c78e5
                                                  • Opcode Fuzzy Hash: bdda34dbb05908cd585c00d97ac015b8bb24284f4665d06693c1d34acc3b833c
                                                  • Instruction Fuzzy Hash: 808258706043508FDB50EF25E8407AA7BE1EF45349F85C85EE4C4AB362CBBD9845CB5A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: exit
                                                  • String ID: 8$8Pj$=<j$@Fu$A:Ea:bKB:ckdP:D:X:e:xFhEI:46i:l:mn:O:o:pY:qQ:rR:LSHT:Nt:U:vVw:$Both --no-clobber and --convert-links were specified, only --convert-links will be used.$XWj$XWj$`F:v$R$Uj$s$e
                                                  • API String ID: 2483651598-4121705587
                                                  • Opcode ID: 43988dbdfe86059932bd213646845e49548bbf870a217520385dd07543860cf8
                                                  • Instruction ID: 09a9c7134b9545a266d320cdc6b856c7190884937db3edad94c106028d17e079
                                                  • Opcode Fuzzy Hash: 43988dbdfe86059932bd213646845e49548bbf870a217520385dd07543860cf8
                                                  • Instruction Fuzzy Hash: 918258706043508FDB50EF25E8407AA7BE1EF45349F85C85EE4C8AB362CBBD9845CB5A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: !Nj$8$8Pj$=<j$@Fu$A:Ea:bKB:ckdP:D:X:e:xFhEI:46i:l:mn:O:o:pY:qQ:rR:LSHT:Nt:U:vVw:$Both --no-clobber and --convert-links were specified, only --convert-links will be used.$XWj$XWj$`F:v$R$Uj$s$e
                                                  • API String ID: 0-305022974
                                                  • Opcode ID: c220d4ee3edb7048c36354b52561c1ae6e7db3dc221031badbda6667b52c5b3e
                                                  • Instruction ID: 70a1dd63d1771d3cd731d3d4687c68ee1f5150e231b1c391fd5c9ec5291b5600
                                                  • Opcode Fuzzy Hash: c220d4ee3edb7048c36354b52561c1ae6e7db3dc221031badbda6667b52c5b3e
                                                  • Instruction Fuzzy Hash: 618258706043508BDB50EF65E8407AA7BE1EF45349F85C85EE4C8AB362CBBCD841CB5A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: exit
                                                  • String ID: 8$8Pj$=<j$@Fu$A:Ea:bKB:ckdP:D:X:e:xFhEI:46i:l:mn:O:o:pY:qQ:rR:LSHT:Nt:U:vVw:$Both --no-clobber and --convert-links were specified, only --convert-links will be used.$XWj$XWj$`F:v$R$Uj$s$e
                                                  • API String ID: 2483651598-4121705587
                                                  • Opcode ID: 983f9dd11acafecf096993413a0bb10ee877e143aca09392ee28f6dfddd1260e
                                                  • Instruction ID: 4ab6fd25f8a201803674d13650d5cea1fcdba6ef86bc00ec0c6f6dd853061b8b
                                                  • Opcode Fuzzy Hash: 983f9dd11acafecf096993413a0bb10ee877e143aca09392ee28f6dfddd1260e
                                                  • Instruction Fuzzy Hash: 968258706043508FDB50EF25E8407AA7BE1EF45349F85C85EE4C4AB362CBBD9845CB5A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: exit
                                                  • String ID: 8$8Pj$=<j$@Fu$A:Ea:bKB:ckdP:D:X:e:xFhEI:46i:l:mn:O:o:pY:qQ:rR:LSHT:Nt:U:vVw:$Both --no-clobber and --convert-links were specified, only --convert-links will be used.$XWj$XWj$`F:v$R$Uj$s$e
                                                  • API String ID: 2483651598-4121705587
                                                  • Opcode ID: fb838156d170eabdb44ab39dd96119f94b76f86f0f239e4cc355d458f6f02c8f
                                                  • Instruction ID: 0b112f1e3810fa7cadd7584954196f1ef8f4e721ed259961ab39af6c00bcace5
                                                  • Opcode Fuzzy Hash: fb838156d170eabdb44ab39dd96119f94b76f86f0f239e4cc355d458f6f02c8f
                                                  • Instruction Fuzzy Hash: B98258706043508FDB50EF25E8407AA7BE1EF45349F85C85EE4C8AB362CBBD9845CB5A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: exit
                                                  • String ID: 8$8Pj$=<j$@Fu$A:Ea:bKB:ckdP:D:X:e:xFhEI:46i:l:mn:O:o:pY:qQ:rR:LSHT:Nt:U:vVw:$Both --no-clobber and --convert-links were specified, only --convert-links will be used.$XWj$XWj$`F:v$R$Uj$s$e
                                                  • API String ID: 2483651598-4121705587
                                                  • Opcode ID: 32e6df2c4eaf9a5c8f1b37f6a842e616f6138506bdf898888d339b4744197de5
                                                  • Instruction ID: 6d007290206fcedf3f974215cb9ca707257664fac86ec87bcde167ce2ae4a2e4
                                                  • Opcode Fuzzy Hash: 32e6df2c4eaf9a5c8f1b37f6a842e616f6138506bdf898888d339b4744197de5
                                                  • Instruction Fuzzy Hash: 078258706043508FDB50EF25E8407AA7BE1EF45349F85C85EE4C4AB362CBBD9845CB5A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: exit$getenvmemsetstrcmp
                                                  • String ID: 8$8Pj$=<j$@Fu$A:Ea:bKB:ckdP:D:X:e:xFhEI:46i:l:mn:O:o:pY:qQ:rR:LSHT:Nt:U:vVw:$Both --no-clobber and --convert-links were specified, only --convert-links will be used.$XWj$XWj$`F:v$R$Uj$s$e
                                                  • API String ID: 4250974075-4121705587
                                                  • Opcode ID: d5efb2a289d39d9350c4895acc28564641c98b967596d25c65a87605bb26dc85
                                                  • Instruction ID: bfbbf686e7545f8145c7db32114282eeafea9b1d0026d5e510e5b17b6c086393
                                                  • Opcode Fuzzy Hash: d5efb2a289d39d9350c4895acc28564641c98b967596d25c65a87605bb26dc85
                                                  • Instruction Fuzzy Hash: 1A8258706043508BDB50EF25E8407AA7BE1EF46349F85C85EE4C4AB362CBBDD845CB5A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: exit
                                                  • String ID: 8$8Pj$=<j$@Fu$A:Ea:bKB:ckdP:D:X:e:xFhEI:46i:l:mn:O:o:pY:qQ:rR:LSHT:Nt:U:vVw:$Both --no-clobber and --convert-links were specified, only --convert-links will be used.$XWj$XWj$`F:v$R$Uj$s$e
                                                  • API String ID: 2483651598-4121705587
                                                  • Opcode ID: 8454291ca32d2b00dd9a20ceee28f7506f6f7aa6ec25f65da5a873cafbabc9b7
                                                  • Instruction ID: fdf06a1f6e2be65c7af2a53d6ce648d151fe47e065eca330c63e053297ab48a5
                                                  • Opcode Fuzzy Hash: 8454291ca32d2b00dd9a20ceee28f7506f6f7aa6ec25f65da5a873cafbabc9b7
                                                  • Instruction Fuzzy Hash: 9D8258706043508BDB50EF25E8407AA7BE1EF45349F85C85EE4C8AB362CBBDD845CB5A
                                                  APIs
                                                  • exit.MSVCRT ref: 00425F36
                                                    • Part of subcall function 00421EF3: exit.MSVCRT ref: 00421F44
                                                    • Part of subcall function 00421EF3: free.MSVCRT ref: 00421F4F
                                                    • Part of subcall function 00421EF3: free.MSVCRT ref: 00421F61
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: exitfree
                                                  • String ID: 8$8Pj$=<j$@Fu$A:Ea:bKB:ckdP:D:X:e:xFhEI:46i:l:mn:O:o:pY:qQ:rR:LSHT:Nt:U:vVw:$Both --no-clobber and --convert-links were specified, only --convert-links will be used.$XWj$XWj$`F:v$R$Uj$s$e
                                                  • API String ID: 1835919795-4121705587
                                                  • Opcode ID: f569b891052168be9fb8332c5beb8edaa6ec77255c385da4210e8eb11cac7882
                                                  • Instruction ID: 91b80298f7371817943931f08f49b16ee1be19faecf22dfa47b2909541a2cd9b
                                                  • Opcode Fuzzy Hash: f569b891052168be9fb8332c5beb8edaa6ec77255c385da4210e8eb11cac7882
                                                  • Instruction Fuzzy Hash: 878268706043508BDB50EF25E8407AA7BE1EF45349F85C85EE4C8AB362CBBDD845CB5A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: exit
                                                  • String ID: 8$8Pj$=<j$@Fu$A:Ea:bKB:ckdP:D:X:e:xFhEI:46i:l:mn:O:o:pY:qQ:rR:LSHT:Nt:U:vVw:$Both --no-clobber and --convert-links were specified, only --convert-links will be used.$XWj$XWj$`F:v$R$Uj$s$e
                                                  • API String ID: 2483651598-4121705587
                                                  • Opcode ID: 07b02c9ac1dc6bd25a432bb751baf3c4bbb933647d15bdab4b1068c5763f859d
                                                  • Instruction ID: bf4ed79aad59f785f558324042b2edbc94e9699397dd2be5e1b06ba6cc60ebf1
                                                  • Opcode Fuzzy Hash: 07b02c9ac1dc6bd25a432bb751baf3c4bbb933647d15bdab4b1068c5763f859d
                                                  • Instruction Fuzzy Hash: F28257706043508BDB50EF25E8407AA7BE1EF45349F85C85EE4C8AB362CBBDD845CB5A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: exit
                                                  • String ID: 8$8Pj$=<j$@Fu$A:Ea:bKB:ckdP:D:X:e:xFhEI:46i:l:mn:O:o:pY:qQ:rR:LSHT:Nt:U:vVw:$Both --no-clobber and --convert-links were specified, only --convert-links will be used.$XWj$XWj$`F:v$R$Uj$s$e
                                                  • API String ID: 2483651598-4121705587
                                                  • Opcode ID: 9d0174fd8c4b2c9525540fbbd8e816c45e0b12993ad3ac96f3151b8de0688c8c
                                                  • Instruction ID: 95a4de8aa58588885c3cf0aeacfe9be02c5420a0b07a7375c9f828384219f1c5
                                                  • Opcode Fuzzy Hash: 9d0174fd8c4b2c9525540fbbd8e816c45e0b12993ad3ac96f3151b8de0688c8c
                                                  • Instruction Fuzzy Hash: 7F8258706043508BDB50EF25E8407AA7BE1EF45349F85C85EE4C8AB362CBBDD845CB5A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: exit
                                                  • String ID: 8$8Pj$=<j$@Fu$A:Ea:bKB:ckdP:D:X:e:xFhEI:46i:l:mn:O:o:pY:qQ:rR:LSHT:Nt:U:vVw:$Both --no-clobber and --convert-links were specified, only --convert-links will be used.$XWj$XWj$`F:v$R$Uj$s$e
                                                  • API String ID: 2483651598-4121705587
                                                  • Opcode ID: 1ec74227dcda7711d1a9dddb4865ac587e4b97a172488f3cbb977bcca7167f79
                                                  • Instruction ID: 188231b1f5788a78f8b0e87c82a2ae18f67df7ade42ad866b82f0f0bbe494f53
                                                  • Opcode Fuzzy Hash: 1ec74227dcda7711d1a9dddb4865ac587e4b97a172488f3cbb977bcca7167f79
                                                  • Instruction Fuzzy Hash: 278258706043508BDB50EF25E8407AA7BE1EF45349F85C85EE4C8AB362CBBDD845CB5A
                                                  APIs
                                                  • free.MSVCRT ref: 0041C63D
                                                    • Part of subcall function 00405BEE: strlen.MSVCRT ref: 00405C01
                                                    • Part of subcall function 00405BEE: strcpy.MSVCRT ref: 00405C50
                                                    • Part of subcall function 00417078: free.MSVCRT ref: 0041709B
                                                    • Part of subcall function 004171B0: strchr.MSVCRT ref: 004171C4
                                                    • Part of subcall function 004171B0: memcpy.MSVCRT ref: 0041723E
                                                  • free.MSVCRT ref: 0041CD35
                                                  • time.MSVCRT ref: 0041CD70
                                                  • free.MSVCRT ref: 0041CE34
                                                  • free.MSVCRT ref: 0041CE85
                                                  • memcpy.MSVCRT ref: 0041D14D
                                                    • Part of subcall function 004055FC: time.MSVCRT ref: 00405609
                                                    • Part of subcall function 004055FC: strlen.MSVCRT ref: 00405619
                                                    • Part of subcall function 004055FC: strcpy.MSVCRT ref: 00405668
                                                    • Part of subcall function 004055FC: strrchr.MSVCRT ref: 00405773
                                                    • Part of subcall function 00460B8C: strlen.MSVCRT ref: 00460B98
                                                  • free.MSVCRT ref: 0041D288
                                                  • free.MSVCRT ref: 0041D3AF
                                                  • free.MSVCRT ref: 0041D59B
                                                  • free.MSVCRT ref: 0041D5C1
                                                  • free.MSVCRT ref: 0041D5D6
                                                  • strchr.MSVCRT ref: 0041D852
                                                  • free.MSVCRT ref: 0041D8D3
                                                  • fclose.MSVCRT ref: 0041CADC
                                                    • Part of subcall function 00419089: free.MSVCRT ref: 004190CE
                                                    • Part of subcall function 00419089: memset.MSVCRT ref: 004190F4
                                                    • Part of subcall function 00402C9B: free.MSVCRT ref: 00402D2B
                                                  • free.MSVCRT ref: 0041EC57
                                                  • free.MSVCRT ref: 0041EC69
                                                  • free.MSVCRT ref: 0041EC7E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$strlen$memcpystrchrstrcpytime$fclosememsetstrrchr
                                                  • String ID: [following]$#$#$#$#$.$HTTP$Proxy$`F:v$c$false$ignored$true$unspecified
                                                  • API String ID: 2612153770-42555389
                                                  • Opcode ID: f74aa882846484268ed53c1cdca7a07fdc7e3a43d000ce34980933213ebff977
                                                  • Instruction ID: a2eb3ef9208f9efa22f1865fd0fe99ffb446e39562b9a40eb83c86957f8f9a72
                                                  • Opcode Fuzzy Hash: f74aa882846484268ed53c1cdca7a07fdc7e3a43d000ce34980933213ebff977
                                                  • Instruction Fuzzy Hash: 614316B4A043488FCB10DF69C9847DEBBF1BF49304F10899AE899AB351D3789981CF56

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 6860 4011fd-401221 6863 401423-401437 _amsg_exit 6860->6863 6864 401227-401246 6860->6864 6865 40124c-40124e 6863->6865 6866 40143d-40145d _initterm 6863->6866 6864->6865 6864->6866 6868 401463-401469 6865->6868 6869 401254-40125b 6865->6869 6866->6868 6866->6869 6870 401279-4012b7 call 66fbf0 SetUnhandledExceptionFilter call 67da90 call 66fa20 6869->6870 6871 40125d-401276 6869->6871 6879 401304-40130c 6870->6879 6880 4012b9-4012bb 6870->6880 6871->6870 6881 401322-401351 malloc 6879->6881 6882 40130e-401317 6879->6882 6883 4012d1-4012d7 6880->6883 6889 401353-401388 strlen malloc memcpy 6881->6889 6884 401400-401404 6882->6884 6885 40131d 6882->6885 6887 4012c0-4012c2 6883->6887 6888 4012d9-4012dc 6883->6888 6884->6885 6885->6881 6890 4012e3-4012e5 6887->6890 6891 4012c4-4012c7 6887->6891 6892 4012ce 6888->6892 6893 4012de-4012e1 6888->6893 6889->6889 6894 40138a-4013de call 66f700 call 42569f 6889->6894 6896 4012f5-4012fd 6890->6896 6897 4012e7 6890->6897 6891->6890 6895 4012c9 6891->6895 6892->6883 6893->6892 6904 4013e4-4013ec 6894->6904 6905 4014ab-4014d2 exit call 66f740 6894->6905 6895->6892 6898 4012f0-4012f3 6896->6898 6899 4012ff 6896->6899 6897->6899 6898->6896 6898->6899 6899->6879 6907 4013f8-4013ff 6904->6907 6908 4013ee-4013f3 _cexit 6904->6908 6908->6907
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: malloc$ExceptionFilterUnhandled_amsg_exit_cexit_inittermmemcpystrlen
                                                  • String ID: [&$r&$|&
                                                  • API String ID: 2574462208-2878343020
                                                  • Opcode ID: ed578bdb480cc311f77da22850f2fe22eb7945d20703ba5584c3be5d5269d204
                                                  • Instruction ID: 50c0881524fdb69a46c22aeaa8bbfc4e3e9115ed8bfbba8d6b94334e01a07d4e
                                                  • Opcode Fuzzy Hash: ed578bdb480cc311f77da22850f2fe22eb7945d20703ba5584c3be5d5269d204
                                                  • Instruction Fuzzy Hash: B65138B49043008FD790AF68E9813AA7BF1FB45305F44843ED989AB3B2D77D9844CB4A
                                                  APIs
                                                  • CertOpenSystemStoreA.CRYPT32 ref: 0043F884
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: CertOpenStoreSystem
                                                  • String ID:
                                                  • API String ID: 4293387918-0
                                                  • Opcode ID: b402aaa50ce190a6c99d3d37fd5c7e2dc981649117f72b52044d55a151b2ef25
                                                  • Instruction ID: 4d466bb2319b6e579c871f2267e1586c8195d24fd2308686dff6990ee7ffb06b
                                                  • Opcode Fuzzy Hash: b402aaa50ce190a6c99d3d37fd5c7e2dc981649117f72b52044d55a151b2ef25
                                                  • Instruction Fuzzy Hash: 9AF01D70A00301DBC718FF7DD98164637E4AB48749F41A539E844D7360E778D9888BAA

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 6427 42621e-426258 call 47d13c 6431 426293-4262a0 6427->6431 6432 42625a-426261 6427->6432 6434 4262a2-4262a9 6431->6434 6435 4262ca-4262ce 6431->6435 6432->6431 6433 426263-42628e call 47d13c call 424b8d exit 6432->6433 6433->6431 6434->6435 6439 4262ab-4262c3 call 47d13c 6434->6439 6436 4262d4-4262db 6435->6436 6437 42635a-426376 6435->6437 6436->6437 6440 4262dd-4262e4 6436->6440 6442 4263a2-4263a9 6437->6442 6443 426378-426394 6437->6443 6439->6435 6440->6437 6448 4262e6-426355 call 47d13c call 424b8d call 47d13c * 2 exit 6440->6448 6446 4263d5-4263dc 6442->6446 6447 4263ab-4263c7 6442->6447 6443->6442 6455 426396-42639d exit 6443->6455 6452 4263e7-4263ee 6446->6452 6453 4263de-4263e5 6446->6453 6447->6446 6463 4263c9-4263d0 exit 6447->6463 6448->6437 6459 4263f0-4263f7 6452->6459 6460 42641d-426424 6452->6460 6453->6452 6458 42644a-426451 6453->6458 6455->6442 6461 426453-42645a 6458->6461 6462 42645c-426463 6458->6462 6459->6460 6465 4263f9-426418 call 47d13c exit 6459->6465 6460->6458 6466 426426-426445 call 47d13c exit 6460->6466 6461->6462 6468 4264bf-4264c6 6461->6468 6469 426465-426484 call 47d13c exit 6462->6469 6470 426489-426490 6462->6470 6463->6446 6465->6460 6466->6458 6478 4264c8-4264df call 4428ec 6468->6478 6479 4264fd-426504 6468->6479 6469->6470 6470->6468 6475 426492-426499 6470->6475 6475->6468 6483 42649b-4264ba call 47d13c exit 6475->6483 6478->6479 6491 4264e1-4264f8 call 421e55 6478->6491 6480 426513-426536 call 421e55 6479->6480 6481 426506-42650d 6479->6481 6498 426538-42656c call 421e55 free 6480->6498 6499 42656e-426598 call 421e55 free 6480->6499 6481->6480 6487 4265a2-4265a9 6481->6487 6483->6468 6493 4265ab-4265b2 6487->6493 6494 42660c-426613 6487->6494 6491->6479 6502 4265d2-4265d9 6493->6502 6503 4265b4-4265c6 call 43b102 6493->6503 6500 426615-426626 call 424e4f 6494->6500 6501 42663f-426646 6494->6501 6498->6487 6499->6487 6528 426633-42663a exit 6500->6528 6529 426628-426631 6500->6529 6504 426677-42667e 6501->6504 6505 426648-426651 6501->6505 6506 4265e5-4265ec 6502->6506 6507 4265db-4265e0 call 43b0d2 6502->6507 6503->6502 6521 4265c8 6503->6521 6515 426680 call 43efb3 6504->6515 6516 426685-42668c 6504->6516 6505->6504 6513 426653-426672 call 47d13c exit 6505->6513 6506->6494 6517 4265ee-426600 call 43b102 6506->6517 6507->6506 6513->6504 6515->6516 6526 42669b-4266d7 call 670640 6516->6526 6527 42668e-426696 call 4279e8 6516->6527 6517->6494 6534 426602 6517->6534 6521->6502 6536 4266d9-4266f8 call 47d13c exit 6526->6536 6537 4266fd-4267b7 call 424073 6526->6537 6527->6526 6528->6501 6529->6501 6529->6528 6534->6494 6536->6537 6544 4267b9 call 4335b4 6537->6544 6545 4267be-4267ca 6537->6545 6544->6545 6547 4267e9-4267f0 6545->6547 6548 4267cc-4267e4 call 42400a 6545->6548 6550 426956-426976 call 43f281 call 47c7e4 6547->6550 6551 4267f6-4267ff 6547->6551 6548->6547 6565 426978 call 424896 6550->6565 6566 42697d-426c74 6550->6566 6553 426843-42684a 6551->6553 6554 426801-42680b 6551->6554 6557 426853 6553->6557 6558 42684c-426851 6553->6558 6554->6553 6556 42680d-42683e 6554->6556 6572 4268d2-4268dc 6556->6572 6559 426858-426875 call 464696 6557->6559 6558->6559 6568 426890-4268aa _fileno call 464819 6559->6568 6569 426877-42688b perror exit 6559->6569 6565->6566 6578 426c76-426cb6 call 42e07d call 43adcc 6566->6578 6579 426cd5-426cdc 6566->6579 6577 4268af-4268b1 6568->6577 6569->6568 6575 426914-42691e 6572->6575 6576 4268de-4268e5 6572->6576 6575->6550 6585 426920-426927 6575->6585 6582 4268f0-42690f call 47d13c exit 6576->6582 6583 4268e7-4268ee 6576->6583 6577->6572 6584 4268b3-4268c9 6577->6584 6578->6579 6614 426cb8-426cd0 call 423ef3 6578->6614 6580 426ce2-426e08 call 48b5a0 call 423ef3 call 43adcc 6579->6580 6581 426e0d-426e14 6579->6581 6580->6581 6590 426e16-426e1d 6581->6590 6591 426e24-426e2b 6581->6591 6582->6575 6583->6575 6583->6582 6584->6572 6589 4268cb 6584->6589 6592 426932-426951 call 47d13c exit 6585->6592 6593 426929-426930 6585->6593 6589->6572 6590->6591 6597 426e1f call 42ebc7 6590->6597 6600 426e5e-426e6d 6591->6600 6601 426e2d-426e34 6591->6601 6592->6550 6593->6550 6593->6592 6597->6591 6602 426e73-426fa7 call 429d6b call 424c5d call 460b8c call 424c5d call 460b8c call 429d2c call 42d4d7 call 435a66 time call 434664 call 423ef3 free * 2 6600->6602 6603 42700b-427012 6600->6603 6601->6600 6608 426e36-426e3a 6601->6608 6602->6603 6653 426fa9-426fc2 6602->6653 6609 427014 call 420f20 6603->6609 6610 427019-427020 6603->6610 6608->6600 6611 426e3c-426e43 6608->6611 6609->6610 6617 427022-427029 6610->6617 6618 427030-427037 6610->6618 6611->6603 6616 426e49-426e58 6611->6616 6614->6579 6616->6600 6616->6603 6617->6618 6622 42702b call 424937 6617->6622 6624 427042-42704c 6618->6624 6625 427039-427040 6618->6625 6622->6618 6629 427053-427067 call 423763 call 43ae04 exit 6624->6629 6631 42704e call 403062 6624->6631 6625->6624 6625->6629 6631->6629 6653->6603 6654 426fc4-426fc6 6653->6654 6655 426fc8-426fca 6654->6655 6656 426fcc-427006 call 435a66 call 423ef3 6654->6656 6655->6603 6655->6656 6656->6603
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: exit$free
                                                  • String ID: 8$@Fu$XWj$`F:v$R$Uj$s$e
                                                  • API String ID: 1509854097-890522916
                                                  • Opcode ID: 1a7d32b82dc41dbdf47be3c4a5263812b1062f983925f846d73f45cee298b6e4
                                                  • Instruction ID: 86128c84b6a6301a850a87bbb96bc2046bd3a9b9e24af5c5971cc7cb1d06ddf8
                                                  • Opcode Fuzzy Hash: 1a7d32b82dc41dbdf47be3c4a5263812b1062f983925f846d73f45cee298b6e4
                                                  • Instruction Fuzzy Hash: 994236706043108BDB50EF65E88179ABBE1EF45349F85C85DE488AB352DBBCD841CB5A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$strlen$ferrorfwritestrtol
                                                  • String ID: /$8
                                                  • API String ID: 1157984370-364544503
                                                  • Opcode ID: 7378f553dc583aebfe3b40eb529954ce463475829aa0a47ca28134428cf16a17
                                                  • Instruction ID: 9905ee9e163896404219eace85484dfa719a2146e6a31bc7573304c2093db135
                                                  • Opcode Fuzzy Hash: 7378f553dc583aebfe3b40eb529954ce463475829aa0a47ca28134428cf16a17
                                                  • Instruction Fuzzy Hash: 6272F470E00329DBDB20DFA9E88479DBBF1BF48314F50856AE898A7390D7789985CF05

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 6910 426a65-426a77 call 425106 6913 426a86-426a96 call 42f125 6910->6913 6914 426a79-426a80 6910->6914 6919 426aaa-426ab7 call 42ea9b 6913->6919 6920 426a98-426aa8 call 42f125 6913->6920 6914->6913 6915 426b18-426b69 call 42d6be 6914->6915 6921 426b6e-426b75 6915->6921 6919->6915 6932 426ab9-426ad9 call 42f125 6919->6932 6920->6919 6920->6932 6923 426c16-426c49 free * 2 6921->6923 6924 426b7b-426b83 6921->6924 6929 426c51-426c74 call 43b899 6923->6929 6930 426c4c call 43023d 6923->6930 6924->6923 6927 426b89-426ba1 call 434708 6924->6927 6927->6923 6938 426ba3-426baf 6927->6938 6946 426c76-426cb6 call 42e07d call 43adcc 6929->6946 6947 426cd5-426cdc 6929->6947 6930->6929 6943 426adb-426aeb call 42f125 6932->6943 6944 426aed 6932->6944 6941 426bb1-426bb8 call 42400a 6938->6941 6942 426bbd-426beb call 423ef3 call 480098 6938->6942 6941->6942 6942->6923 6969 426bed-426c11 call 47d628 call 423ef3 6942->6969 6943->6944 6945 426af4-426b16 call 42a175 6943->6945 6944->6945 6945->6921 6946->6947 6981 426cb8-426cd0 call 423ef3 6946->6981 6952 426ce2-426e08 call 48b5a0 call 423ef3 call 43adcc 6947->6952 6953 426e0d-426e14 6947->6953 6952->6953 6960 426e16-426e1d 6953->6960 6961 426e24-426e2b 6953->6961 6960->6961 6965 426e1f call 42ebc7 6960->6965 6967 426e5e-426e6d 6961->6967 6968 426e2d-426e34 6961->6968 6965->6961 6970 426e73-426fa7 call 429d6b call 424c5d call 460b8c call 424c5d call 460b8c call 429d2c call 42d4d7 call 435a66 time call 434664 call 423ef3 free * 2 6967->6970 6971 42700b-427012 6967->6971 6968->6967 6975 426e36-426e3a 6968->6975 6969->6923 6970->6971 7024 426fa9-426fc2 6970->7024 6976 427014 call 420f20 6971->6976 6977 427019-427020 6971->6977 6975->6967 6978 426e3c-426e43 6975->6978 6976->6977 6984 427022-427029 6977->6984 6985 427030-427037 6977->6985 6978->6971 6983 426e49-426e58 6978->6983 6981->6947 6983->6967 6983->6971 6984->6985 6990 42702b call 424937 6984->6990 6993 427042-42704c 6985->6993 6994 427039-427040 6985->6994 6990->6985 6999 427053-427067 call 423763 call 43ae04 exit 6993->6999 7001 42704e call 403062 6993->7001 6994->6993 6994->6999 7001->6999 7024->6971 7025 426fc4-426fc6 7024->7025 7026 426fc8-426fca 7025->7026 7027 426fcc-427006 call 435a66 call 423ef3 7025->7027 7026->6971 7026->7027 7027->6971
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: 8$XWj$R$s$e
                                                  • API String ID: 1294909896-1997389215
                                                  • Opcode ID: 73d227d54efdcb5b1ff2dcca430196e2d60db19b3e9a690bb2fb0965c52940f2
                                                  • Instruction ID: 5a9b0b19a21206e99b3f72d2b5e1d64c1f985ebb14a81466567074eae4f5b02a
                                                  • Opcode Fuzzy Hash: 73d227d54efdcb5b1ff2dcca430196e2d60db19b3e9a690bb2fb0965c52940f2
                                                  • Instruction Fuzzy Hash: 46E11A74A047108FDB50EF65E88179ABBF1FF49304F85885EE488A7311DBB99885CF4A

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 7031 4269ef-426c74 call 42fc92 call 423ef3 free call 43adcc call 43b899 7043 426c76-426cb6 call 42e07d call 43adcc 7031->7043 7044 426cd5-426cdc 7031->7044 7043->7044 7068 426cb8-426cd0 call 423ef3 7043->7068 7045 426ce2-426cf1 7044->7045 7046 426e0d-426e14 7044->7046 7048 426cf4 call 48b5a0 7045->7048 7049 426e16-426e1d 7046->7049 7050 426e24-426e2b 7046->7050 7052 426cf9-426e08 call 423ef3 call 43adcc 7048->7052 7049->7050 7053 426e1f call 42ebc7 7049->7053 7055 426e5e-426e6d 7050->7055 7056 426e2d-426e34 7050->7056 7052->7046 7053->7050 7057 426e73-426fa7 call 429d6b call 424c5d call 460b8c call 424c5d call 460b8c call 429d2c call 42d4d7 call 435a66 time call 434664 call 423ef3 free * 2 7055->7057 7058 42700b-427012 7055->7058 7056->7055 7062 426e36-426e3a 7056->7062 7057->7058 7107 426fa9-426fc2 7057->7107 7063 427014 call 420f20 7058->7063 7064 427019-427020 7058->7064 7062->7055 7065 426e3c-426e43 7062->7065 7063->7064 7071 427022-427029 7064->7071 7072 427030-427037 7064->7072 7065->7058 7070 426e49-426e58 7065->7070 7068->7044 7070->7055 7070->7058 7071->7072 7076 42702b call 424937 7071->7076 7078 427042-42704c 7072->7078 7079 427039-427040 7072->7079 7076->7072 7083 427053-427058 call 423763 call 43ae04 7078->7083 7085 42704e call 403062 7078->7085 7079->7078 7079->7083 7094 42705d-427067 exit 7083->7094 7085->7083 7107->7058 7108 426fc4-426fc6 7107->7108 7109 426fc8-426fca 7108->7109 7110 426fcc-427006 call 435a66 call 423ef3 7108->7110 7109->7058 7109->7110 7110->7058
                                                  APIs
                                                    • Part of subcall function 0042FC92: strchr.MSVCRT ref: 0042FCBE
                                                    • Part of subcall function 0042FC92: free.MSVCRT ref: 0042FD26
                                                  • free.MSVCRT ref: 00426A3C
                                                    • Part of subcall function 0043B899: free.MSVCRT ref: 0043B8AD
                                                    • Part of subcall function 0043B899: free.MSVCRT ref: 0043B8C4
                                                    • Part of subcall function 0043B899: free.MSVCRT ref: 0043B8DC
                                                    • Part of subcall function 0043B899: free.MSVCRT ref: 0043B8F1
                                                  • time.MSVCRT ref: 00426F23
                                                    • Part of subcall function 0042E07D: free.MSVCRT ref: 0042E15C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$strchrtime
                                                  • String ID: 8$OVj$XWj$R$s$e
                                                  • API String ID: 3825303048-391996190
                                                  • Opcode ID: e47f8577d7101ca6e49969ae4e9fda311abbb9038d34b6a419c04f08b8b48dd8
                                                  • Instruction ID: 4bdc3fd723bd35aa116c51f05fe1364621b74aae86b32c22054a12b0e69fdb17
                                                  • Opcode Fuzzy Hash: e47f8577d7101ca6e49969ae4e9fda311abbb9038d34b6a419c04f08b8b48dd8
                                                  • Instruction Fuzzy Hash: 96A11774A047158FDB50EF25E88169ABBF1FF49304F81C85EE488A7311DBB99885CF4A

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 7114 41734d-41738d strlen * 2 7115 4173d4-4173dd 7114->7115 7116 41738f-4173d1 strlen * 2 7115->7116 7117 4173df-417499 call 460a42 strlen memcpy strlen memcpy * 2 7115->7117 7116->7115 7120 41754c-417555 7117->7120 7121 41755b-41758b 7120->7121 7122 41749e-417549 strlen memcpy strlen memcpy 7120->7122 7123 4175a0-4175c9 call 402aef 7121->7123 7124 41758d-41759b call 42400a 7121->7124 7122->7120 7128 4175f0-4175f4 7123->7128 7129 4175cb-4175ee call 402c21 call 423ef3 7123->7129 7124->7123 7131 4175f6-417624 call 47d4c9 7128->7131 7132 41762d-417647 free 7128->7132 7129->7132 7131->7132 7138 417626 7131->7138 7138->7132
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: strlen$memcpy$free
                                                  • String ID:
                                                  • API String ID: 749734937-0
                                                  • Opcode ID: b32a3bf4bfc4870d45fb74b80ff61508bdc1460ab216cd73aa15073acbe492c5
                                                  • Instruction ID: 79dbbf5fa9ae02b723d4d30afbea053788e8b7b1d50dd24c229c6e2782c1b77b
                                                  • Opcode Fuzzy Hash: b32a3bf4bfc4870d45fb74b80ff61508bdc1460ab216cd73aa15073acbe492c5
                                                  • Instruction Fuzzy Hash: 84B19EB4E04609AFCB40DFA8C485A9DBBF1FF48314F15C859E898AB311E378A944CF56

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 7139 42d89d-42d8ab 7140 42d8b1-42d90a call 423ef3 call 43023d free * 2 call 43b899 7139->7140 7141 42d934-42d959 call 43b899 free 7139->7141 7159 42d928-42d92f 7140->7159 7160 42d90c-42d924 7140->7160 7148 42d95b-42d964 7141->7148 7149 42d97e-42d985 7141->7149 7148->7149 7152 42d966-42d978 7148->7152 7153 42d987-42d98e 7149->7153 7154 42d9bc-42d9f3 call 41ed0a 7149->7154 7152->7149 7153->7154 7158 42d990-42d9a6 call 413add 7153->7158 7161 42d9f8-42dac4 7154->7161 7158->7154 7166 42d9a8-42d9b7 call 423ef3 7158->7166 7163 42e067-42e06b 7159->7163 7160->7159 7167 42dac6-42dad1 call 43023d 7161->7167 7168 42dad8-42dadc 7161->7168 7169 42e078-42e07c 7163->7169 7170 42e06d-42e073 call 43adcc 7163->7170 7166->7154 7167->7168 7173 42dae4-42db61 free call 4313cd free 7168->7173 7174 42dade-42dae2 7168->7174 7170->7169 7183 42db63-42db7a call 43b900 7173->7183 7184 42db7f-42dc1d call 43b9b9 free call 42f58c call 42fc92 call 424617 call 423ef3 7173->7184 7174->7173 7183->7184 7197 42dc2a-42dc64 free * 3 7184->7197 7198 42dc1f-42dc25 call 43023d 7184->7198 7200 42e066 7197->7200 7201 42dc6a-42dc86 7197->7201 7198->7197 7200->7163 7201->7200
                                                  APIs
                                                  • free.MSVCRT ref: 0042D8DD
                                                  • free.MSVCRT ref: 0042D8EF
                                                    • Part of subcall function 0043B899: free.MSVCRT ref: 0043B8AD
                                                    • Part of subcall function 0043B899: free.MSVCRT ref: 0043B8C4
                                                    • Part of subcall function 0043B899: free.MSVCRT ref: 0043B8DC
                                                    • Part of subcall function 0043B899: free.MSVCRT ref: 0043B8F1
                                                  • free.MSVCRT ref: 0042D945
                                                  • free.MSVCRT ref: 0042DB07
                                                  • free.MSVCRT ref: 0042DB3C
                                                    • Part of subcall function 0043023D: free.MSVCRT ref: 00430256
                                                    • Part of subcall function 0043023D: free.MSVCRT ref: 0043026E
                                                    • Part of subcall function 0043023D: free.MSVCRT ref: 00430285
                                                    • Part of subcall function 0043023D: free.MSVCRT ref: 0043029C
                                                    • Part of subcall function 0043023D: free.MSVCRT ref: 004302B4
                                                    • Part of subcall function 0043023D: free.MSVCRT ref: 004302CC
                                                    • Part of subcall function 0043023D: free.MSVCRT ref: 004302E4
                                                    • Part of subcall function 0043023D: free.MSVCRT ref: 004302FC
                                                    • Part of subcall function 0043023D: free.MSVCRT ref: 00430314
                                                    • Part of subcall function 0043023D: free.MSVCRT ref: 0043032C
                                                    • Part of subcall function 0043023D: free.MSVCRT ref: 00430341
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: )$0
                                                  • API String ID: 1294909896-535590263
                                                  • Opcode ID: fe488163996673be135351baf3fc68c618209ac8fe68856adf5f1f6a06ea1da8
                                                  • Instruction ID: 862285783a962f45e2c5f4bf1dc5e5f9f25dd8d455fb14d0804f7b3437606c76
                                                  • Opcode Fuzzy Hash: fe488163996673be135351baf3fc68c618209ac8fe68856adf5f1f6a06ea1da8
                                                  • Instruction Fuzzy Hash: 88A195B4E043599FDB40EFA9D08579EBBF0AF08304F45885EE888AB351D7789885CF56

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 7202 54bdc0-54be0b strlen MultiByteToWideChar 7203 54bee0-54bef3 7202->7203 7204 54be11-54be55 call 670640 MultiByteToWideChar 7202->7204 7208 54bef5-54bf01 7203->7208 7209 54bf18-54bf4b MultiByteToWideChar 7203->7209 7210 54be57 7204->7210 7211 54be61-54be9d strlen MultiByteToWideChar 7204->7211 7213 54be59-54be60 7208->7213 7217 54bf07-54bf16 fopen 7208->7217 7209->7208 7212 54bf4d 7209->7212 7210->7213 7211->7210 7214 54be9f-54beb1 _wfopen 7211->7214 7214->7213 7216 54beb3-54bebe _errno 7214->7216 7218 54bec7-54bed1 fopen 7216->7218 7219 54bec0-54bec5 _errno 7216->7219 7220 54bed6-54bedd 7217->7220 7218->7220 7219->7210 7219->7218
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$_errnofopenstrlen$_wfopen
                                                  • String ID:
                                                  • API String ID: 3461520518-0
                                                  • Opcode ID: 275a2c7ecdec79219aada254a0907888565657743c9cb52870c2fe22b07bed98
                                                  • Instruction ID: 38b2b7b6da2ec73aa722b8c2587b30fa8d6f78ef96be0e7a32f6a6363b7bb566
                                                  • Opcode Fuzzy Hash: 275a2c7ecdec79219aada254a0907888565657743c9cb52870c2fe22b07bed98
                                                  • Instruction Fuzzy Hash: 1E41F3B09083059FE700EF69D98529EBBF4FF84714F00C92EE99897240D778D958CB96

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 7221 426d3a-426d43 7222 426d45-426d51 7221->7222 7223 426db8-426dcd call 43ba68 7221->7223 7225 426daf-426db6 7222->7225 7228 426df4-426dfa 7223->7228 7229 426dcf-426def call 460686 call 423ef3 7223->7229 7225->7223 7226 426d53-426d71 7225->7226 7230 426d7a-426d81 7226->7230 7232 426e02-426e14 call 43adcc 7228->7232 7233 426dfd call 48af40 7228->7233 7229->7228 7234 426d73-426d76 7230->7234 7235 426d83-426dab call 43a5b5 7230->7235 7242 426e16-426e1d 7232->7242 7243 426e24-426e2b 7232->7243 7233->7232 7234->7230 7235->7225 7242->7243 7244 426e1f call 42ebc7 7242->7244 7245 426e5e-426e6d 7243->7245 7246 426e2d-426e34 7243->7246 7244->7243 7247 426e73-426fa7 call 429d6b call 424c5d call 460b8c call 424c5d call 460b8c call 429d2c call 42d4d7 call 435a66 time call 434664 call 423ef3 free * 2 7245->7247 7248 42700b-427012 7245->7248 7246->7245 7250 426e36-426e3a 7246->7250 7247->7248 7289 426fa9-426fc2 7247->7289 7251 427014 call 420f20 7248->7251 7252 427019-427020 7248->7252 7250->7245 7253 426e3c-426e43 7250->7253 7251->7252 7257 427022-427029 7252->7257 7258 427030-427037 7252->7258 7253->7248 7256 426e49-426e58 7253->7256 7256->7245 7256->7248 7257->7258 7260 42702b call 424937 7257->7260 7262 427042-42704c 7258->7262 7263 427039-427040 7258->7263 7260->7258 7266 427053-427067 call 423763 call 43ae04 exit 7262->7266 7267 42704e call 403062 7262->7267 7263->7262 7263->7266 7267->7266 7289->7248 7290 426fc4-426fc6 7289->7290 7291 426fc8-426fca 7290->7291 7292 426fcc-427006 call 435a66 call 423ef3 7290->7292 7291->7248 7291->7292 7292->7248
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$exittime
                                                  • String ID: XWj$R$s$e
                                                  • API String ID: 2327188956-2831100210
                                                  • Opcode ID: c0c4c882d2b4437bae5b8591a15bda57697e8e3fa46ead01aa725bcdf076431f
                                                  • Instruction ID: e3224db08ec068d2c97d7c066e8258c4dcc9a79a20290058fe33d81adda7d449
                                                  • Opcode Fuzzy Hash: c0c4c882d2b4437bae5b8591a15bda57697e8e3fa46ead01aa725bcdf076431f
                                                  • Instruction Fuzzy Hash: C6916A74A04714CFDB40EF65E48069ABBF1FF49308F51885EE488A7312DBB99884CF0A

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 7296 421835-42186d memset getenv 7297 4218e4-4218f2 call 434708 7296->7297 7298 42186f-421883 call 434708 7296->7298 7301 4218f7-4218f9 7297->7301 7298->7297 7305 421885-4218b7 call 421602 7298->7305 7303 421926-42192e 7301->7303 7304 4218fb-421923 call 421602 7301->7304 7307 421930-421957 call 47d13c exit 7303->7307 7308 42195c call 42156b 7303->7308 7304->7303 7305->7303 7316 4218b9-4218df call 47d13c exit 7305->7316 7307->7308 7315 421961-421968 7308->7315 7317 421a25 7315->7317 7318 42196e-421983 strcmp 7315->7318 7316->7297 7320 421a26-421a27 7317->7320 7321 421985-4219b8 call 460686 call 47d13c 7318->7321 7322 4219ba-4219ce call 434708 7318->7322 7330 4219fa-421a02 7321->7330 7329 4219d0-4219f7 call 421602 7322->7329 7322->7330 7329->7330 7333 421a10-421a23 free 7330->7333 7334 421a04-421a0b exit 7330->7334 7333->7320 7334->7333
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: exit$freegetenvmemsetstrcmp
                                                  • String ID: @6j
                                                  • API String ID: 2316467743-2879409633
                                                  • Opcode ID: 0c08f4214b20baed03230fc34161df495ff80cdeac6b68a6959e1e03693e15be
                                                  • Instruction ID: 3248f881c551947c21f6dd63d13bbf1119deca145cd0f561b0fdcdb7e6985f29
                                                  • Opcode Fuzzy Hash: 0c08f4214b20baed03230fc34161df495ff80cdeac6b68a6959e1e03693e15be
                                                  • Instruction Fuzzy Hash: DE5129B0A0531A9FCB00EFA4C5452EEFBF2AF55304F45886DE4C8AB312E7389944DB56

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 7336 419f22-419f53 7337 419f59-419f68 7336->7337 7338 41a0da-41a0de 7336->7338 7339 419f70-419fa5 call 41917c 7337->7339 7340 419f6a-419f6d 7337->7340 7341 41a0e4-41a103 call 401d26 7338->7341 7342 41a5be-41a5d6 7338->7342 7350 41a08b-41a090 7339->7350 7351 419fab-419fda call 4022ae 7339->7351 7340->7339 7348 41a105-41a10a 7341->7348 7349 41a10f-41a113 7341->7349 7345 41a5db-41a5e0 7342->7345 7348->7345 7352 41a115-41a128 call 402354 7349->7352 7353 41a13e-41a142 7349->7353 7355 41a092-41a0c8 call 460686 call 423ef3 7350->7355 7356 41a0cd-41a0d1 7350->7356 7365 41a015-41a047 call 4603aa call 423ef3 7351->7365 7366 419fdc-41a013 call 4603aa call 423ef3 7351->7366 7384 41a134-41a139 7352->7384 7385 41a12a-41a12f 7352->7385 7357 41a503-41a50c 7353->7357 7358 41a148-41a151 7353->7358 7355->7345 7356->7338 7359 41a0d3 7356->7359 7357->7342 7363 41a512-41a52a call 440184 7357->7363 7358->7357 7362 41a157-41a191 call 43447e call 416f88 7358->7362 7359->7338 7396 41a1d3-41a1dc 7362->7396 7397 41a193-41a1d1 call 43447e call 417078 7362->7397 7377 41a52f-41a534 7363->7377 7388 41a04c-41a058 7365->7388 7366->7388 7382 41a536-41a53d 7377->7382 7383 41a569-41a583 call 4406ca 7377->7383 7390 41a550-41a556 call 402c9b 7382->7390 7391 41a53f-41a547 7382->7391 7400 41a585-41a58c 7383->7400 7401 41a5b8-41a5bb 7383->7401 7384->7345 7385->7345 7394 41a05a-41a068 call 42400a 7388->7394 7395 41a06d-41a074 7388->7395 7408 41a55b-41a567 7390->7408 7391->7390 7398 41a549-41a54e call 419089 7391->7398 7394->7395 7395->7338 7403 41a076-41a089 call 41729c 7395->7403 7406 41a203-41a207 7396->7406 7407 41a1de-41a1fe call 417078 7396->7407 7397->7406 7398->7408 7411 41a59f-41a5a5 call 402c9b 7400->7411 7412 41a58e-41a596 7400->7412 7401->7342 7403->7338 7409 41a236-41a2a3 call 43447e call 417078 call 41734d call 417648 7406->7409 7410 41a209-41a230 call 417078 7406->7410 7407->7406 7408->7345 7435 41a2a5-41a2ac 7409->7435 7436 41a2db-41a2ed call 417b0b 7409->7436 7410->7409 7426 41a5aa-41a5b6 7411->7426 7412->7411 7419 41a598-41a59d call 419089 7412->7419 7419->7426 7426->7345 7438 41a2bf-41a2c5 call 402c9b 7435->7438 7439 41a2ae-41a2b6 7435->7439 7444 41a348-41a356 7436->7444 7445 41a2ef-41a319 call 402c21 call 423ef3 7436->7445 7443 41a2ca-41a2d6 7438->7443 7439->7438 7442 41a2b8-41a2bd call 419089 7439->7442 7442->7443 7443->7345 7448 41a358-41a36a free 7444->7448 7449 41a36f-41a37b 7444->7449 7466 41a31b-41a323 7445->7466 7467 41a32c-41a332 call 402c9b 7445->7467 7451 41a496-41a49b 7448->7451 7452 41a390-41a3b7 call 417b36 call 417f19 7449->7452 7453 41a37d-41a38b call 42400a 7449->7453 7458 41a4b2 7451->7458 7459 41a49d-41a4b0 call 4603aa 7451->7459 7474 41a445-41a494 free call 460b8c call 418152 free 7452->7474 7475 41a3bd-41a440 time call 434664 call 423ef3 call 4603aa call 423ef3 free 7452->7475 7453->7452 7460 41a4b7-41a4e6 call 423ef3 free 7458->7460 7459->7460 7460->7345 7466->7467 7472 41a325-41a32a call 419089 7466->7472 7473 41a337-41a343 7467->7473 7472->7473 7473->7345 7474->7451 7487 41a4eb-41a500 free 7474->7487 7475->7345 7487->7357
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d41d86614df0d35bfe67e29a002b0e6fd9c3c576a655602e17f7e786c84c5615
                                                  • Instruction ID: 808072c06ef70044cfe723c26c6aae70f9e1a5c46350caa80fa86ae7215b2da0
                                                  • Opcode Fuzzy Hash: d41d86614df0d35bfe67e29a002b0e6fd9c3c576a655602e17f7e786c84c5615
                                                  • Instruction Fuzzy Hash: F822F4B4909308DFCB00EFA9C08469EBBF1AF49314F11885EE898AB351D779D885DF56
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$strrchr
                                                  • String ID: "$.
                                                  • API String ID: 274422233-3921061877
                                                  • Opcode ID: a77223877e1fb2817aef3ad722b323f08f8f1b1bcb50b45d9bb84de42cdf7f7c
                                                  • Instruction ID: ef6e76cabf1cb4016e6f3718b405b77d4fae76a798a86b11a3fb4da175df8c93
                                                  • Opcode Fuzzy Hash: a77223877e1fb2817aef3ad722b323f08f8f1b1bcb50b45d9bb84de42cdf7f7c
                                                  • Instruction Fuzzy Hash: AB51A2B8A043498FCB10EF69C984B9EBBF1BF49314F11499AE8589B351D738DD80CB16
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$strrchr
                                                  • String ID: "$.
                                                  • API String ID: 274422233-3921061877
                                                  • Opcode ID: ea76f4e53d2d4a5d1bcade641160f171a98bc873afefab0174d7bf4a8261a747
                                                  • Instruction ID: c16188e50795d23b001826d3561bf5da6994c05f4d9c9cc00c8f619bf5c8707c
                                                  • Opcode Fuzzy Hash: ea76f4e53d2d4a5d1bcade641160f171a98bc873afefab0174d7bf4a8261a747
                                                  • Instruction Fuzzy Hash: 6451B2B8A043498FCB10EF69C984B9EBBF1BF49314F11499AE8599B351D738DD80CB16
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$strrchr
                                                  • String ID: "$.
                                                  • API String ID: 274422233-3921061877
                                                  • Opcode ID: 5df61849ce4f0f16a41505c2873c44e5ea51da8e695b819c9476985536bcc7f1
                                                  • Instruction ID: b340bb9326995705ef740733356b50f47bf59f2315722873c9ffd5b355f3137f
                                                  • Opcode Fuzzy Hash: 5df61849ce4f0f16a41505c2873c44e5ea51da8e695b819c9476985536bcc7f1
                                                  • Instruction Fuzzy Hash: F451B2B8A043498FCB10EF69C984B9EBBF1BF49314F11499AE8589B351D738DD84CB16
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$strrchr
                                                  • String ID: "$.
                                                  • API String ID: 274422233-3921061877
                                                  • Opcode ID: ef0e4a82d16e19fe93269afa24d0a7e0888c8fead389b1fd02818a1f6e63eb3b
                                                  • Instruction ID: 45eb2d3cebc1999a0807d9782dffaa879d5fe24969202ffdadbafde1384fc73c
                                                  • Opcode Fuzzy Hash: ef0e4a82d16e19fe93269afa24d0a7e0888c8fead389b1fd02818a1f6e63eb3b
                                                  • Instruction Fuzzy Hash: 6F51B2B8A043498FCB10EF69C984B9EBBF1BF49314F11499AE8589B351D738DD80CB16

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 8507 4012e9 8508 4012f0-4012f3 8507->8508 8509 4012f5-4012fd 8508->8509 8510 4012ff-40130c 8508->8510 8509->8508 8509->8510 8512 401322-401351 malloc 8510->8512 8513 40130e-401317 8510->8513 8517 401353-401388 strlen malloc memcpy 8512->8517 8514 401400-401404 8513->8514 8515 40131d 8513->8515 8514->8515 8515->8512 8517->8517 8518 40138a-4013de call 66f700 call 42569f 8517->8518 8523 4013e4-4013ec 8518->8523 8524 4014ab-4014d2 exit call 66f740 8518->8524 8526 4013f8-4013ff 8523->8526 8527 4013ee-4013f3 _cexit 8523->8527 8527->8526
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: malloc$_cexitmemcpystrlen
                                                  • String ID: [&
                                                  • API String ID: 701060287-3271595223
                                                  • Opcode ID: aeb69ca1cb686830ec74dfba737b7d52bbc258aae849b950b97e445a881a7e29
                                                  • Instruction ID: 965c3d292cbff97388150151c545c7a908f9f77cb4e3548335915cb6c1eb0e9f
                                                  • Opcode Fuzzy Hash: aeb69ca1cb686830ec74dfba737b7d52bbc258aae849b950b97e445a881a7e29
                                                  • Instruction Fuzzy Hash: DB3108B99007008FD760DF68E58065AB7F1FB85310F05843ED948A7362E739A845CF59

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 8529 41977d-4197a7 8530 4197b2-4197b9 8529->8530 8531 4197a9-4197b0 8529->8531 8532 4197c3-4197c7 8530->8532 8533 4197bb-4197c0 8530->8533 8531->8532 8534 4197e6-4197f1 call 42ff39 8532->8534 8535 4197c9-4197d2 8532->8535 8533->8532 8541 4197f4-419838 call 416f88 call 417078 8534->8541 8535->8534 8536 4197d4-4197e4 call 460b8c 8535->8536 8536->8541 8546 419880-41988c 8541->8546 8547 41983a-41987b call 417078 * 2 8541->8547 8548 419892-4198b6 call 4196b5 8546->8548 8549 41991d-41992a 8546->8549 8547->8546 8560 4198f1-419918 call 460b8c call 417078 8548->8560 8561 4198b8-4198ee call 423bc1 8548->8561 8552 419972-419979 8549->8552 8553 41992c-41996d call 439b71 call 43447e call 417078 8549->8553 8556 4199bb-4199c4 8552->8556 8557 41997b-4199b9 call 43447e call 417078 8552->8557 8553->8552 8563 4199c6-4199e6 call 417078 8556->8563 8564 4199eb-419a16 call 417078 8556->8564 8557->8564 8560->8549 8561->8560 8563->8564 8580 419a18-419a3b call 417078 8564->8580 8581 419a3d-419a5b call 417078 8564->8581 8585 419a60-419a68 8580->8585 8581->8585 8586 419a77-419a7e 8585->8586 8587 419a6a-419a75 8585->8587 8589 419a80-419a87 8586->8589 8590 419a9f-419aa6 8586->8590 8588 419ad4-419adc 8587->8588 8595 419aeb-419af2 8588->8595 8596 419ade-419ae9 8588->8596 8591 419a92-419a9d 8589->8591 8592 419a89-419a90 8589->8592 8593 419ab5-419abc 8590->8593 8594 419aa8-419ab3 8590->8594 8591->8588 8592->8590 8592->8591 8600 419acb-419ace 8593->8600 8601 419abe-419ac9 8593->8601 8594->8588 8598 419b13-419b1a 8595->8598 8599 419af4-419afb 8595->8599 8597 419b48-419b4f 8596->8597 8606 419b51-419b58 8597->8606 8607 419b87-419b8e 8597->8607 8604 419b29-419b30 8598->8604 8605 419b1c-419b27 8598->8605 8602 419b06-419b11 8599->8602 8603 419afd-419b04 8599->8603 8600->8588 8601->8588 8602->8597 8603->8598 8603->8602 8608 419b32-419b3d 8604->8608 8609 419b3f-419b42 8604->8609 8605->8597 8610 419b63-419b82 call 4270ae 8606->8610 8611 419b5a-419b61 8606->8611 8612 419b90-419b97 8607->8612 8613 419bda-419c71 call 42f24c strchr call 43447e call 417078 8607->8613 8608->8597 8609->8597 8610->8607 8611->8607 8611->8610 8612->8613 8614 419b99-419ba1 8612->8614 8626 419c73-419c96 call 417078 8613->8626 8627 419c98-419cbf call 417078 8613->8627 8617 419ba3-419baa 8614->8617 8618 419bac-419bd8 call 4176e3 8614->8618 8617->8613 8617->8618 8618->8613 8633 419ce4-419ceb 8626->8633 8632 419cc1-419cdf call 417078 8627->8632 8627->8633 8632->8633 8635 419cf1-419cf8 8633->8635 8636 419e84 8633->8636 8637 419d07-419d31 call 417078 8635->8637 8638 419cfa-419d01 8635->8638 8639 419e87-419e8e 8636->8639 8645 419d33-419d4d strlen 8637->8645 8646 419d52-419d7b call 43477f 8637->8646 8638->8637 8640 419e16-419e2d call 4428ec 8638->8640 8647 419e61-419e7f call 417078 8640->8647 8648 419e2f-419e46 call 4428ec 8640->8648 8649 419dd7-419e14 call 439b71 call 460b8c call 417078 8645->8649 8646->8649 8657 419d7d-419dd2 call 47d628 call 460686 call 423ef3 call 417648 8646->8657 8647->8636 8648->8647 8658 419e48-419e5f call 4428ec 8648->8658 8649->8636 8657->8639 8658->8636 8658->8647
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: freestrchrstrlen
                                                  • String ID: $:$Thu, 01 Jan 1970 00:00:00 GMT$j
                                                  • API String ID: 1913134129-4165282386
                                                  • Opcode ID: e873dad4b49a565b372f5e2d0ea3ec106194eca045ed6557181ed330444d5a2c
                                                  • Instruction ID: 097db0f84014798812c83fa85dddf91717b471fdfade40e66580a72709d19211
                                                  • Opcode Fuzzy Hash: e873dad4b49a565b372f5e2d0ea3ec106194eca045ed6557181ed330444d5a2c
                                                  • Instruction Fuzzy Hash: 7A22E0B46093059FDB00EF69D584A9ABBF1BF49344F15881EE8889B361D778EC84CF46

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 8674 41ee13-41ee18 8675 41ee42-41ee46 8674->8675 8676 41ee1a-41ee21 8674->8676 8679 41ee48-41ee56 call 434708 8675->8679 8680 41ee8f-41eea9 8675->8680 8677 41ee23-41ee26 8676->8677 8678 41ee28 8676->8678 8681 41ee2b-41ee3e call 430dd5 8677->8681 8678->8681 8688 41ee5b-41ee5d 8679->8688 8683 41eeab 8680->8683 8684 41eeaf-41eeb6 8680->8684 8681->8675 8683->8684 8685 41eec5-41eecc 8684->8685 8686 41eeb8-41eebf 8684->8686 8690 41eee1-41eee8 8685->8690 8691 41eece-41eedd 8685->8691 8686->8685 8689 41eec1 8686->8689 8688->8680 8693 41ee5f-41ee66 8688->8693 8689->8685 8694 41ef6f-41ef9b call 42e5e7 time call 434664 8690->8694 8695 41eeee-41eef5 8690->8695 8691->8690 8693->8680 8696 41ee68-41ee6f 8693->8696 8716 41efbb-41efc2 8694->8716 8717 41ef9d-41efa5 8694->8717 8698 41eef7-41eeff 8695->8698 8699 41ef4b-41ef52 8695->8699 8696->8680 8700 41ee71-41ee8a call 419352 8696->8700 8698->8699 8704 41ef01-41ef05 8698->8704 8701 41ef54-41ef69 call 434708 8699->8701 8702 41ef6b 8699->8702 8713 41ff79-41ff7d 8700->8713 8701->8694 8701->8702 8702->8694 8704->8699 8708 41ef07-41ef1c call 434708 8704->8708 8708->8699 8722 41ef1e-41ef41 call 41a5e1 8708->8722 8714 41ff88-41ff8c 8713->8714 8715 41ff7f-41ff86 8713->8715 8719 41ffbd-41ffcb call 419289 8714->8719 8720 41ff8e-41ffa9 free 8714->8720 8715->8714 8715->8719 8723 41efc8-41efe2 call 43184e 8716->8723 8724 41f06e-41f072 8716->8724 8717->8716 8721 41efa7-41efb6 call 423ef3 8717->8721 8739 41ffce-41ffd7 8719->8739 8720->8719 8725 41ffab-41ffbb call 460b8c 8720->8725 8721->8716 8722->8694 8743 41ef43-41ef46 8722->8743 8740 41efe4-41f02d call 416f58 call 423ef3 8723->8740 8741 41f02f-41f04c call 423ef3 8723->8741 8727 41f074-41f07c 8724->8727 8728 41f08f-41f09c 8724->8728 8725->8719 8727->8728 8734 41f07e-41f08d 8727->8734 8736 41f09e-41f17e 8728->8736 8734->8736 8747 41f180-41f184 8736->8747 8748 41f186-41f190 8736->8748 8750 41f051-41f057 call 43f01b 8740->8750 8741->8750 8743->8739 8747->8748 8751 41f192-41f1e5 call 41c4b7 8747->8751 8748->8751 8756 41f05c-41f067 free 8750->8756 8758 41f1ea-41f20c time call 434664 8751->8758 8756->8724 8761 41f223-41f23a 8758->8761 8762 41f20e-41f221 call 460b8c 8758->8762 8761->8713 8762->8761
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$time
                                                  • String ID: =
                                                  • API String ID: 3693300059-2322244508
                                                  • Opcode ID: 620d097b1c9ea0e39160d960c1ec1b0304843c5eb76f4ef63a14d2d0d373fe80
                                                  • Instruction ID: 0a8e64a59e763a9ce6429c94df9d8a589197a0bc5ff596ea875e4037381337eb
                                                  • Opcode Fuzzy Hash: 620d097b1c9ea0e39160d960c1ec1b0304843c5eb76f4ef63a14d2d0d373fe80
                                                  • Instruction Fuzzy Hash: DCC1FA74A043489FCB50DF69C4407DEBBF1AF0A304F04849AE898AB352D779D986CF5A

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 8767 4f39a0-4f39b3 8768 4f39e6-4f39e8 8767->8768 8769 4f39b5-4f39b8 8767->8769 8772 4f39ea-4f39f1 8768->8772 8770 4f39ba-4f39bf 8769->8770 8771 4f39f2-4f39f8 8769->8771 8770->8768 8775 4f39c1-4f39cb 8770->8775 8773 4f39fe-4f3a17 8771->8773 8774 4f3ad8 8771->8774 8776 4f3a19-4f3a33 call 53fea0 8773->8776 8777 4f3a81-4f3aa0 call 540340 8773->8777 8778 4f3ae0-4f3b06 call 51e160 8774->8778 8779 4f3a5b-4f3a61 8775->8779 8780 4f39d1-4f39d4 8775->8780 8788 4f3a38 8776->8788 8794 4f3a3a-4f3a3c 8777->8794 8795 4f3aa2-4f3aa4 8777->8795 8778->8772 8783 4f3a67-4f3a6d 8779->8783 8784 4f3b30-4f3b35 8779->8784 8786 4f39de-4f39e1 8780->8786 8787 4f39d6-4f39db 8780->8787 8790 4f3a73-4f3a7c 8783->8790 8791 4f3b20-4f3b2b 8783->8791 8784->8783 8786->8768 8793 4f39e3 8786->8793 8787->8786 8788->8794 8790->8780 8791->8790 8793->8768 8796 4f3a42-4f3a55 8794->8796 8797 4f3b10-4f3b18 8794->8797 8798 4f3abb-4f3ad3 call 5403f0 8795->8798 8799 4f3aa6-4f3ab8 memcpy 8795->8799 8796->8779 8796->8780 8797->8778 8798->8794 8799->8798
                                                  APIs
                                                  • memcpy.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,005754F3), ref: 004F3AB3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: memcpy
                                                  • String ID: A$`$b$d
                                                  • API String ID: 3510742995-2771120670
                                                  • Opcode ID: 497120e677dea6e6dea1beffe9b69278fb1ca67cff807daaf74c707520e4089b
                                                  • Instruction ID: aef0e62bf40d3a5c934b54a8e3b3f9b7348d10a4fb89c1de7016fccd1a5de335
                                                  • Opcode Fuzzy Hash: 497120e677dea6e6dea1beffe9b69278fb1ca67cff807daaf74c707520e4089b
                                                  • Instruction Fuzzy Hash: C1418FB1A087498FD3109F15C18572BBBE2EF95345F20C81EDACA4B351D3B9E985CB46

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 8802 413dd4-413e39 call 460b09 call 411ba2 call 434708 8808 413e3e-413e40 8802->8808 8809 413f35-413f39 8808->8809 8810 413e46-413e53 call 413aa4 8808->8810 8813 413f01-413f32 call 41406b free call 423ef3 8810->8813 8814 413e59-413e7a call 434a31 8810->8814 8813->8809 8820 413e9d-413ebe call 41406b free 8814->8820 8821 413e7c-413e9b call 41387f 8814->8821 8828 413ec0-413ecb fclose 8820->8828 8829 413f34 8820->8829 8821->8820 8827 413ecd-413ee9 _fileno call 464819 8821->8827 8832 413ef4-413eff fclose 8827->8832 8833 413eeb-413ef1 8827->8833 8828->8809 8829->8809 8832->8809 8833->8832
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$fclose$_filenocallocmemset
                                                  • String ID:
                                                  • API String ID: 3449806882-0
                                                  • Opcode ID: 15e9becd5e46de83467f95fa9ddf09e7ef5359ba3cd663d5132cba1a15197062
                                                  • Instruction ID: f0e79def0d53250ed262c60bc357264f9804f3a32227b7e46b5d2f497c822c56
                                                  • Opcode Fuzzy Hash: 15e9becd5e46de83467f95fa9ddf09e7ef5359ba3cd663d5132cba1a15197062
                                                  • Instruction Fuzzy Hash: F84182B49057049FCB40EFA5C18969EFBF0AF44309F01885EE898AB351D7789A85CB46
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: ferrorfwrite$_fileno
                                                  • String ID:
                                                  • API String ID: 3592838841-0
                                                  • Opcode ID: d8a6108e16a8e68ff5a2a4556ee9fbfb05c248eed037320316f599e93a08bbe8
                                                  • Instruction ID: f54c4a89a6f91f0cd43f628b621eee4eefa336d910b88ed4659e1127a814c1a0
                                                  • Opcode Fuzzy Hash: d8a6108e16a8e68ff5a2a4556ee9fbfb05c248eed037320316f599e93a08bbe8
                                                  • Instruction Fuzzy Hash: 3221A6B4914715EFCB50EF78D985A9EBBF0AF48304F008D29E898D7310E778D9508B56
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: ferrorfputs$_fileno
                                                  • String ID:
                                                  • API String ID: 310648706-0
                                                  • Opcode ID: 7c58974ccf9d783a330a5cf04a87b04508ebfa75091d7fa345e4e6e2a7ba6abf
                                                  • Instruction ID: b3f142affa705196af26a418d433a645ceaa96a3feccb72d9e89d320e1d0934f
                                                  • Opcode Fuzzy Hash: 7c58974ccf9d783a330a5cf04a87b04508ebfa75091d7fa345e4e6e2a7ba6abf
                                                  • Instruction Fuzzy Hash: 812193709142049BCB40EF78D98969DBBF0EF04310F008D6AE9A9DB351E778E9458B86
                                                  APIs
                                                  • strlen.MSVCRT ref: 0041941C
                                                  • fclose.MSVCRT ref: 0041946F
                                                  • strlen.MSVCRT ref: 004194A0
                                                    • Part of subcall function 0047D4C9: ferror.MSVCRT ref: 0047D4D5
                                                    • Part of subcall function 0047D4C9: fwrite.MSVCRT ref: 0047D4F9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: strlen$fcloseferrorfwrite
                                                  • String ID: 6
                                                  • API String ID: 60933242-498629140
                                                  • Opcode ID: 1496fcc939fc4c85bc027832da91bf7e5a354d0238d166d15008d50e6eba9e09
                                                  • Instruction ID: 41490ea08d38f5c031c65a4a0e1b96f2f5238db138098914d4a954de67eb5931
                                                  • Opcode Fuzzy Hash: 1496fcc939fc4c85bc027832da91bf7e5a354d0238d166d15008d50e6eba9e09
                                                  • Instruction Fuzzy Hash: 1391BE74A082089FCB44CF69C494A9EBBF1BF48354F14892AE898EB351D339ED85CF55
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$memset
                                                  • String ID:
                                                  • API String ID: 2717317152-3916222277
                                                  • Opcode ID: c95099f1b1ba6e802d3e0e982dced5e6ba0788d1ff89921ceb082aea28af9b33
                                                  • Instruction ID: 166d69ca5f3f16b8fad2fb634196107f0005583bfd63ec33eb2758ed592b3820
                                                  • Opcode Fuzzy Hash: c95099f1b1ba6e802d3e0e982dced5e6ba0788d1ff89921ceb082aea28af9b33
                                                  • Instruction Fuzzy Hash: 78B1F770A083489FDB10EFA4D5857DEBBF1BF09345F00885AE894EB341D3B89985DB0A
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a7c7ba596437187c94d6268acc1911a50dbb34eaca0964d1a5b91be920a0ecbf
                                                  • Instruction ID: cf7e16e0554f92252ad1b8a70143a527ef91d3dc4a30c83dbc81827b2e2aa2a8
                                                  • Opcode Fuzzy Hash: a7c7ba596437187c94d6268acc1911a50dbb34eaca0964d1a5b91be920a0ecbf
                                                  • Instruction Fuzzy Hash: 4851E3B46042069FCB10DF28D484B9E7BE1AF88354F54C52AF8098B391D379E881CF96
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: #
                                                  • API String ID: 1294909896-1885708031
                                                  • Opcode ID: 978434c4c49930387b52edbf89f155e1d6cdf4a21255d9b389c9e506a96bc254
                                                  • Instruction ID: a0d4243d262b47d471b74db286fe56e8889208a22803b9b8f03a010c74fc011a
                                                  • Opcode Fuzzy Hash: 978434c4c49930387b52edbf89f155e1d6cdf4a21255d9b389c9e506a96bc254
                                                  • Instruction Fuzzy Hash: 6F4136B49052498FDB10EF64C884BDEBBF0BF05304F11499AE8A49B352D378D985CF89
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: #
                                                  • API String ID: 1294909896-1885708031
                                                  • Opcode ID: 9723ccd9cdee488990608615eb4d5838bdbddb6377fcee2c30cb596651fba2bf
                                                  • Instruction ID: e410c56f6590e62ab90ae5a39fd0e8de74edec7df31a91afd7966630aba616d1
                                                  • Opcode Fuzzy Hash: 9723ccd9cdee488990608615eb4d5838bdbddb6377fcee2c30cb596651fba2bf
                                                  • Instruction Fuzzy Hash: A24115B4A042498FDB10EF64C884BDEBBF0BF05304F11499AE8649B352D378D985CF99
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: #
                                                  • API String ID: 1294909896-1885708031
                                                  • Opcode ID: ffb9b38d2cc040dd394aaaf56b61d18c6f4037d3e4f321e65aa71301f4bed40b
                                                  • Instruction ID: 785210258a9d37480deb3a86f9126cc30d9074fd5be2df1ee8de5db8cd704001
                                                  • Opcode Fuzzy Hash: ffb9b38d2cc040dd394aaaf56b61d18c6f4037d3e4f321e65aa71301f4bed40b
                                                  • Instruction Fuzzy Hash: 024114B4A042498FDB10EF64C884BDEBBF0BF05304F11899AE8649B352D378D985CF99
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: #
                                                  • API String ID: 1294909896-1885708031
                                                  • Opcode ID: b3daa94482c57a7a2589ca59f8c387141f6c0f0f27d68a98c2ea13de8983dab7
                                                  • Instruction ID: 57915c63eaa9b8c0ca951baae56b3f79d8f9ef5f3fe95050119084277df2f5ad
                                                  • Opcode Fuzzy Hash: b3daa94482c57a7a2589ca59f8c387141f6c0f0f27d68a98c2ea13de8983dab7
                                                  • Instruction Fuzzy Hash: 2D4115B4A042498FDB10EF64C884BDEBBF0BF05304F11499AE8649B392D378D985DF95
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: #
                                                  • API String ID: 1294909896-1885708031
                                                  • Opcode ID: a3c2fa572bc3bf9351fac8711145b6a22fbe8d6f8aa9d98ce36347097f80d6bb
                                                  • Instruction ID: 5ac31a97a5ed70ab5cbef0135f7a92194b53beb600d23fea9fe8f0a869715d13
                                                  • Opcode Fuzzy Hash: a3c2fa572bc3bf9351fac8711145b6a22fbe8d6f8aa9d98ce36347097f80d6bb
                                                  • Instruction Fuzzy Hash: B84114B4A042498FDB10EF64C888BDEBBF0BF05304F11499AE8649B352D378D985CF99
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: #
                                                  • API String ID: 1294909896-1885708031
                                                  • Opcode ID: 5b846f7cd01a69ce3ac63edc554a45ddd86485903fbd4ee1448e0b1e1855ca8b
                                                  • Instruction ID: 393f6fbe86eb3052d1150eee4edd620d502d5f1d79251ab8ab4f07f415afa825
                                                  • Opcode Fuzzy Hash: 5b846f7cd01a69ce3ac63edc554a45ddd86485903fbd4ee1448e0b1e1855ca8b
                                                  • Instruction Fuzzy Hash: 194115B4A042498FDB10EF64C884BDEBBF0BF05304F11499AE8A49B352D378D985DF99
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$strchr
                                                  • String ID: #
                                                  • API String ID: 2369460792-1885708031
                                                  • Opcode ID: 3414fd8933293d5b8d56627fe1e30dae5b0ffbc70b9b2ab37d5f0c3d687e1ae6
                                                  • Instruction ID: fc894027f21602762751c51404fea94026679a2a31089601ea60a9137592f78b
                                                  • Opcode Fuzzy Hash: 3414fd8933293d5b8d56627fe1e30dae5b0ffbc70b9b2ab37d5f0c3d687e1ae6
                                                  • Instruction Fuzzy Hash: 3231F3B4A042498FDB10EF64C884BDEBBF0BF05314F11499AE864AB392D378D985CF95
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: freestrlen$ConsoleTitle
                                                  • String ID:
                                                  • API String ID: 1994177765-0
                                                  • Opcode ID: 715eb3f84be509a2fcfde9d7eced7b9bf160d2ef9c52872fb052417eb36322c3
                                                  • Instruction ID: 2f602f612cc5dcb17bf36531ddd28f8a568aee71e474dc415e782fe3a2ce588a
                                                  • Opcode Fuzzy Hash: 715eb3f84be509a2fcfde9d7eced7b9bf160d2ef9c52872fb052417eb36322c3
                                                  • Instruction Fuzzy Hash: 6901C8B49047009BC740FF78E8856497BF0FB48359F01892CE498A7375E7B898848B4A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: _strdup
                                                  • String ID: !$0
                                                  • API String ID: 1169197092-301933775
                                                  • Opcode ID: 79a52b6e4f34db024e4c6e05b39ccc2a276c99eb97d15e5d5ff391509746279a
                                                  • Instruction ID: a97783de4948e808963add2b9b8a9abf3a019dea89433ed59dd298d3474c37d7
                                                  • Opcode Fuzzy Hash: 79a52b6e4f34db024e4c6e05b39ccc2a276c99eb97d15e5d5ff391509746279a
                                                  • Instruction Fuzzy Hash: 7BB1B6B49093059FD740EFA5D58579EBBF0FB48309F10982EE884A7361D7BC9884CB5A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: CloseCreateHandleThread
                                                  • String ID: N(A
                                                  • API String ID: 3032276028-3653478004
                                                  • Opcode ID: ec526c603de0b0b10e0024b37cf8df1287289b8a841516e3ed8ee141f38516f8
                                                  • Instruction ID: 631b2ffcea90623892d965e4f6b82528291757fb6156b80df46224b602b1eb86
                                                  • Opcode Fuzzy Hash: ec526c603de0b0b10e0024b37cf8df1287289b8a841516e3ed8ee141f38516f8
                                                  • Instruction Fuzzy Hash: 224108B4904259DFDB40EFA8E9406AEBBF0FF48304F00942AE894E7351E7789945CF56
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID:
                                                  • API String ID: 1294909896-0
                                                  • Opcode ID: 801cc7c671341da9f68db69cc4637cddc346a3bb823fdedf0cad0dec95c28f3d
                                                  • Instruction ID: 28db09580a94379e77249def635cd5996f72259a314eeb98d7cf7f30adc93cd3
                                                  • Opcode Fuzzy Hash: 801cc7c671341da9f68db69cc4637cddc346a3bb823fdedf0cad0dec95c28f3d
                                                  • Instruction Fuzzy Hash: 857190B4E0421ADFDF40DFA8D5847AEB7F0BF48304F50896AE854A7351D378AA40CB66
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: freemallocmemcpy
                                                  • String ID:
                                                  • API String ID: 3056473165-0
                                                  • Opcode ID: e5ec8185e0ddb8ed4c4c3f98b6164e58c42435811ab1d4489655ecd469324852
                                                  • Instruction ID: 10e4e68930de5d37dd9f93d49253b5c4b3ec9597af1e54e3a791a7f4ae55e52b
                                                  • Opcode Fuzzy Hash: e5ec8185e0ddb8ed4c4c3f98b6164e58c42435811ab1d4489655ecd469324852
                                                  • Instruction Fuzzy Hash: 0D418071A087158BC710AF6AE88415EFFE5FFC4754F24A93EEA8887351D6718840CB82
                                                  APIs
                                                  • free.MSVCRT ref: 004019B1
                                                  • free.MSVCRT ref: 004019FF
                                                    • Part of subcall function 00401570: abort.MSVCRT ref: 00401650
                                                    • Part of subcall function 0047CD45: WSASocketA.WS2_32 ref: 0047CD88
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$Socketabort
                                                  • String ID: )
                                                  • API String ID: 1951475325-2427484129
                                                  • Opcode ID: 47875c9e49db872d097af2beac85b8ab2a4a18329d0e9fc9c45670de49320ff4
                                                  • Instruction ID: 5b1bc68b90c6b26f7c28ce40ca56dd23dbb7e68ff23e3cb575841447d016275c
                                                  • Opcode Fuzzy Hash: 47875c9e49db872d097af2beac85b8ab2a4a18329d0e9fc9c45670de49320ff4
                                                  • Instruction Fuzzy Hash: 8E71A6B49083059FDB50EFA5C4857AEBBF1EF48304F10886EE898A7351E778D9458F1A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: strcpystrlen
                                                  • String ID: /
                                                  • API String ID: 2543315000-2043925204
                                                  • Opcode ID: a3b17050d1f158781d9add6fd88b0b898e1ff1bdd6c7f8b4b8e1e936783b695a
                                                  • Instruction ID: ef246b47ee778193be47cea3fe124f909e76eb280f3e4781451f6bb9bbd0dbc9
                                                  • Opcode Fuzzy Hash: a3b17050d1f158781d9add6fd88b0b898e1ff1bdd6c7f8b4b8e1e936783b695a
                                                  • Instruction Fuzzy Hash: C6517B30D04289CACF24DFA8D8953EEBBF1EF45304F04956BD4699B380C379898ACB45
                                                  APIs
                                                  • GetConsoleWindow.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0043AE6A
                                                  • CoInitializeEx.COMBASE ref: 0043AE9D
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: ConsoleInitializeWindow
                                                  • String ID:
                                                  • API String ID: 3649267127-0
                                                  • Opcode ID: f6f6232bc1c7fe2cdb30d62d726dad77c52301c1740cddb9bed7a33d9f0e6cbf
                                                  • Instruction ID: 8d280c15701826048ab65ea85b58ecb918681cff13f09564d54c7fb0260c2724
                                                  • Opcode Fuzzy Hash: f6f6232bc1c7fe2cdb30d62d726dad77c52301c1740cddb9bed7a33d9f0e6cbf
                                                  • Instruction Fuzzy Hash: 7C511B74605300DFE714DF68D98478ABBF4EB48319F10C519E5649B3B0E7B89984EF8A
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: strcmp$strlen
                                                  • String ID:
                                                  • API String ID: 982114912-0
                                                  • Opcode ID: 13fa9c9e605a36617a72e788f1147402baeed7aa7496a1dd21c4337cf82b006f
                                                  • Instruction ID: 082e9b9c434e19273e75ba9a1ec8f7dc47641338265906865c71cbe26f4c8f1b
                                                  • Opcode Fuzzy Hash: 13fa9c9e605a36617a72e788f1147402baeed7aa7496a1dd21c4337cf82b006f
                                                  • Instruction Fuzzy Hash: C441CC74904209DFCB00EF68C4857ADBBF1EF45315F00886AE954DB350E778D981DB96
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: exit$Startup
                                                  • String ID:
                                                  • API String ID: 3290106138-0
                                                  • Opcode ID: 35c906f8250cf9bf4b3bb54227b665c69b0c9c208ce901add356cc7b19cf7847
                                                  • Instruction ID: ba5bf66eb07a604192a5a88e9c68f9ca633e385c5d616674ea4bbda6c7e28e68
                                                  • Opcode Fuzzy Hash: 35c906f8250cf9bf4b3bb54227b665c69b0c9c208ce901add356cc7b19cf7847
                                                  • Instruction Fuzzy Hash: 64113474904305DFDB40BF68D9412ADBBF1EF89309F80D82DE4889B351D7B89885CB4A
                                                  APIs
                                                  • strcmp.MSVCRT ref: 0042721B
                                                    • Part of subcall function 004213D9: getenv.MSVCRT ref: 004213EF
                                                    • Part of subcall function 004213D9: free.MSVCRT ref: 00421436
                                                  • strlen.MSVCRT ref: 004270FD
                                                  • free.MSVCRT ref: 0042715E
                                                    • Part of subcall function 0047CF40: strlen.MSVCRT ref: 0047CFCA
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: freestrlen$getenvstrcmp
                                                  • String ID:
                                                  • API String ID: 2448397153-0
                                                  • Opcode ID: afe61a2ce3640a36f12c00694347dcf7a4d2190420514f87bc4dca361c57cb21
                                                  • Instruction ID: 0743a0cb2b298ba9ae7ea8ab5c6fde8c6ef70db0f93a9feed584ed7be7c44891
                                                  • Opcode Fuzzy Hash: afe61a2ce3640a36f12c00694347dcf7a4d2190420514f87bc4dca361c57cb21
                                                  • Instruction Fuzzy Hash: C471F474A08219DFDB00DFA9E484AAABBF4FF09304F54889AE855DB350D378D941CF69
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID:
                                                  • API String ID: 1294909896-0
                                                  • Opcode ID: d0db221c8ffc9b81a0e7f67f5ac5466e610c7987db6fdcd065fe83b5071c2100
                                                  • Instruction ID: aa6813a580a65116210c012cab052189b34e958acc99939f23a3fc6519a6496f
                                                  • Opcode Fuzzy Hash: d0db221c8ffc9b81a0e7f67f5ac5466e610c7987db6fdcd065fe83b5071c2100
                                                  • Instruction Fuzzy Hash: A77117B4A152449FCB40DF68C190AEABBF0EF09314F05C85AECA49B352D739D985CF56
                                                  APIs
                                                    • Part of subcall function 00430350: strlen.MSVCRT ref: 0043035D
                                                    • Part of subcall function 0042E742: strlen.MSVCRT ref: 0042E74F
                                                    • Part of subcall function 0042E742: rename.MSVCRT ref: 0042E922
                                                  • _fdopen.MSVCRT ref: 0041B05E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: strlen$_fdopenrename
                                                  • String ID: `F:v
                                                  • API String ID: 516826447-4072330013
                                                  • Opcode ID: cf2555b4fb802af3a0f6a9a606caf1c3687af937c5ce50fdfb8a4a2aa3d48bc6
                                                  • Instruction ID: 7589cfd2ef86fa9d69714036b616c42fb2a6c61bc901604dfb789caebdacf73e
                                                  • Opcode Fuzzy Hash: cf2555b4fb802af3a0f6a9a606caf1c3687af937c5ce50fdfb8a4a2aa3d48bc6
                                                  • Instruction Fuzzy Hash: 4271C6746143409FDB40EF29C480A9A7BE0FF49354F01885AF998CB321E779DC85CB9A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: exit
                                                  • String ID: @
                                                  • API String ID: 2483651598-2766056989
                                                  • Opcode ID: f19004df49279bc7550a0b8a3df8d7c6affa8de33b375ad2a8e6c0e3c9394521
                                                  • Instruction ID: 555673a0d254e813efa1906ebc93e1e8a8f3f05757b78d1321a0da667d21a47a
                                                  • Opcode Fuzzy Hash: f19004df49279bc7550a0b8a3df8d7c6affa8de33b375ad2a8e6c0e3c9394521
                                                  • Instruction Fuzzy Hash: F041BE70904229CBCB20DF15DA897DEB7F0EF48304F5084AAE848A6290D3799F95CF95
                                                  APIs
                                                  • time.MSVCRT ref: 0041F1F4
                                                    • Part of subcall function 0047CF40: strlen.MSVCRT ref: 0047CFCA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: strlentime
                                                  • String ID: =
                                                  • API String ID: 3241370836-2322244508
                                                  • Opcode ID: 964740f4c99686a495eb6d299b7b2da4ae752580c7eee0f4ccc352cfc92988c6
                                                  • Instruction ID: 70e797156160c8e2c65590d8a2d8c8daf6884810d145fd9066f645a9ee06cd75
                                                  • Opcode Fuzzy Hash: 964740f4c99686a495eb6d299b7b2da4ae752580c7eee0f4ccc352cfc92988c6
                                                  • Instruction Fuzzy Hash: F63192B4904259DFDB50DF68C98079AB7F1AB49304F1089AAE898A7311E7389D89CF45
                                                  APIs
                                                  • SetConsoleTitleA.KERNELBASE ref: 0043F15C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: ConsoleTitle
                                                  • String ID: d
                                                  • API String ID: 3358957663-2564639436
                                                  • Opcode ID: 470ca4840c38c49093014c53db79bdbc5eeb08288b7867b20db8ae8acb14da7d
                                                  • Instruction ID: 63bd806f4766f10f573de8ab512822fe66ff0c499071e59b7ab288b2cf3a0d65
                                                  • Opcode Fuzzy Hash: 470ca4840c38c49093014c53db79bdbc5eeb08288b7867b20db8ae8acb14da7d
                                                  • Instruction Fuzzy Hash: C621BB78E04208DACF00AF95E9446DEBBF4FF4D705F00A46AE864A6264E3389D45CF69
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: time
                                                  • String ID: =
                                                  • API String ID: 1872009285-2322244508
                                                  • Opcode ID: 14d9f3d69f090f1a17790957a2742d18f06f40b48bcf7fb76afe35d3863600da
                                                  • Instruction ID: 8eec7af03fa72e39f5361f43c7037e95f263fa78abe1c5ac9c2e473e214ffc5a
                                                  • Opcode Fuzzy Hash: 14d9f3d69f090f1a17790957a2742d18f06f40b48bcf7fb76afe35d3863600da
                                                  • Instruction Fuzzy Hash: E92180B4A04249DFCB50DF68C88069ABBF1FB49304F11896AE898E7310E738DD85CF56
                                                  APIs
                                                  • abort.MSVCRT(?,?,?,?,?,?,?,?,00402552), ref: 0043F6B6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: abort
                                                  • String ID: 4'
                                                  • API String ID: 4206212132-1610175587
                                                  • Opcode ID: 911f266f9143c72e0447eac51af53391e465a35c68cd5edcef9d4594cc415073
                                                  • Instruction ID: ca16a917f653f69a80e104804aaa2e7a0348c03309473b54e2363fbf34c7c971
                                                  • Opcode Fuzzy Hash: 911f266f9143c72e0447eac51af53391e465a35c68cd5edcef9d4594cc415073
                                                  • Instruction Fuzzy Hash: CE11D7B0804305DBDB54EFB9D94639EBBF0AB44309F00982AD09597361D7BC9A49CF5A
                                                  APIs
                                                  • free.MSVCRT ref: 00440209
                                                    • Part of subcall function 00460B09: calloc.MSVCRT ref: 00460B43
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: callocfree
                                                  • String ID: 7
                                                  • API String ID: 306872129-1790921346
                                                  • Opcode ID: 5d247ad5574d2652f3986449516e2a27e64f1fa262da87ac1319bc533339b0f2
                                                  • Instruction ID: 2e2598d4d15525469d61ed0a8057c319054c3a9d5767f11e4922e6e8e6e4726a
                                                  • Opcode Fuzzy Hash: 5d247ad5574d2652f3986449516e2a27e64f1fa262da87ac1319bc533339b0f2
                                                  • Instruction Fuzzy Hash: EA71E6B49083059FEB10EFA5C4856AEBBF0EF09304F00986AE99497341D778D951CF5A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: memcpy
                                                  • String ID: {
                                                  • API String ID: 3510742995-366298937
                                                  • Opcode ID: 8593c2dc27c60c5dfcabeac99fc87ecb64a0006f14ed6540b60574d0d53536b6
                                                  • Instruction ID: 52c66950c6ccec48e599880332683762f6543f338f764ca9a99d3c4491c18395
                                                  • Opcode Fuzzy Hash: 8593c2dc27c60c5dfcabeac99fc87ecb64a0006f14ed6540b60574d0d53536b6
                                                  • Instruction Fuzzy Hash: C34126746087029FD3109F69C08461EFBE0FF8A758F24C92DE9899B351E778C845CB92
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: exitmemset
                                                  • String ID:
                                                  • API String ID: 2099101326-0
                                                  • Opcode ID: 9d11301d8d0457d865ad5a0a43a07fbcbe6ae79590103d2611f4a8ea91e5833e
                                                  • Instruction ID: 41ae15fc92de30a2dab86ce7de09d4c6dc46d61175eb8e1fc1848420f1f01db8
                                                  • Opcode Fuzzy Hash: 9d11301d8d0457d865ad5a0a43a07fbcbe6ae79590103d2611f4a8ea91e5833e
                                                  • Instruction Fuzzy Hash: 18213870A04258DFCB00EFA8E880ADDBBF0EF49305F41889AE948D7321C77D9A85CB15
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: exitmemset
                                                  • String ID:
                                                  • API String ID: 2099101326-0
                                                  • Opcode ID: ed75e973074cdef3beb622bfe2423ff84917c583f9f467357b2aaf3e8c7d9430
                                                  • Instruction ID: 3ef781411e9eb80c620050ac242bfa0557689184d141cb07de7dffad3e62f522
                                                  • Opcode Fuzzy Hash: ed75e973074cdef3beb622bfe2423ff84917c583f9f467357b2aaf3e8c7d9430
                                                  • Instruction Fuzzy Hash: 71112570A04258CFCB00DFA4E440ADEBBF4EF49305F51989AE588E7311D27D9A45CB1A
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: exitmemset
                                                  • String ID:
                                                  • API String ID: 2099101326-0
                                                  • Opcode ID: d8c4aec8a603dbeca3b416f111519c739c41335eee2eee593aea778c535aa209
                                                  • Instruction ID: ccdf3e9afb81024ebc7595c239ac2f2a92eff6d53d61fcb8c42d16acb8a84207
                                                  • Opcode Fuzzy Hash: d8c4aec8a603dbeca3b416f111519c739c41335eee2eee593aea778c535aa209
                                                  • Instruction Fuzzy Hash: 18111570A042589ECB00DFA4E440ADEBBF0EF49305F51889AE488E7311C27D9A45CB2A
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: exitmemset
                                                  • String ID:
                                                  • API String ID: 2099101326-0
                                                  • Opcode ID: 600320caa1e9103d0db4132fde1cafc95bf4c6b47e46888636e1ba82281d108d
                                                  • Instruction ID: ed3cc8e07aa7325973fa8dbab8a072d0588bf1a75424b4137fad0591a98ac6d8
                                                  • Opcode Fuzzy Hash: 600320caa1e9103d0db4132fde1cafc95bf4c6b47e46888636e1ba82281d108d
                                                  • Instruction Fuzzy Hash: CE11E570A04218DFDB00DFA8E480ADEBBF4EF49305F51885AE488E7351D77D9A44CB26
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: exitmemset
                                                  • String ID:
                                                  • API String ID: 2099101326-0
                                                  • Opcode ID: ec83d1c357471287911a55739f13455890432768a7bf02ae1a45322970a65433
                                                  • Instruction ID: 4ac567a2d8191226b80cc39fea47c300b508cd27c7aefe1b6f0b6c31ec6e91a8
                                                  • Opcode Fuzzy Hash: ec83d1c357471287911a55739f13455890432768a7bf02ae1a45322970a65433
                                                  • Instruction Fuzzy Hash: 5611E570A04218DFDB00DFA8E580ADEBBF4EF49305F51885AE488E7311D77C9A44CB1A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: ;j
                                                  • API String ID: 1294909896-1977938914
                                                  • Opcode ID: ad409d82c504765ab01c8389b7fabd896787edae2e84b6573de13c37c85f4b8c
                                                  • Instruction ID: 1f27e88fa889f734d7828730a967bb973907e3299c71c90dba63bd16e4046c3a
                                                  • Opcode Fuzzy Hash: ad409d82c504765ab01c8389b7fabd896787edae2e84b6573de13c37c85f4b8c
                                                  • Instruction Fuzzy Hash: 2F0157B4A08314AFCB50EFA6E40139EBBF0EF45305F80885EA494A7301D7BC9980CF0A
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: Socket_open_osfhandle
                                                  • String ID:
                                                  • API String ID: 2711568458-0
                                                  • Opcode ID: 4e8f23924f10283bdc33ec1ef7bc4c70bd5dbc860a21ee0b48c98884fea07405
                                                  • Instruction ID: 9953b17059341df9d053e2a1fd5358db5be358a1a020380fa032044eb7135807
                                                  • Opcode Fuzzy Hash: 4e8f23924f10283bdc33ec1ef7bc4c70bd5dbc860a21ee0b48c98884fea07405
                                                  • Instruction Fuzzy Hash: 76F0B6B05043049FCB40EF69D48569EBBF0BB44318F00CA1DE9A897390D7B999448F96
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: _utimetime
                                                  • String ID:
                                                  • API String ID: 2365392533-0
                                                  • Opcode ID: 5d7b8e0e51d40e907e0c0ef6eca9a611386bd34c2ab41a737e0b0de17b86c666
                                                  • Instruction ID: 3d67df263d2003d0eb0fd2ed5d194bb3cbd82581c6bc4154f53429d51ba7083d
                                                  • Opcode Fuzzy Hash: 5d7b8e0e51d40e907e0c0ef6eca9a611386bd34c2ab41a737e0b0de17b86c666
                                                  • Instruction Fuzzy Hash: 33F092B49043049FCB40EFA9D48169DBBF0AF49354F01991EE8A9D7391D77899809F46
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID:
                                                  • API String ID: 1294909896-0
                                                  • Opcode ID: 1a1ef44b58ce5155f59f007b431e5b7c724047e294409035cc663f2025063bb0
                                                  • Instruction ID: be9f1a485516f7723145d8fd51c122b4ee4804a0062790a37a97143ab2b29634
                                                  • Opcode Fuzzy Hash: 1a1ef44b58ce5155f59f007b431e5b7c724047e294409035cc663f2025063bb0
                                                  • Instruction Fuzzy Hash: 5F31D1B8A01208AFCB44EF99D484A5DBBF1FF48314F55849AEC549B312DB78E940CF55
                                                  APIs
                                                    • Part of subcall function 0042144C: getenv.MSVCRT ref: 00421459
                                                    • Part of subcall function 0042144C: exit.MSVCRT ref: 004214CA
                                                  • free.MSVCRT ref: 004215DF
                                                  • free.MSVCRT ref: 004215F1
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$exitgetenv
                                                  • String ID:
                                                  • API String ID: 775086512-0
                                                  • Opcode ID: 3ef97d3ec32bd3dbb1181ce44b909ee2e43835db7ec2e0d324c69bdb11b47f8f
                                                  • Instruction ID: 68ffc5274a1bfae9c889fb61ba61b14076a662a9578c0e379acd83caab325263
                                                  • Opcode Fuzzy Hash: 3ef97d3ec32bd3dbb1181ce44b909ee2e43835db7ec2e0d324c69bdb11b47f8f
                                                  • Instruction Fuzzy Hash: 4D11F7B0D04228AFCB00EFA5D44939EBBF0AF54308F40889AE4A5AB351D3799A84CF55
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID:
                                                  • API String ID: 1294909896-0
                                                  • Opcode ID: 91310159e71ccbf5a56bbe3123e289c33a0625fe3579f224f16f9b26aa63a248
                                                  • Instruction ID: 14c0435220f77f5d26195cbd89c5a62e6a8faf6bde1fa3b9da596c105c73ac4b
                                                  • Opcode Fuzzy Hash: 91310159e71ccbf5a56bbe3123e289c33a0625fe3579f224f16f9b26aa63a248
                                                  • Instruction Fuzzy Hash: 4F1172B4904309AFDB40EFA9C485A9EBBF0EF49344F018859E998AB311E778E9408F55
                                                  APIs
                                                    • Part of subcall function 004213D9: getenv.MSVCRT ref: 004213EF
                                                    • Part of subcall function 004213D9: free.MSVCRT ref: 00421436
                                                  • free.MSVCRT ref: 0042151A
                                                  • free.MSVCRT ref: 00421553
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$getenv
                                                  • String ID:
                                                  • API String ID: 942515318-0
                                                  • Opcode ID: 518c54a789697a5c6b4831e54babfa33ed932a3633049fddc5fc828749e89317
                                                  • Instruction ID: c0bd9c489619de216a66150b8a8ca0707502c7fb59418c44fbc18873d13140e5
                                                  • Opcode Fuzzy Hash: 518c54a789697a5c6b4831e54babfa33ed932a3633049fddc5fc828749e89317
                                                  • Instruction Fuzzy Hash: D301C8B0E04228ABDB40EFA5D4453AEB7F0BF54348F40885EE495A7350D37899848F86
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: connect
                                                  • String ID:
                                                  • API String ID: 1959786783-0
                                                  • Opcode ID: 04f03a6811c614121f33b76f869edaf1089a20586fa265b9c81c4feedc987e02
                                                  • Instruction ID: 6e8d309fab39bf9baebf067e29b8b09d0b026cedcf54d4b5de631c28274fd827
                                                  • Opcode Fuzzy Hash: 04f03a6811c614121f33b76f869edaf1089a20586fa265b9c81c4feedc987e02
                                                  • Instruction Fuzzy Hash: BF01C474904215DFCB00FFB9D88559DBBF0BB44325F008A2AE465D72A0E7789940DF56
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: getaddrinfo
                                                  • String ID:
                                                  • API String ID: 300660673-0
                                                  • Opcode ID: cbb95dcc5888576af45be5941620f59cd4ee6ba8284f3416f2a602a45be379a8
                                                  • Instruction ID: fe544205b4f2411dffe926bc1f1767dffefaf07eb8a3451ed645b5bca9df3f44
                                                  • Opcode Fuzzy Hash: cbb95dcc5888576af45be5941620f59cd4ee6ba8284f3416f2a602a45be379a8
                                                  • Instruction Fuzzy Hash: 6BF04D78E04208AFCB04DF69D58488AFBF4FB88354B01C4AAE96897321D330EA40CF51
                                                  APIs
                                                    • Part of subcall function 0047AA34: GetConsoleMode.KERNELBASE(?,?,?,?,?,?,?,?,?,0047AA6E), ref: 0047AA4C
                                                  • WSAEnumNetworkEvents.WS2_32 ref: 0047AA9A
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: ConsoleEnumEventsModeNetwork
                                                  • String ID:
                                                  • API String ID: 583204498-0
                                                  • Opcode ID: 862b3bffad0a1818dcd20fa8192cdd618566d059ca948438e88f8f7323121268
                                                  • Instruction ID: 9044311f2f7148dd6453d4ad627516b68afe01fcf58160d024c78015fee40a20
                                                  • Opcode Fuzzy Hash: 862b3bffad0a1818dcd20fa8192cdd618566d059ca948438e88f8f7323121268
                                                  • Instruction Fuzzy Hash: EEF01C749052069BDB00EF68D68169DBBE5AB80348F10842AF444D7250F638D995CB86
                                                  APIs
                                                  • GetConsoleScreenBufferInfo.KERNELBASE ref: 00439C29
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: BufferConsoleInfoScreen
                                                  • String ID:
                                                  • API String ID: 3437242342-0
                                                  • Opcode ID: dfcd4c2100ae190027de928b43d96c00dbc831342f7b3fc49fdb3aa3b18c8279
                                                  • Instruction ID: 91b8f57e9f5d2d2d8f998abc68752e66a25a490a3fb34714e5a7239af27c0417
                                                  • Opcode Fuzzy Hash: dfcd4c2100ae190027de928b43d96c00dbc831342f7b3fc49fdb3aa3b18c8279
                                                  • Instruction Fuzzy Hash: 88E04F74504305C7CB10BB78E94125DB7F0AB44204F508625A860D73A4E2789C0ACB56
                                                  APIs
                                                  • GetConsoleMode.KERNELBASE(?,?,?,?,?,?,?,?,?,0047AA6E), ref: 0047AA4C
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: ConsoleMode
                                                  • String ID:
                                                  • API String ID: 4145635619-0
                                                  • Opcode ID: 80480ece5c09b5b35940650d0ba9ae42ad8eb97845d2f4cd483cd80533cce654
                                                  • Instruction ID: 2b7fe6eb735d98fff3a59e19e7a640a738f7f3286625aafbe770bda874728109
                                                  • Opcode Fuzzy Hash: 80480ece5c09b5b35940650d0ba9ae42ad8eb97845d2f4cd483cd80533cce654
                                                  • Instruction Fuzzy Hash: 72D0C734505305DBD700EF79DD8265977F8EB44245F008435AC54D3250F674E9559756
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: fopen
                                                  • String ID:
                                                  • API String ID: 1432627528-0
                                                  • Opcode ID: f678540ac207d7a4ece132411da7f97e21d93bdf7e1e93c913f34b2c1c87ecf8
                                                  • Instruction ID: 750549a0b97c8e0f9a2ff1375084a205b6d34a6627c55bcb84dda5a6eed577fa
                                                  • Opcode Fuzzy Hash: f678540ac207d7a4ece132411da7f97e21d93bdf7e1e93c913f34b2c1c87ecf8
                                                  • Instruction Fuzzy Hash: 44C00274504708ABCB40FF69C546449BBE4AA44654F40885DAD8897341E670E9418B86
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: fflush$ferror
                                                  • String ID:
                                                  • API String ID: 2552446576-0
                                                  • Opcode ID: c6a553a7cc52543f409f4ea739795cf71f01be604600bc47326b2f67ea8b52c6
                                                  • Instruction ID: b2591332b61e99e1f98b8d45c8656f49debbebd2144fa89ce6cf02cd3d106414
                                                  • Opcode Fuzzy Hash: c6a553a7cc52543f409f4ea739795cf71f01be604600bc47326b2f67ea8b52c6
                                                  • Instruction Fuzzy Hash: D6419E78A047199FCB00DFA9C080AAEBBF0BF48715F51885AE898DB311D338EA41DF55
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: malloc
                                                  • String ID:
                                                  • API String ID: 2803490479-0
                                                  • Opcode ID: eee766dfc27c4a1ef9eaf450829c6c0ba7474cfec757f85b2aa26daea8bd08f8
                                                  • Instruction ID: cb7556e4f15a1fc05d43627bab0bcd56265c1bcd7336d14593879f634045cb83
                                                  • Opcode Fuzzy Hash: eee766dfc27c4a1ef9eaf450829c6c0ba7474cfec757f85b2aa26daea8bd08f8
                                                  • Instruction Fuzzy Hash: CD11B7726093408BE7109A1CE88935BBBD3BFE031CFB95969DA4D473D6E275C8409752
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID:
                                                  • API String ID: 1294909896-0
                                                  • Opcode ID: e67394bb7136c0bf6bc4f7055df30ff5de0000bc6388ff562c88e7ebc2cddba5
                                                  • Instruction ID: f77e7718b88f293aa5d98531dd08ea47ce6418b669dd63fff0d49620fea51c9c
                                                  • Opcode Fuzzy Hash: e67394bb7136c0bf6bc4f7055df30ff5de0000bc6388ff562c88e7ebc2cddba5
                                                  • Instruction Fuzzy Hash: 1821A774A04604EFCB04DF65D58875ABBF0AF48344F01C56AE8549B3A1D378D981DF55
                                                  APIs
                                                    • Part of subcall function 0043AE20: GetConsoleWindow.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0043AE6A
                                                  • free.MSVCRT ref: 0043E9D4
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: ConsoleWindowfree
                                                  • String ID:
                                                  • API String ID: 2737378773-0
                                                  • Opcode ID: 976e63d70306c5dadfcd165419d18ee9a74ef74d77386df5177f0ef06ccc518c
                                                  • Instruction ID: 0336be1f7356ff0d79f244d22c4d80e4556c4336f768efb9b66c983b7dccd9a1
                                                  • Opcode Fuzzy Hash: 976e63d70306c5dadfcd165419d18ee9a74ef74d77386df5177f0ef06ccc518c
                                                  • Instruction Fuzzy Hash: 13D0A7700043448BC740BF7AEC4310937F4DB01325F40560C91E4973E1CAB8A840C78B
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: File$Volume$FindInformationcallocfree$CloseDiskErrorFirstFreeHandleLastPointerSizeSpaceType_get_osfhandle_lseeki64_telli64
                                                  • String ID: 2$2
                                                  • API String ID: 3491859926-3784399050
                                                  • Opcode ID: 86e5fae8627af5e8a306d80b44b5c768520eaa0ba1cad4685c439971ffccf29d
                                                  • Instruction ID: e11d20acf2a5183567f5fcbfb6e7d6543dfeec1a941fb9961cadc3d56bde5363
                                                  • Opcode Fuzzy Hash: 86e5fae8627af5e8a306d80b44b5c768520eaa0ba1cad4685c439971ffccf29d
                                                  • Instruction Fuzzy Hash: 02810670408701CFD710AF68D58866EBBE2FF84324F108E2DE5E987295D7789889CB83
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: memcpystrchr$strlen
                                                  • String ID: /$@$@
                                                  • API String ID: 2338772939-1565350487
                                                  • Opcode ID: d20841fb2bbffe94549e7b95efb91ec315a4e599ec4a1c4134dd13e21622419b
                                                  • Instruction ID: 0d9ca5671754a069293aa5ff3ab7d486c4f8fd78523594d72e6f04efee76844e
                                                  • Opcode Fuzzy Hash: d20841fb2bbffe94549e7b95efb91ec315a4e599ec4a1c4134dd13e21622419b
                                                  • Instruction Fuzzy Hash: 0B02CD71A056588FDB24CF59C490BDEFBF1BF89304F14859AE488AB311D3799A89CF81
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Auth$Genu$cAMD$enti$ineI$ntel
                                                  • API String ID: 0-1714976780
                                                  • Opcode ID: 30a1b6f0e564be8d07df84ea30504acaa5bb7ec169232fbda98bf8fdb4b6cb7d
                                                  • Instruction ID: 2685c04cd2fecdc048f2b0e3633d37600022f7f5650d4f90598ca53bfae1c144
                                                  • Opcode Fuzzy Hash: 30a1b6f0e564be8d07df84ea30504acaa5bb7ec169232fbda98bf8fdb4b6cb7d
                                                  • Instruction Fuzzy Hash: 4A31F877A2851A0FFF789838C84537D2583B398730F2BC73AD526D36D5E868CD804290
                                                  APIs
                                                  • GetSystemTimeAsFileTime.KERNEL32 ref: 0066F779
                                                  • GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004014F2), ref: 0066F78A
                                                  • GetCurrentThreadId.KERNEL32 ref: 0066F792
                                                  • GetTickCount.KERNEL32 ref: 0066F79A
                                                  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004014F2), ref: 0066F7A9
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                                  • String ID:
                                                  • API String ID: 1445889803-0
                                                  • Opcode ID: c62728d26c022010a62770c8fc6165ed0a3ba27ebc33263508e086cfa9066be3
                                                  • Instruction ID: c27c242b26b68e4ffad7a9d5dc56758dc6c6347fab7913c62806c74d53dd10b5
                                                  • Opcode Fuzzy Hash: c62728d26c022010a62770c8fc6165ed0a3ba27ebc33263508e086cfa9066be3
                                                  • Instruction Fuzzy Hash: 451186B19043018FD710DFB8F98C58BBBE5FB88265F05593AE944C7310DB799858CB92
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6a3103032de7e2352077393b6e3334fe343c76da73142f3e2e67ed39b2239b8f
                                                  • Instruction ID: fb179fe5324dcf8bee08c07a30dd2e097147edd60c0494fa5ab4f73d3a251d21
                                                  • Opcode Fuzzy Hash: 6a3103032de7e2352077393b6e3334fe343c76da73142f3e2e67ed39b2239b8f
                                                  • Instruction Fuzzy Hash: D7F07970904255DFCB00EFB9D88569DB7F0AB45325F008A2AE464D7290E77899458F46
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: FileMessageModuleName_snwprintfmalloc
                                                  • String ID: ,Xt$0Xt$<unknown>
                                                  • API String ID: 2604804178-526161930
                                                  • Opcode ID: 076e91add005132565814656afe83f3b8992f1542d45c73906098b2bd8da7c03
                                                  • Instruction ID: c9a68154edb48fe931e2cecf07ff18f203033ff61f2b007db6eab5fe9c8c37ea
                                                  • Opcode Fuzzy Hash: 076e91add005132565814656afe83f3b8992f1542d45c73906098b2bd8da7c03
                                                  • Instruction Fuzzy Hash: 31514EB14083008BD754AF29D4852AEBBF6EF86340F15CC2EE8C89B351D7799845CB97
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: strlen$strcmp
                                                  • String ID: ANY PRIVATE KEY$CERTIFICATE$CERTIFICATE REQUEST$CMS$DH PARAMETERS$ENCRYPTED PRIVATE KEY$NEW CERTIFICATE REQUEST$PARAMETERS$PKCS #7 SIGNED DATA$PKCS7$PRIVATE KEY$TRUSTED CERTIFICATE$X509 CERTIFICATE$X9.42 DH PARAMETERS
                                                  • API String ID: 551667898-1119032718
                                                  • Opcode ID: 6972bd79973dfb1c2e280fb5d24a5e7d7921eb58974e791f513cf3bc7803c8f8
                                                  • Instruction ID: 4a3f08ba6de2eb80041b6fce867e9dce58b9b2388e15697e267f98f615c17ed6
                                                  • Opcode Fuzzy Hash: 6972bd79973dfb1c2e280fb5d24a5e7d7921eb58974e791f513cf3bc7803c8f8
                                                  • Instruction Fuzzy Hash: 1DB14A719083459BE7209F18C1A476ABFE5FB85359F05883EE9C88B381E735DC898F52
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$strcmp
                                                  • String ID: 8$`F:v
                                                  • API String ID: 507678545-3193217446
                                                  • Opcode ID: 013dfff32339beb900c8ba9d51fbccca020c0964dbb7936797957f2880128658
                                                  • Instruction ID: fe5edda2907f9931c179bac942bf96f8dd8401e3f8fbcb7f9e5a605ede422f0b
                                                  • Opcode Fuzzy Hash: 013dfff32339beb900c8ba9d51fbccca020c0964dbb7936797957f2880128658
                                                  • Instruction Fuzzy Hash: 4802A2B4905318DFDB50EF69C884B9EBBF0BF49304F00989AE488AB351D7789984DF56
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$malloc
                                                  • String ID:
                                                  • API String ID: 2190258309-0
                                                  • Opcode ID: 6cead0102cc2dc017502c4b18627807d9a87f12d5b43944c9b3e5485dfa3dbdf
                                                  • Instruction ID: cc1499a460c89fd9141748a16a4299318cd147f187f84dafe40e152d871ee3a1
                                                  • Opcode Fuzzy Hash: 6cead0102cc2dc017502c4b18627807d9a87f12d5b43944c9b3e5485dfa3dbdf
                                                  • Instruction Fuzzy Hash: E5A17FB05087008FEB559F69D48436ABBE2BF40318F15895DE8998F396E37AC885CF42
                                                  APIs
                                                  • strlen.MSVCRT ref: 00431406
                                                    • Part of subcall function 00460B8C: strlen.MSVCRT ref: 00460B98
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: strlen
                                                  • String ID: /
                                                  • API String ID: 39653677-2043925204
                                                  • Opcode ID: b97d917b2a0545725f3d9626497b094b745e22d6fd71353216b8d82aaa1a47c5
                                                  • Instruction ID: 90723c190dd04189e7767452cee89386b0490e0f60eebe6090065e2ed06e0fc6
                                                  • Opcode Fuzzy Hash: b97d917b2a0545725f3d9626497b094b745e22d6fd71353216b8d82aaa1a47c5
                                                  • Instruction Fuzzy Hash: F802B074E04208AFCB50DFACC4856ADBBF1AF4D304F18D46AE898EB351D7349982CB45
                                                  APIs
                                                  • memset.MSVCRT ref: 0040E6EB
                                                    • Part of subcall function 0040D4FF: strpbrk.MSVCRT ref: 0040D51E
                                                    • Part of subcall function 0040D4FF: strlen.MSVCRT ref: 0040D53D
                                                    • Part of subcall function 0040D4FF: strcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040E4F4), ref: 0040D587
                                                    • Part of subcall function 0040D4FF: strncmp.MSVCRT ref: 0040D682
                                                  • strlen.MSVCRT ref: 0040E70D
                                                  • free.MSVCRT ref: 0040E73F
                                                  • free.MSVCRT ref: 0040E75B
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: freestrlen$memsetstrcpystrncmpstrpbrk
                                                  • String ID:
                                                  • API String ID: 37117747-0
                                                  • Opcode ID: f94bc97323b07e77de00f267c964e9945cd113ea80c3b1a245980b6f08c3d736
                                                  • Instruction ID: 0014d1c6a1d50267bbede2b768f527c96f54e1ed55d0cdb2cf3e5a6e494b6b30
                                                  • Opcode Fuzzy Hash: f94bc97323b07e77de00f267c964e9945cd113ea80c3b1a245980b6f08c3d736
                                                  • Instruction Fuzzy Hash: AB123974D042499FDB00DFA9C4457EEBBF1EF49304F0488AAE8A4BB351D2389946DF55
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: memcmp
                                                  • String ID:
                                                  • API String ID: 1475443563-0
                                                  • Opcode ID: fc616eecc711f4611f5d73e97f7e91b3cda04fb457d559786e9534050b823ad6
                                                  • Instruction ID: 5ec318f01c39bf023f743f5ebe8a2a61f0c0613920a98613a238662a0907fb7e
                                                  • Opcode Fuzzy Hash: fc616eecc711f4611f5d73e97f7e91b3cda04fb457d559786e9534050b823ad6
                                                  • Instruction Fuzzy Hash: 52612BB14083859AD7405F29CA8523BBFE1AF46340F48C89EE9D89B393E739C444DB67
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: File$ByteCharHandleMultiTypeWideWrite_vsnprintfstrlen
                                                  • String ID:
                                                  • API String ID: 4278424647-0
                                                  • Opcode ID: 51d873587c00f295d4dfa6d697c86f84267dc5cc2e339a879f5611b35f47d2ee
                                                  • Instruction ID: 30d01f631253808c8137bc642cc08e542cb2a94ba0a54c25a934c6300ee974c1
                                                  • Opcode Fuzzy Hash: 51d873587c00f295d4dfa6d697c86f84267dc5cc2e339a879f5611b35f47d2ee
                                                  • Instruction Fuzzy Hash: 0C518FB1908309DFD7109F25D4483AEBBF4FF44315F01895EEA9887210E37C9549CB9A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$strcmpstrlen
                                                  • String ID: (nil)$`F:v
                                                  • API String ID: 3516724208-1863269726
                                                  • Opcode ID: 25a54c04ce616f4c4000b2c33d8198a8c91d3796778b72f020de0bdf021bb150
                                                  • Instruction ID: bfc610280fdf34fa50f73d47b01f4bfe577fc2ae1658f644b7095c00d2da9eb6
                                                  • Opcode Fuzzy Hash: 25a54c04ce616f4c4000b2c33d8198a8c91d3796778b72f020de0bdf021bb150
                                                  • Instruction Fuzzy Hash: 49025FB4A083059FCB40EFA9C584A9EBBF1FF49314F01885AE8989B311D778D981CF56
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: _errno
                                                  • String ID: -$.j@
                                                  • API String ID: 2918714741-188648854
                                                  • Opcode ID: e7316502e919c20ca7ae42973582db9e02c82138ed0003a4b65582f9e7ed537f
                                                  • Instruction ID: 5994e571b7c1f56168389c7bd7029fe10631b227635c5948c1f16abb7c80d8b1
                                                  • Opcode Fuzzy Hash: e7316502e919c20ca7ae42973582db9e02c82138ed0003a4b65582f9e7ed537f
                                                  • Instruction Fuzzy Hash: 9A7183716083018BD710DE6CC88026FB7E7AFD6364F14C92EE8998F355E674D9468B86
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$strcmp$fclosetmpfile
                                                  • String ID: @Fu$`F:v
                                                  • API String ID: 976011942-3610526832
                                                  • Opcode ID: 11e257bfcc90bbde27cddfa0f8b327e5883e499c6f53b7367c7ee8b1deacaa93
                                                  • Instruction ID: c253f9c00d6ced01a334a89390fdb5db9ba99e4ff214c60abbab61f46f0c052c
                                                  • Opcode Fuzzy Hash: 11e257bfcc90bbde27cddfa0f8b327e5883e499c6f53b7367c7ee8b1deacaa93
                                                  • Instruction Fuzzy Hash: E371A4B49083189FDB50EF69C48479EBBF1FF49314F00896AE498AB301D7789985CF46
                                                  APIs
                                                    • Part of subcall function 00464696: strcmp.MSVCRT ref: 004646AA
                                                    • Part of subcall function 00464696: strlen.MSVCRT ref: 004646C0
                                                  • free.MSVCRT ref: 00427848
                                                  • fclose.MSVCRT ref: 0042785A
                                                  • free.MSVCRT ref: 00427877
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$fclosestrcmpstrlen
                                                  • String ID:
                                                  • API String ID: 586208616-0
                                                  • Opcode ID: a3a9a90a2d42b19007e4a01ab320c99f7d3a8a47ae5db2e037dc4a28d30b05e4
                                                  • Instruction ID: 8e99783a2cd416de6b5ffd270e4f0798565d41a6a5cc59492ab3bbf9e4f60bda
                                                  • Opcode Fuzzy Hash: a3a9a90a2d42b19007e4a01ab320c99f7d3a8a47ae5db2e037dc4a28d30b05e4
                                                  • Instruction Fuzzy Hash: D5D1D474E093199FCB00EFA5D5846AEBBF1EF49304F50889AE894AB301D7389945CF5A
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID:
                                                  • API String ID: 1294909896-0
                                                  • Opcode ID: f97815f575312837291d4d89f94a0b10ad0e5091acf78eaea71466a7a2f63e4b
                                                  • Instruction ID: b8c1781d1df6221ed01d0ba25963ce43ad6073cd0041e35e37b203bf8fb1de60
                                                  • Opcode Fuzzy Hash: f97815f575312837291d4d89f94a0b10ad0e5091acf78eaea71466a7a2f63e4b
                                                  • Instruction Fuzzy Hash: 2D6172B8B046059FCB44DF68C88599DBBF1FF48360B158559E888DB321E738EE81CB95
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$strlenstrtok
                                                  • String ID:
                                                  • API String ID: 1922117322-3916222277
                                                  • Opcode ID: 189d681d9a1f0a0e0de138fc11690c5ed5e2f96416003b7f4947c5d75f51db0a
                                                  • Instruction ID: 19f148e38a21c679215d9c7d5a07e1e149e6eb00c1ee24aa1821b52552891c7b
                                                  • Opcode Fuzzy Hash: 189d681d9a1f0a0e0de138fc11690c5ed5e2f96416003b7f4947c5d75f51db0a
                                                  • Instruction Fuzzy Hash: A241E8B4A0571A9FCB40EFA5C54536EBBF0EF04354F50891DE498E7381E77899408FA6
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: memcpystrlen
                                                  • String ID: @$Enter PEM pass phrase:$d$m
                                                  • API String ID: 3412268980-724452614
                                                  • Opcode ID: 49d2f8e069be4af491053696d9a9fb5aa128ced40aff11be3bc53e236985ce10
                                                  • Instruction ID: b1b7b1f3b2db44c8de18c2c77fcdcc90030ff6d5ef7cb1340f3f4c5b580fd265
                                                  • Opcode Fuzzy Hash: 49d2f8e069be4af491053696d9a9fb5aa128ced40aff11be3bc53e236985ce10
                                                  • Instruction Fuzzy Hash: 6D4159B19083419AD7109F29C49532FBBE1BF86355F158D2EED9847351E3B988489B83
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: setlocale$memcpymemsetstrlen
                                                  • String ID: $$P"j
                                                  • API String ID: 707871278-3143280230
                                                  • Opcode ID: 156a3cde93b3c382b0f8012dc3f4a10f20186d0cbe9345dfe3c1e591ba9a7d57
                                                  • Instruction ID: 9527cf1737d775d830efbc2b3aec26a1ecea64137194c14ec2bf70bae5b9f628
                                                  • Opcode Fuzzy Hash: 156a3cde93b3c382b0f8012dc3f4a10f20186d0cbe9345dfe3c1e591ba9a7d57
                                                  • Instruction Fuzzy Hash: 1831E5B0D05319DADB50EFA4D4453EEBBF0EF05304F50885EA598A7341D7798A84CF96
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: ERROR$U$WARNING
                                                  • API String ID: 1294909896-34697698
                                                  • Opcode ID: af08b106176ca7fe440a5e21722397424f2d07eaaeaf0f2274c748e28c78785c
                                                  • Instruction ID: 7ff3ec3107bcddb30cfcf9e01b1a1ce613d680e562bf26a4df3967762a15542d
                                                  • Opcode Fuzzy Hash: af08b106176ca7fe440a5e21722397424f2d07eaaeaf0f2274c748e28c78785c
                                                  • Instruction Fuzzy Hash: FC12C2B4908344DFDB40EFA9C18579EBBF0AF49304F10885EE598AB341E7B89985CF56
                                                  APIs
                                                    • Part of subcall function 0043B900: free.MSVCRT ref: 0043B984
                                                    • Part of subcall function 0043B9B9: free.MSVCRT ref: 0043BA30
                                                  • free.MSVCRT ref: 0042E15C
                                                    • Part of subcall function 0043B899: free.MSVCRT ref: 0043B8AD
                                                    • Part of subcall function 0043B899: free.MSVCRT ref: 0043B8C4
                                                    • Part of subcall function 0043B899: free.MSVCRT ref: 0043B8DC
                                                    • Part of subcall function 0043B899: free.MSVCRT ref: 0043B8F1
                                                  • free.MSVCRT ref: 0042E2AA
                                                    • Part of subcall function 0042F58C: free.MSVCRT ref: 0042FC71
                                                    • Part of subcall function 0042FC92: strchr.MSVCRT ref: 0042FCBE
                                                    • Part of subcall function 0042FC92: free.MSVCRT ref: 0042FD26
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$strchr
                                                  • String ID: +$>Lj$@Fu
                                                  • API String ID: 2369460792-290703121
                                                  • Opcode ID: e096800c95d31eedce3631e34b8f774c648173852984441191d056bfb12dbcad
                                                  • Instruction ID: 638d48195d4d1042f5866e2a3f79bbc363470a744489b3ee950d1df8c1ba19be
                                                  • Opcode Fuzzy Hash: e096800c95d31eedce3631e34b8f774c648173852984441191d056bfb12dbcad
                                                  • Instruction Fuzzy Hash: AC02A0B4A04319DFCB40DFA9D485AAEBBF0FF08304F54885AE894AB351D7789885CF56
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID:
                                                  • API String ID: 1294909896-0
                                                  • Opcode ID: 4caa5a744f2b5da4675b49a9d180e2a0257546a76145eba216af86feae5cb3b4
                                                  • Instruction ID: 7c81cb4bff09717c4ec47376b4b500732c9dcb95bc3a687a1475744ed7d67d09
                                                  • Opcode Fuzzy Hash: 4caa5a744f2b5da4675b49a9d180e2a0257546a76145eba216af86feae5cb3b4
                                                  • Instruction Fuzzy Hash: 7B310FB8604704AFDB40EF68C595B597BF1AF083A4F028958F9889F362D774E984CF85
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: memcpy
                                                  • String ID: ?$@$@$@
                                                  • API String ID: 3510742995-3749118003
                                                  • Opcode ID: 240a03f2e73e50a3bc4d71c8d6420ca9d7269ec5b8cdcf7acccf73cba3da0dbe
                                                  • Instruction ID: 48927bdac2aea96809282bbfa22beb013f182a5a80408a93d571bd85edbc1660
                                                  • Opcode Fuzzy Hash: 240a03f2e73e50a3bc4d71c8d6420ca9d7269ec5b8cdcf7acccf73cba3da0dbe
                                                  • Instruction Fuzzy Hash: 11718BB4A0434A9FDB44DF29C480A9EB7F1FF88350F11C82AE8689B315E334E951DB95
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: memcpy
                                                  • String ID: ?$@$@$@
                                                  • API String ID: 3510742995-3749118003
                                                  • Opcode ID: 6f835ff52076eeb5e88f2670f7070f3f4b7f9d963d6b242084ee5cb59db08774
                                                  • Instruction ID: a7e17e53b2947ce6c2c009aec710c79b9e0de8c2099fa056b63d042f32b68165
                                                  • Opcode Fuzzy Hash: 6f835ff52076eeb5e88f2670f7070f3f4b7f9d963d6b242084ee5cb59db08774
                                                  • Instruction Fuzzy Hash: E1716BB4A0430A9FDB40DF29C58099EB7F1BF88354F11C91AE8689B355E334EA51CF55
                                                  APIs
                                                    • Part of subcall function 0040D4FF: strpbrk.MSVCRT ref: 0040D51E
                                                    • Part of subcall function 0040D4FF: strlen.MSVCRT ref: 0040D53D
                                                    • Part of subcall function 0040D4FF: strcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040E4F4), ref: 0040D587
                                                    • Part of subcall function 0040D4FF: strncmp.MSVCRT ref: 0040D682
                                                  • strlen.MSVCRT ref: 0040F4CA
                                                  • free.MSVCRT ref: 0040F4FC
                                                  • free.MSVCRT ref: 0040F518
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: freestrlen$strcpystrncmpstrpbrk
                                                  • String ID: )
                                                  • API String ID: 4034866347-2427484129
                                                  • Opcode ID: 61b06fbd557c210522d7dcf842db3646c53ec597b60216f83c829658361b716b
                                                  • Instruction ID: 1afeed9333593b3bc0a946aa65ca6fdd142fa13c109370ba9576ea69722d66ed
                                                  • Opcode Fuzzy Hash: 61b06fbd557c210522d7dcf842db3646c53ec597b60216f83c829658361b716b
                                                  • Instruction Fuzzy Hash: 3261B2B4908309EFDB10AFA4C59576EBBF4EF04304F01883AE894AB751D3789949DF46
                                                  APIs
                                                    • Part of subcall function 00464696: strcmp.MSVCRT ref: 004646AA
                                                    • Part of subcall function 00464696: strlen.MSVCRT ref: 004646C0
                                                  • time.MSVCRT ref: 00406161
                                                  • free.MSVCRT ref: 004065FC
                                                  • fclose.MSVCRT ref: 0040660E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: fclosefreestrcmpstrlentime
                                                  • String ID: TRUE
                                                  • API String ID: 1079940273-3412697401
                                                  • Opcode ID: fc1ed8d8516f3b46875e5c3a46cc3780228396d00201c81ba9d56d1b40e6c16a
                                                  • Instruction ID: bb85a04d865bee957ce1c8443554495e03ebc8486c4266b804ddccd5e4694c39
                                                  • Opcode Fuzzy Hash: fc1ed8d8516f3b46875e5c3a46cc3780228396d00201c81ba9d56d1b40e6c16a
                                                  • Instruction Fuzzy Hash: C502D278E042489FCB10DFA8C4806ADBBF1FF49300F1594AAE8A5BB395D3389946CF55
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID:
                                                  • API String ID: 1294909896-0
                                                  • Opcode ID: 2c8e37fbe091660acce8de1a51b17556276ab255c97750600f4706245974c23f
                                                  • Instruction ID: 06ea58b8dc2c3c88dee26cb5669b2d5d1b216d74b3a79f9728f2c86fe9991542
                                                  • Opcode Fuzzy Hash: 2c8e37fbe091660acce8de1a51b17556276ab255c97750600f4706245974c23f
                                                  • Instruction Fuzzy Hash: 3A61B3B4E046498FCB40EFA8C4857AEBBF1AF09314F14982AE494B7341D3389985DF56
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$memcpystrlen
                                                  • String ID:
                                                  • API String ID: 4283329877-0
                                                  • Opcode ID: f6750cc027a2ecfc1d8f12171c85d6fb274bcffb19ed3228425bab6eb4b244d5
                                                  • Instruction ID: 6e074893b99c1cfe19778936aacebb6c747d7f9e5e8f0a112cb58292449dd5b6
                                                  • Opcode Fuzzy Hash: f6750cc027a2ecfc1d8f12171c85d6fb274bcffb19ed3228425bab6eb4b244d5
                                                  • Instruction Fuzzy Hash: 356192B4D042099FDF40EFA4C585AAEBBF1BF48304F10881EE498A7350D7389A44CF66
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: %j$,
                                                  • API String ID: 1294909896-651064510
                                                  • Opcode ID: a62ef1ff29dc70d58f9f0b570248292dbdd4d693aa1cb52d636d1e9e3fa17b47
                                                  • Instruction ID: 198a848cdb6ecb7146f8c8fc2081f59bd5fbddfdbd430fac15054397b1a77135
                                                  • Opcode Fuzzy Hash: a62ef1ff29dc70d58f9f0b570248292dbdd4d693aa1cb52d636d1e9e3fa17b47
                                                  • Instruction Fuzzy Hash: D0C107B49043098FDB00EFA8C5856EEBBF1AF49314F15885AE894A7351D338D985CF5A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$memsetstrlenstrrchr
                                                  • String ID: /$0
                                                  • API String ID: 297553965-459344325
                                                  • Opcode ID: c419734dc1c209ef706ee13f3d5c453ea4768c175c8593b56d401004d918506b
                                                  • Instruction ID: b609da9d348bcba5f69dcfab7cfdf196af27421d66ef1e93a50959b8d63b81bb
                                                  • Opcode Fuzzy Hash: c419734dc1c209ef706ee13f3d5c453ea4768c175c8593b56d401004d918506b
                                                  • Instruction Fuzzy Hash: 35A1CAB49043489FDB10DFA4C58479EBBF0FF08314F10896AE894AB391D7799945CF9A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: strchr$callocfreestrlen
                                                  • String ID: @
                                                  • API String ID: 2959767064-2766056989
                                                  • Opcode ID: e487ca07b9dfe8fa3582cb0d0b618ad5e5c2dfe811d4c1830d54712b601fb7f0
                                                  • Instruction ID: 6a232c5d5a348f8c251e27b42b9fbd3835432909f8d46895373d1e4dfa6a032d
                                                  • Opcode Fuzzy Hash: e487ca07b9dfe8fa3582cb0d0b618ad5e5c2dfe811d4c1830d54712b601fb7f0
                                                  • Instruction Fuzzy Hash: A4C1A5B4A047099FCB40EFA9C48569EBBF0FF49314F10981AE998E7311D778D9418FA6
                                                  APIs
                                                  Strings
                                                  • --2024-09-29 08:19:01-- https://download.yandex.ru/yandex-pack/downloader/downloader.exe, xrefs: 00423874, 00423910
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: memcpy$strlen
                                                  • String ID: --2024-09-29 08:19:01-- https://download.yandex.ru/yandex-pack/downloader/downloader.exe
                                                  • API String ID: 2619041689-910687100
                                                  • Opcode ID: 36e4789794223990330ea9afd43b4dd3c5e14053157386ae6e5d8bbc812ac773
                                                  • Instruction ID: 8a8f6c9882a57c9e822982492c0930df49664c80b5deabac5757226cc2ca8d72
                                                  • Opcode Fuzzy Hash: 36e4789794223990330ea9afd43b4dd3c5e14053157386ae6e5d8bbc812ac773
                                                  • Instruction Fuzzy Hash: 03A1A674A042099FCB04DF98D584BAEBBF2FF88300F64C569E898E7315D638E945CB56
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 1p$ 1p$91p$e$f
                                                  • API String ID: 0-2068057407
                                                  • Opcode ID: 1fdb430ef66be8ae684dfaa15ffcf793ad68bfe6aecf06cd3f3451648c3866c9
                                                  • Instruction ID: 6d9402e2085885d05260b9cb1a27ad75f6a2d1315bd9ae614e8f3d940d904761
                                                  • Opcode Fuzzy Hash: 1fdb430ef66be8ae684dfaa15ffcf793ad68bfe6aecf06cd3f3451648c3866c9
                                                  • Instruction Fuzzy Hash: 54E1F3716087468FD760DF29C5847AABBF1FF84708F15892DE8C88B241EB75D848DB62
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$fclosetime
                                                  • String ID: $6
                                                  • API String ID: 4167560123-3514963568
                                                  • Opcode ID: 7e7bfa48ccde9fd500fb8c8610d791134c281afbe1d1a860a6707186847f6eca
                                                  • Instruction ID: 972a9bfeb9e2a5e133db9d44855d61ebda691811e7db289571dbcce9cb273f3f
                                                  • Opcode Fuzzy Hash: 7e7bfa48ccde9fd500fb8c8610d791134c281afbe1d1a860a6707186847f6eca
                                                  • Instruction Fuzzy Hash: 10E1B1B4A042098FDB10CF68D585A9EBBF0BF48314F14856AE858EB391D738ED51CF66
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: \$_$_$_
                                                  • API String ID: 0-501989280
                                                  • Opcode ID: a047b3ee5501014dc5af9ab1e8f3a21cdf7f67721899804a66bbd2737fea26a9
                                                  • Instruction ID: 5efeba2ec4ca6653dc158f9a6d3a1f2e90c7e062e5e76076c3d2dd09736e9e6a
                                                  • Opcode Fuzzy Hash: a047b3ee5501014dc5af9ab1e8f3a21cdf7f67721899804a66bbd2737fea26a9
                                                  • Instruction Fuzzy Hash: F7913C356082859FDB01DF68D585AA9BFE1EF05314F08C0A5E898CF3A2E379E945DB06
                                                  APIs
                                                  • time.MSVCRT ref: 0040664C
                                                    • Part of subcall function 0047D344: ferror.MSVCRT ref: 0047D350
                                                    • Part of subcall function 0047D344: fputs.MSVCRT ref: 0047D366
                                                    • Part of subcall function 0047D344: fputs.MSVCRT ref: 0047D38E
                                                    • Part of subcall function 0047D344: ferror.MSVCRT ref: 0047D3B0
                                                    • Part of subcall function 0047D344: _fileno.MSVCRT ref: 0047D3BF
                                                  • ferror.MSVCRT ref: 0040686E
                                                  • fclose.MSVCRT ref: 004068B7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: ferror$fputs$_filenofclosetime
                                                  • String ID: FALSE$TRUE
                                                  • API String ID: 3022861296-1412513891
                                                  • Opcode ID: 5549e82b0af02d0df410d59ce9cccef5e3006147b1a74e67b4726c55265324e4
                                                  • Instruction ID: e602d591a7cb9c1141c899a8990940b4c41c6187481caa83e09169cf2307568b
                                                  • Opcode Fuzzy Hash: 5549e82b0af02d0df410d59ce9cccef5e3006147b1a74e67b4726c55265324e4
                                                  • Instruction Fuzzy Hash: AF91C8B49043049FCB00EFA9C5856ADBBF0EF48304F01986EE899AB351D778D951CF5A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: freestrcspnstrlenstrspn
                                                  • String ID: ,$5j
                                                  • API String ID: 2191726307-2557168326
                                                  • Opcode ID: dc021d42e120f4128b86647dfb1494817512cb20fe110e6b08af025241767994
                                                  • Instruction ID: 0cae1977953cc37efd5a6b075cf41ec35192b50681be2b1e82787fee461a7847
                                                  • Opcode Fuzzy Hash: dc021d42e120f4128b86647dfb1494817512cb20fe110e6b08af025241767994
                                                  • Instruction Fuzzy Hash: 6D81E6B4E042499FDB00DFA8C584AEEFBF1AF49304F19845AE898E7311D338D985CB65
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: strlen$strcpystrrchrtime
                                                  • String ID: /$P
                                                  • API String ID: 1007391074-1456695453
                                                  • Opcode ID: dba572191d2155ff4f378bcf9dcbbd0d7cf8ad463f5a01ecc936a17eef82bad0
                                                  • Instruction ID: 401a1ce7d23f91005bd9d76ef5d6ec32c055be2567508cecadd5d7eac09c841e
                                                  • Opcode Fuzzy Hash: dba572191d2155ff4f378bcf9dcbbd0d7cf8ad463f5a01ecc936a17eef82bad0
                                                  • Instruction Fuzzy Hash: 0A71B6B4908605CFDB00EF68C585AAEBBF0FF48304F15886AE899AB351D378D841DF56
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: fclosefree
                                                  • String ID: 4j
                                                  • API String ID: 271167838-4068273965
                                                  • Opcode ID: 4b0ffd59eba6519c13a84d7658c047b9889508a5a730a60941407779210c7b22
                                                  • Instruction ID: 9897a63151fe53fbe6c78d6f7a9ff78ff1e434bc9bb41b9ecfca278b390a57c0
                                                  • Opcode Fuzzy Hash: 4b0ffd59eba6519c13a84d7658c047b9889508a5a730a60941407779210c7b22
                                                  • Instruction Fuzzy Hash: 2161B1B4A083199FCB04EF65D48469EBBF1FF89304F10881EE489A7310D7799945CF9A
                                                  APIs
                                                  • strpbrk.MSVCRT ref: 00403897
                                                  • strlen.MSVCRT ref: 004038B4
                                                  • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004033A9), ref: 004038DD
                                                  • strcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004033A9), ref: 004038F2
                                                  • strlen.MSVCRT ref: 0040390A
                                                  • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,004033A9), ref: 00403949
                                                  • strcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,004033A9), ref: 00403973
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: memcpystrcpystrlen$strpbrk
                                                  • String ID:
                                                  • API String ID: 4170637506-0
                                                  • Opcode ID: 87b04866c798240f4da44f6fc269bbc31bd30759982df5f8a96aafc7919197f9
                                                  • Instruction ID: e1558638dfe16f4e417b7753d8e73b0ee4bb84088810475f4b40b8ed33750368
                                                  • Opcode Fuzzy Hash: 87b04866c798240f4da44f6fc269bbc31bd30759982df5f8a96aafc7919197f9
                                                  • Instruction Fuzzy Hash: 64510BB5E042099FCB40DFA8C4816AEBBF5EF49314F14C46AE898E7341D378DA46CB56
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: InformationObjectUser$AddressErrorHandleLastModuleProcProcessStationWindowwcsstr
                                                  • String ID:
                                                  • API String ID: 459917433-0
                                                  • Opcode ID: c01001ac9d2b8a9e032b881a0097ccc29465dab91242815c4922b218d069662d
                                                  • Instruction ID: 0c281ff6b6c40e4f93192565fbd2894e5386cff893fbb610b9f689901830949e
                                                  • Opcode Fuzzy Hash: c01001ac9d2b8a9e032b881a0097ccc29465dab91242815c4922b218d069662d
                                                  • Instruction Fuzzy Hash: D73179B09087098BD7109F79D9442AFBBE4EF80321F01866EE5A89A391D77CD8058B56
                                                  APIs
                                                  • memset.MSVCRT ref: 0040E4DB
                                                    • Part of subcall function 0040D4FF: strpbrk.MSVCRT ref: 0040D51E
                                                    • Part of subcall function 0040D4FF: strlen.MSVCRT ref: 0040D53D
                                                    • Part of subcall function 0040D4FF: strcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040E4F4), ref: 0040D587
                                                    • Part of subcall function 0040D4FF: strncmp.MSVCRT ref: 0040D682
                                                  • strlen.MSVCRT ref: 0040E4FD
                                                  • free.MSVCRT ref: 0040E52F
                                                  • free.MSVCRT ref: 0040E54B
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: freestrlen$memsetstrcpystrncmpstrpbrk
                                                  • String ID:
                                                  • API String ID: 37117747-0
                                                  • Opcode ID: 2af70df6942f8788a593a368755bad845996662767a20b9178a7961ac7af4e86
                                                  • Instruction ID: 2e47be19448ca4c968f290e43e3f60f21134e4efa9415be890fde95abd191071
                                                  • Opcode Fuzzy Hash: 2af70df6942f8788a593a368755bad845996662767a20b9178a7961ac7af4e86
                                                  • Instruction Fuzzy Hash: 6261F2749042499FDB00DFA9C8856EEBBF1FF09304F04886AE894BB351D33899469F66
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$strlen$memcpy
                                                  • String ID:
                                                  • API String ID: 491682182-0
                                                  • Opcode ID: b931de36020922378c27375d85442b29c7381fe2cf126589495eff6b9ef096ad
                                                  • Instruction ID: 8955db4824fd8d3cb312aa3885bcaeca3ae9d8a5d808701241b759697dbe9945
                                                  • Opcode Fuzzy Hash: b931de36020922378c27375d85442b29c7381fe2cf126589495eff6b9ef096ad
                                                  • Instruction Fuzzy Hash: DB5174B4A043199FCB40EFA8C485A9EBBF1FF08344F118959E898EB311D338E9408F95
                                                  APIs
                                                    • Part of subcall function 0040D4FF: strpbrk.MSVCRT ref: 0040D51E
                                                    • Part of subcall function 0040D4FF: strlen.MSVCRT ref: 0040D53D
                                                    • Part of subcall function 0040D4FF: strcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040E4F4), ref: 0040D587
                                                    • Part of subcall function 0040D4FF: strncmp.MSVCRT ref: 0040D682
                                                  • strlen.MSVCRT ref: 0040F738
                                                  • free.MSVCRT ref: 0040F76A
                                                  • free.MSVCRT ref: 0040F786
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: freestrlen$strcpystrncmpstrpbrk
                                                  • String ID:
                                                  • API String ID: 4034866347-0
                                                  • Opcode ID: d18120c08be0f9edcda4baa2adbaa2ca32ddc8b94e70566835fb90f427263eec
                                                  • Instruction ID: 47f235587e79a0ee7022f1b76d0ab16432360907cb33263497a4779bcc273ff3
                                                  • Opcode Fuzzy Hash: d18120c08be0f9edcda4baa2adbaa2ca32ddc8b94e70566835fb90f427263eec
                                                  • Instruction Fuzzy Hash: 9D3190B4D04208DFCB50EFA9C0856AEBBF1EF04314F01886EE898AB351D7789944CF86
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID:
                                                  • API String ID: 1294909896-0
                                                  • Opcode ID: 11a32b751f7b711a22f4e843d3f9655cee8c835f5b044fae3b5d88573dea134c
                                                  • Instruction ID: 79b343fa198cb3a6a45578b82c60c9f0d0cbb209d05a6c9ddafb91beb76a9d6b
                                                  • Opcode Fuzzy Hash: 11a32b751f7b711a22f4e843d3f9655cee8c835f5b044fae3b5d88573dea134c
                                                  • Instruction Fuzzy Hash: 0911DBB8604714AFCB80EF68C5858597BF1AF483A4B468959FDCC9B322D634ED80CF85
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: A$n${
                                                  • API String ID: 0-4170650037
                                                  • Opcode ID: a215ee608bfef13f648dd838ee081dd9d05afcdb71f82ef181080700f729eded
                                                  • Instruction ID: f105480d26ae962938350a3ff80c1bafbb430d6b4e9da468cfd6eef8a7b1b912
                                                  • Opcode Fuzzy Hash: a215ee608bfef13f648dd838ee081dd9d05afcdb71f82ef181080700f729eded
                                                  • Instruction Fuzzy Hash: C6E118B1508706DFD710AF24C59932ABFE1FF84344F15992DE8888B396D7B9D885CB82
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: memcpystrlenstrncpy
                                                  • String ID: 6$t$|
                                                  • API String ID: 1911853469-1018207855
                                                  • Opcode ID: ae76b100560bf55d1ec8d686b43ac6811d3b2861cedc6b3ce1d6fdef9d48c153
                                                  • Instruction ID: 8afd1a5220f480ab81b62c83d67227c0ee5448f4237c86fe040c205c4b49387d
                                                  • Opcode Fuzzy Hash: ae76b100560bf55d1ec8d686b43ac6811d3b2861cedc6b3ce1d6fdef9d48c153
                                                  • Instruction Fuzzy Hash: 5CC149706097418FE720DF68D484B5ABFE1BF85348F148D2DE9898B351E7B9D884DB42
                                                  APIs
                                                    • Part of subcall function 0056DAA0: InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,?,?,00000000,004A1E49), ref: 0056DAD1
                                                  • memcpy.MSVCRT ref: 0049F241
                                                  • memcpy.MSVCRT ref: 0049F2B5
                                                  • memcpy.MSVCRT ref: 0049F317
                                                  • memcpy.MSVCRT ref: 0049F37F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: memcpy$CountCriticalInitializeSectionSpin
                                                  • String ID: _$`
                                                  • API String ID: 3739010516-620441697
                                                  • Opcode ID: f1133e2869732f5a8c05db6e225f4e16c0f0e0d793ae8601dc8aab90c2af4fc5
                                                  • Instruction ID: 4f4b51b3628ef54e42d1a33edf42a3e6571d23a0cff40326e6d21249acf5de89
                                                  • Opcode Fuzzy Hash: f1133e2869732f5a8c05db6e225f4e16c0f0e0d793ae8601dc8aab90c2af4fc5
                                                  • Instruction Fuzzy Hash: B5C1C2B4605B069FD714DF29C48479BBBE1BF84344F10893EE89987341EB74E948CB96
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: memcpystrlen
                                                  • String ID: @$Enter PEM pass phrase:$h$j
                                                  • API String ID: 3412268980-3159370177
                                                  • Opcode ID: 54ddc2d6fa2f89616b31800bbe7e512b5423ec217dc88811637a1f06089d5d32
                                                  • Instruction ID: 2ce265c4d2c2f1d97df05363e99a5cad275e0d07224369a3bb7775619d8fa68a
                                                  • Opcode Fuzzy Hash: 54ddc2d6fa2f89616b31800bbe7e512b5423ec217dc88811637a1f06089d5d32
                                                  • Instruction Fuzzy Hash: 6F81D0B56083029FD310DF29C49465BBBE1FFC9358F10C92EE99887341E779D9498B92
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: memset
                                                  • String ID: L
                                                  • API String ID: 2221118986-2909332022
                                                  • Opcode ID: cddd001e8aa6e2ec3bba35f20826b2b60b747586b5d277dc1f75ebb1d4eaf7d9
                                                  • Instruction ID: df508a19e85e6f7f782c9481f9f4bbedb9cc0d4b61847bba94947295f4265650
                                                  • Opcode Fuzzy Hash: cddd001e8aa6e2ec3bba35f20826b2b60b747586b5d277dc1f75ebb1d4eaf7d9
                                                  • Instruction Fuzzy Hash: D941B6B4D08708AFCB40EFA9D08569DBBF4EF04304F00886EE895EB391D7789944CB86
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$strlen
                                                  • String ID: )$@Fu
                                                  • API String ID: 667451143-3547685617
                                                  • Opcode ID: e816c8e2d8d99c4e3e050ae07db4b5ce2b0b7282b44452c9a970119e7d770a49
                                                  • Instruction ID: 2ef89e4adb19e9252a3655accf94c25a5b5aee6206234cf1e9497561130d2326
                                                  • Opcode Fuzzy Hash: e816c8e2d8d99c4e3e050ae07db4b5ce2b0b7282b44452c9a970119e7d770a49
                                                  • Instruction Fuzzy Hash: 395173B4D043199FDB40EFA9D48879EBBF0BF08314F41881AE894AB351D7B89985CF85
                                                  APIs
                                                    • Part of subcall function 0040F4A7: strlen.MSVCRT ref: 0040F4CA
                                                    • Part of subcall function 0040F4A7: free.MSVCRT ref: 0040F4FC
                                                  • abort.MSVCRT(?,8B0001C5), ref: 004078E6
                                                  • free.MSVCRT ref: 00407A8B
                                                    • Part of subcall function 00402C9B: free.MSVCRT ref: 00402D2B
                                                  • abort.MSVCRT(?,8B0001C5), ref: 00407AB0
                                                  • abort.MSVCRT(?,?,?,?,?,?,?,?,8B0001C5), ref: 00407C36
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: abortfree$strlen
                                                  • String ID: done.
                                                  • API String ID: 4207420737-1207068090
                                                  • Opcode ID: 635aa5a2e4a2429cd93a11482ef7ab6267f68ccc97e01065b90a21ab135d1b96
                                                  • Instruction ID: 4cce97db24fd9dd51d7937567d12b05986a11c0a9f3ce39455b1da4c658747c0
                                                  • Opcode Fuzzy Hash: 635aa5a2e4a2429cd93a11482ef7ab6267f68ccc97e01065b90a21ab135d1b96
                                                  • Instruction Fuzzy Hash: 3CE1E9B06082158FDB10EF68C54569E7BF1FF49308F11896AE498AB392D778ED41CF1A
                                                  APIs
                                                  • strrchr.MSVCRT ref: 004F617F
                                                  • strncmp.MSVCRT ref: 004F61B5
                                                    • Part of subcall function 0054BFB0: strlen.MSVCRT ref: 0054BFC1
                                                    • Part of subcall function 0054BFB0: memcpy.MSVCRT ref: 0054BFF2
                                                  • strlen.MSVCRT ref: 004F6503
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: strlen$memcpystrncmpstrrchr
                                                  • String ID: q$u
                                                  • API String ID: 246011797-2079702880
                                                  • Opcode ID: ac5676017a8d9340915280c991d6019f574a791dda7b665a6fe0c084c176f694
                                                  • Instruction ID: 9d25d7ee33a1fb88d58c14d1f0dd0b7d5fec63233c6860e18a26ee21eebd6422
                                                  • Opcode Fuzzy Hash: ac5676017a8d9340915280c991d6019f574a791dda7b665a6fe0c084c176f694
                                                  • Instruction Fuzzy Hash: C2E1D4B450870AAFD710AF25C58822FBFE5BF84744F118C2EE6988B351DBB8D845DB46
                                                  APIs
                                                    • Part of subcall function 0040D4FF: strpbrk.MSVCRT ref: 0040D51E
                                                    • Part of subcall function 0040D4FF: strlen.MSVCRT ref: 0040D53D
                                                    • Part of subcall function 0040D4FF: strcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040E4F4), ref: 0040D587
                                                    • Part of subcall function 0040D4FF: strncmp.MSVCRT ref: 0040D682
                                                  • strlen.MSVCRT ref: 0040E35F
                                                  • free.MSVCRT ref: 0040E3C8
                                                  • free.MSVCRT ref: 0040E3DA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: freestrlen$strcpystrncmpstrpbrk
                                                  • String ID: ,$,5w@$5w@
                                                  • API String ID: 4034866347-1760719336
                                                  • Opcode ID: 7a6fa4902a13f0fdeb05aebd0dbd13059ca62602e94ff052c61ee8758588a723
                                                  • Instruction ID: 2dd1634f92e4fabab67fa16f99effe0eed8adeae9359cf8bdf71c5e548c86982
                                                  • Opcode Fuzzy Hash: 7a6fa4902a13f0fdeb05aebd0dbd13059ca62602e94ff052c61ee8758588a723
                                                  • Instruction Fuzzy Hash: 5B2162B49043199FDB40EFA5C5497AEBBF0BF08304F01882DE894B7340D77899598F96
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: mallocstrlen$free
                                                  • String ID: <unknown>
                                                  • API String ID: 2585366504-1574992787
                                                  • Opcode ID: 4b3badec502726448eb36ee53d057b963de23915ce37d69777494a77973ad49c
                                                  • Instruction ID: 8ec1017c5590017715a9d2c75d5b74a2f11899caf38e476215ca29931ce195a1
                                                  • Opcode Fuzzy Hash: 4b3badec502726448eb36ee53d057b963de23915ce37d69777494a77973ad49c
                                                  • Instruction Fuzzy Hash: 811160755083508BC754AF39D88256ABBF2EF86350F15CC6EE8C88B312E7369445CB56
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: _getpidmemcmpstrlen
                                                  • String ID: >$?j
                                                  • API String ID: 1697227860-1718540790
                                                  • Opcode ID: 4c75086d572b92109e139489d53cd7589ff6a2ccfe097eebd94f7f5b3ccb892d
                                                  • Instruction ID: 932e5f66f61ef84db0ba40bced8f3a088072318b5855a435148ace3bfeec6795
                                                  • Opcode Fuzzy Hash: 4c75086d572b92109e139489d53cd7589ff6a2ccfe097eebd94f7f5b3ccb892d
                                                  • Instruction Fuzzy Hash: 00C1DFB4905308DFCB40DFA8D884A9EBBF1BF89304F00C92AE4989B365D77899418F56
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$strtol
                                                  • String ID: EOF received
                                                  • API String ID: 555484265-733935692
                                                  • Opcode ID: 58d3479d5bc34e0d13c3ebcf1f9934766fe26d5d178310e9fb4e5a9418d7d68c
                                                  • Instruction ID: 68375598295c7c9f2158309a2dfe56382f912d47cfcdb0d15ee97c2cbafa811f
                                                  • Opcode Fuzzy Hash: 58d3479d5bc34e0d13c3ebcf1f9934766fe26d5d178310e9fb4e5a9418d7d68c
                                                  • Instruction Fuzzy Hash: 2F81DB74D042199FEB10EFA5C8497EEBBF1AF44304F10886ED898A7341D7789A81CF5A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: fflushfread
                                                  • String ID: l$s
                                                  • API String ID: 3351130099-2254973558
                                                  • Opcode ID: 2d6b1b3a8d17a30b3d846707a68638323eb0f90d6eed5e93929e4956be74bf86
                                                  • Instruction ID: dbac5385818ea423b8456a6f6b6dca3264b3951da7f98bda1bc0e3289b312c8f
                                                  • Opcode Fuzzy Hash: 2d6b1b3a8d17a30b3d846707a68638323eb0f90d6eed5e93929e4956be74bf86
                                                  • Instruction Fuzzy Hash: A98106B4908748CFDB00DFA8D88479EBBF1BB99305F04C91DE488A7351D7B99984CB5A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: abortfreememset
                                                  • String ID: Du$'o9iQbd0.exe'
                                                  • API String ID: 2552529481-251729588
                                                  • Opcode ID: 394ae5f5fabaef1e25d300fca73bcce877e1f2b3ffd9597fa3c1a219e10e00a8
                                                  • Instruction ID: 72afdb1365d53b85751a192fcd88c8d61dc441a81e11f18ceb40af4b5056f9d9
                                                  • Opcode Fuzzy Hash: 394ae5f5fabaef1e25d300fca73bcce877e1f2b3ffd9597fa3c1a219e10e00a8
                                                  • Instruction Fuzzy Hash: DD815FB4A0420A9FCB40DF69D580A9EBBF1FF49344F00895AE858DB321E334EA55CF56
                                                  APIs
                                                    • Part of subcall function 00464696: strcmp.MSVCRT ref: 004646AA
                                                    • Part of subcall function 00464696: strlen.MSVCRT ref: 004646C0
                                                  • free.MSVCRT ref: 0043353E
                                                  • fclose.MSVCRT ref: 00433550
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: fclosefreestrcmpstrlen
                                                  • String ID: >Lj$Loaded %d record from CDX.$Loaded %d records from CDX.
                                                  • API String ID: 2977352491-581019807
                                                  • Opcode ID: e50e39e6b24841f7d6f98a476901fb13a53b0c0fee1b8132ba808fe580185adb
                                                  • Instruction ID: 107feef6a852187122471daed45f16a680b82fc808d10106e8bd3a84683860ed
                                                  • Opcode Fuzzy Hash: e50e39e6b24841f7d6f98a476901fb13a53b0c0fee1b8132ba808fe580185adb
                                                  • Instruction Fuzzy Hash: 5951F9B0C04309DBCB00EFA9D48559EBBF0BF49325F509A1EE4A4A7390D3789A85CF56
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: _fileno_isattyexit
                                                  • String ID: ;j$@F:v
                                                  • API String ID: 1309095928-2959357134
                                                  • Opcode ID: 636c8ca8ba3e52cd66cb30b68e55eddbaa4f53e0fcd6c6a7e75793a89ca0fef7
                                                  • Instruction ID: 378e6f7ce305c8f01cd0e9bbe73630facab59748370742f5dbb9561ba4c7e8fb
                                                  • Opcode Fuzzy Hash: 636c8ca8ba3e52cd66cb30b68e55eddbaa4f53e0fcd6c6a7e75793a89ca0fef7
                                                  • Instruction Fuzzy Hash: 7F312A74604704DFC700EF28E9807997BF1EB56346F80C89AE588CB361D7B99881CF5A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: freememcpyperrorstrcmpstrrchr
                                                  • String ID: /
                                                  • API String ID: 974839352-2043925204
                                                  • Opcode ID: 2e994438edc2b12a3b4ae7ab36f2bcd25206b724045477054b8a828b17dd2d2b
                                                  • Instruction ID: c0efe29a73835cbee70a05ce1ede8ea4a53349d14f7937cf6a81b9f442ea7dc2
                                                  • Opcode Fuzzy Hash: 2e994438edc2b12a3b4ae7ab36f2bcd25206b724045477054b8a828b17dd2d2b
                                                  • Instruction Fuzzy Hash: E721D2749042059FDB00EFA8C484BAEBBF1EF49344F14989AE894AB351D378D981CF5B
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: feof$ferrorfreadmalloc
                                                  • String ID: >Lj
                                                  • API String ID: 2139885029-538941895
                                                  • Opcode ID: 2675621022986000acddf6a6651f4929679bdaf9a8c302746db8300982746356
                                                  • Instruction ID: 4202a0e9b4fb267cb371157b9110590e551b291480603d6faded4c656714eacc
                                                  • Opcode Fuzzy Hash: 2675621022986000acddf6a6651f4929679bdaf9a8c302746db8300982746356
                                                  • Instruction Fuzzy Hash: C021C9B0509705AED7507F76D5C562FBBE4EF40798F058C2EE5888B212E778C4448BDA
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID:
                                                  • API String ID: 1294909896-0
                                                  • Opcode ID: 637b2b9256c5a6f04a97e6bba0d10958ce23c919564bdf524328ab01f46182a0
                                                  • Instruction ID: 6bf1c635eda13776ca614da713491dd5117c3cd194956a1b6fbdbaefb41a0ff4
                                                  • Opcode Fuzzy Hash: 637b2b9256c5a6f04a97e6bba0d10958ce23c919564bdf524328ab01f46182a0
                                                  • Instruction Fuzzy Hash: FB2105B8614704AFDB40EF68C585A597BF0BF083A4F028958FD889F362D775E9848F85
                                                  APIs
                                                    • Part of subcall function 004664F0: localtime.MSVCRT(?,?,?,?,?,?,?,?,?,00434609), ref: 004664FC
                                                  • abort.MSVCRT ref: 00434612
                                                  • strftime.MSVCRT ref: 00434634
                                                  • abort.MSVCRT(?,?,?,?,?,?,?,?,?,0043467D), ref: 0043463D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: abort$localtimestrftime
                                                  • String ID: $2024-09-29 08:19:05
                                                  • API String ID: 4060286791-3440902801
                                                  • Opcode ID: 5e299bee61fa91567d50ae28a07b1833922bc6829eee337b994e52f7b8846c0d
                                                  • Instruction ID: f9ce77136c946b7489fb427f51de89a8d6276bdf7e2af721c016dd62e31d681a
                                                  • Opcode Fuzzy Hash: 5e299bee61fa91567d50ae28a07b1833922bc6829eee337b994e52f7b8846c0d
                                                  • Instruction Fuzzy Hash: A7F0AC749043049ADB40FF69C04668DB7F8AF85348F01C86DE89897301E678D5848F56
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: fclose$feoffread
                                                  • String ID:
                                                  • API String ID: 3575824699-0
                                                  • Opcode ID: 0d5f716946cd4ee70f908a41e3c62a58535ce5de67a9682ebd7268ebbfffa2fc
                                                  • Instruction ID: 74d0ddec3937304b6f0bd249209546b70ccf3784dbf876eabd1ba711ebe34ce0
                                                  • Opcode Fuzzy Hash: 0d5f716946cd4ee70f908a41e3c62a58535ce5de67a9682ebd7268ebbfffa2fc
                                                  • Instruction Fuzzy Hash: 71512FB0E082099FDB00DFA9C5856EEBBF1FF48314F20891AE494A7340D7789980CF66
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: feofferrorfreadfree
                                                  • String ID:
                                                  • API String ID: 1625292482-0
                                                  • Opcode ID: 57704f382de84700739404eb2ac0a9f69512d0e1094fa5c8ddcc60c2623ec8ad
                                                  • Instruction ID: b3b76494cb22a1512182e747b18feefd2f2322fece4e4c33f4dee8a591b739dc
                                                  • Opcode Fuzzy Hash: 57704f382de84700739404eb2ac0a9f69512d0e1094fa5c8ddcc60c2623ec8ad
                                                  • Instruction Fuzzy Hash: 9451D174E046099BDB00DFA8C5847EEBBF1BF48314F10856AE458A7340D778AA84CF99
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: freestrchr
                                                  • String ID: .
                                                  • API String ID: 3117412158-248832578
                                                  • Opcode ID: bd8d72a44c2a58d56af29ce67850cde53ca6309379f9f47c5ff8a37cfaaf988e
                                                  • Instruction ID: b3a7e1307010b17e98d72a08e1497f618844301e9b20bc568741e4cc7050604a
                                                  • Opcode Fuzzy Hash: bd8d72a44c2a58d56af29ce67850cde53ca6309379f9f47c5ff8a37cfaaf988e
                                                  • Instruction Fuzzy Hash: 3D5185B4A0060ADFDB00DFA8C585BAEBBF1FF49304F108459E554AB354D378AA85CFA5
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$_unlinkmemcpystrlen
                                                  • String ID:
                                                  • API String ID: 622704575-0
                                                  • Opcode ID: 5668909cdf17ac24ecf8ca4404784558dfde9f7dd0f7871fed2f1495a297a691
                                                  • Instruction ID: cbe53c475af017e8e8676599a374aa13e9cb81624a34ab4f9e088f742daaa9e1
                                                  • Opcode Fuzzy Hash: 5668909cdf17ac24ecf8ca4404784558dfde9f7dd0f7871fed2f1495a297a691
                                                  • Instruction Fuzzy Hash: C7413C74914609DFCB40EFA8C8887AEBBF1AF09314F04895AE854AB350D3799A89CF55
                                                  APIs
                                                    • Part of subcall function 0040D4FF: strpbrk.MSVCRT ref: 0040D51E
                                                    • Part of subcall function 0040D4FF: strlen.MSVCRT ref: 0040D53D
                                                    • Part of subcall function 0040D4FF: strcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040E4F4), ref: 0040D587
                                                    • Part of subcall function 0040D4FF: strncmp.MSVCRT ref: 0040D682
                                                  • strlen.MSVCRT ref: 0040F86D
                                                  • free.MSVCRT ref: 0040F89F
                                                  • free.MSVCRT ref: 0040F8CB
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: freestrlen$strcpystrncmpstrpbrk
                                                  • String ID:
                                                  • API String ID: 4034866347-0
                                                  • Opcode ID: 770b9ffc85ac3ba3acda6f44466006ed730831e5e1b4e300d318011ac75a284c
                                                  • Instruction ID: 7abae07c37b933f45e555c917f5dbd6ccf78dc78032c4f636d506b4a31f342b4
                                                  • Opcode Fuzzy Hash: 770b9ffc85ac3ba3acda6f44466006ed730831e5e1b4e300d318011ac75a284c
                                                  • Instruction Fuzzy Hash: 1C41A2B4904309DFDB40EFA8C4957AEBBF0EF04304F018869E998AB391D7799945CF96
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: ferrorfreadfreemalloc
                                                  • String ID:
                                                  • API String ID: 2213037399-0
                                                  • Opcode ID: dbea59ea604e3e4d43c6cdd0a98158e641551b07428e0954faaaf6a4c1b5c08c
                                                  • Instruction ID: 6b8c97a0c59b67f77728cbca95a11bdca06b76aab3831e0ce8c9517d9f5a85e9
                                                  • Opcode Fuzzy Hash: dbea59ea604e3e4d43c6cdd0a98158e641551b07428e0954faaaf6a4c1b5c08c
                                                  • Instruction Fuzzy Hash: 8931B9B4904309AFDB40EFA5C4856AEBBF0BF44755F01882EE89997340D778DA84CF46
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: ferrorfreadfreemalloc
                                                  • String ID:
                                                  • API String ID: 2213037399-0
                                                  • Opcode ID: 17608483d2bb84f3ca788853a59ab57ad8ef80258d5f337e7777108a80cab41e
                                                  • Instruction ID: 89c9c861119ab1aeb4ac0468ac9ef43b595bcf6abd8af302a1bde6114df41c84
                                                  • Opcode Fuzzy Hash: 17608483d2bb84f3ca788853a59ab57ad8ef80258d5f337e7777108a80cab41e
                                                  • Instruction Fuzzy Hash: 783185B4908709DBEB40EF65C4847AEB7F4EF48304F01886AE89897341E778D9858F96
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: ferrorfreadfreemalloc
                                                  • String ID:
                                                  • API String ID: 2213037399-0
                                                  • Opcode ID: 9fc8d3d9829d7891c3e937a4d498c5e4daf8e67d39506a1d35379690804d350f
                                                  • Instruction ID: 89627da46152ff55fea6ed79a2b88537cfed459153cd40d330b41d845661dddd
                                                  • Opcode Fuzzy Hash: 9fc8d3d9829d7891c3e937a4d498c5e4daf8e67d39506a1d35379690804d350f
                                                  • Instruction Fuzzy Hash: 7331C8B4908709DBEB40EF69C4847AEBBF5BF44354F01886EE898A7341D7389985CF46
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: ferrorfreadfreemalloc
                                                  • String ID:
                                                  • API String ID: 2213037399-0
                                                  • Opcode ID: 16a2dd953733763580db543b7f3e67b02027cff8caed754fa83dbfc39abcade0
                                                  • Instruction ID: 751ec2d2c25b7f20dce7288945cebc4d45aef790d9cd8925519ad7b1ad32a3d0
                                                  • Opcode Fuzzy Hash: 16a2dd953733763580db543b7f3e67b02027cff8caed754fa83dbfc39abcade0
                                                  • Instruction Fuzzy Hash: 0C31D7B49087099BEB40EFA4C4457AEB7F0FF85304F01886EE898A7341D7789985CF46
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: ferrorfreadfreemalloc
                                                  • String ID:
                                                  • API String ID: 2213037399-0
                                                  • Opcode ID: a1c90d395d8d177f73aa126620af914b8d5ed9f6e757c8a438fc2a1bcb05113f
                                                  • Instruction ID: 83ef2d0f02f39554e4963e2426ed250b92d7bf4208c6dd63daa4ccba2b1804a0
                                                  • Opcode Fuzzy Hash: a1c90d395d8d177f73aa126620af914b8d5ed9f6e757c8a438fc2a1bcb05113f
                                                  • Instruction Fuzzy Hash: 9F31C7B4909708DBEB40EFA8C4847AEB7F4BF44304F00886EE498A7341E7789985CF46
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: ferrorfreadfreemalloc
                                                  • String ID:
                                                  • API String ID: 2213037399-0
                                                  • Opcode ID: 4ee0aa95e5fee7228a8b7cd9ed278d7b8e1f86cf0cc41cd561f5b2eabeae5f69
                                                  • Instruction ID: 5c3fbbc48fd9d2facf3daa0749eaf46c98c7ac6201958495a0c385c2f2b7d06d
                                                  • Opcode Fuzzy Hash: 4ee0aa95e5fee7228a8b7cd9ed278d7b8e1f86cf0cc41cd561f5b2eabeae5f69
                                                  • Instruction Fuzzy Hash: C83174B4908709DBEB40EF65C4857AEB7F4FF44304F00886AE89897341E778D9858F86
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: exit
                                                  • String ID:
                                                  • API String ID: 2483651598-0
                                                  • Opcode ID: 7f96208a35e1248891029813ac31be7fa2c190da685e5582e368e68713d8cca7
                                                  • Instruction ID: 8a8073d4acae41a1499a12db6730b2570545f8c6ca56fb86fdec91b1cadcc59f
                                                  • Opcode Fuzzy Hash: 7f96208a35e1248891029813ac31be7fa2c190da685e5582e368e68713d8cca7
                                                  • Instruction Fuzzy Hash: 7131EAB05083448FD750BFA595023AABBE1AF0530AF41994EE4C49B392C7FE8584CB5A
                                                  APIs
                                                    • Part of subcall function 0040D4FF: strpbrk.MSVCRT ref: 0040D51E
                                                    • Part of subcall function 0040D4FF: strlen.MSVCRT ref: 0040D53D
                                                    • Part of subcall function 0040D4FF: strcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040E4F4), ref: 0040D587
                                                    • Part of subcall function 0040D4FF: strncmp.MSVCRT ref: 0040D682
                                                  • strlen.MSVCRT ref: 0040F075
                                                  • free.MSVCRT ref: 0040F0A7
                                                  • free.MSVCRT ref: 0040F0C3
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: freestrlen$strcpystrncmpstrpbrk
                                                  • String ID:
                                                  • API String ID: 4034866347-0
                                                  • Opcode ID: 969020391e904adff096306e8f472016aa938987f053c96df48453ce22c69789
                                                  • Instruction ID: 2a263fb33e182c132b425f924d2e5ca61d55926580bda60aa7b14938efa6d3ca
                                                  • Opcode Fuzzy Hash: 969020391e904adff096306e8f472016aa938987f053c96df48453ce22c69789
                                                  • Instruction Fuzzy Hash: D33194B4D04209DFCB50EFA8C4857AEBBF1EF04314F01887AE994AB351D7789985CB96
                                                  APIs
                                                    • Part of subcall function 0040D4FF: strpbrk.MSVCRT ref: 0040D51E
                                                    • Part of subcall function 0040D4FF: strlen.MSVCRT ref: 0040D53D
                                                    • Part of subcall function 0040D4FF: strcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040E4F4), ref: 0040D587
                                                    • Part of subcall function 0040D4FF: strncmp.MSVCRT ref: 0040D682
                                                  • strlen.MSVCRT ref: 0040F25D
                                                  • free.MSVCRT ref: 0040F28F
                                                  • free.MSVCRT ref: 0040F2AB
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: freestrlen$strcpystrncmpstrpbrk
                                                  • String ID:
                                                  • API String ID: 4034866347-0
                                                  • Opcode ID: 0dccf4c214a7bb8277d0f090a81ea7470aa41b0d5a926b668da0a487d0780f73
                                                  • Instruction ID: 7b4265167e80660bb387846f5e20aa4e2049e692021a2f488d4a3a7082e68a18
                                                  • Opcode Fuzzy Hash: 0dccf4c214a7bb8277d0f090a81ea7470aa41b0d5a926b668da0a487d0780f73
                                                  • Instruction Fuzzy Hash: E23184B4D042099FDB50EFA8C0857AEBBF1EF04314F40887EE994AB351D77899858F96
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: strlen$freemalloc
                                                  • String ID:
                                                  • API String ID: 1282205974-0
                                                  • Opcode ID: f9b191c3a967ca56cb6c30f1530dc430a65cf2d3cde2ee9ba47de722decc8a61
                                                  • Instruction ID: b74e56cb4b203936ad4f1c0a1203dd0adaad5ba684d850e3ed90c64b275ed15f
                                                  • Opcode Fuzzy Hash: f9b191c3a967ca56cb6c30f1530dc430a65cf2d3cde2ee9ba47de722decc8a61
                                                  • Instruction Fuzzy Hash: DF21A1758047108FC7A0AF69D48515EBBF5EF81320F054A2DEDA897356E37189458B83
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID:
                                                  • API String ID: 1294909896-0
                                                  • Opcode ID: df04787e92bf3977fbe0efff50491df031d7ce347e890ac1cfafaa0837b2f201
                                                  • Instruction ID: 7f6fc7d3adb9a3684fd4b6487d09d3935042150ea652d51cbb1c90cb519ec3ed
                                                  • Opcode Fuzzy Hash: df04787e92bf3977fbe0efff50491df031d7ce347e890ac1cfafaa0837b2f201
                                                  • Instruction Fuzzy Hash: FF3164B4A00609DFCB40DFA8C485AAEB7F1FF48350F158859E958AB321D374ED40CB66
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: ferrorfputc$_fileno
                                                  • String ID:
                                                  • API String ID: 3192151539-0
                                                  • Opcode ID: 917c0744ca44729ff76d4dda15370c0f733d866578801d78067e17bcb6b38e2e
                                                  • Instruction ID: 7963ca36a7d4390cba080d0245cf4829c175a0bade3588fd5cd594e580de2ded
                                                  • Opcode Fuzzy Hash: 917c0744ca44729ff76d4dda15370c0f733d866578801d78067e17bcb6b38e2e
                                                  • Instruction Fuzzy Hash: BC21A4749142059FCB40FFB9D98569DBBF0EF04310F40C92AE9A8DB351EB78D9458B4A
                                                  APIs
                                                    • Part of subcall function 00460B8C: strlen.MSVCRT ref: 00460B98
                                                    • Part of subcall function 004301FE: free.MSVCRT ref: 0043020D
                                                  • _chmod.MSVCRT ref: 0040ABBB
                                                  • free.MSVCRT ref: 0040AC9A
                                                  • free.MSVCRT ref: 0040ACCA
                                                    • Part of subcall function 0047CF40: strlen.MSVCRT ref: 0047CFCA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$strlen$_chmod
                                                  • String ID: 6
                                                  • API String ID: 1218483711-498629140
                                                  • Opcode ID: 73cd18548b771be89cb25db49d0b2903f3b321935a56ba6fa66e82c43128ad59
                                                  • Instruction ID: d44139442b8aa3c41563eaf1e94316c804439dcb778418d46c7a7a7ec5f6281a
                                                  • Opcode Fuzzy Hash: 73cd18548b771be89cb25db49d0b2903f3b321935a56ba6fa66e82c43128ad59
                                                  • Instruction Fuzzy Hash: 3422F8B4A043458FDB10DF68D584A9ABBF1BF48304F15852AF898EB391D778D851CF2A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: fclosefeoffopen
                                                  • String ID: -Ll$>Lj
                                                  • API String ID: 1582107633-3880824773
                                                  • Opcode ID: ac3b157f25fdfdde00b6e444298acf8f68fdd626a3a674ab5b078a653ea76d15
                                                  • Instruction ID: 77e95241bdf958cb3b1f9dc4b0ed71d1778fb7ee86fc69f708b906cde105611b
                                                  • Opcode Fuzzy Hash: ac3b157f25fdfdde00b6e444298acf8f68fdd626a3a674ab5b078a653ea76d15
                                                  • Instruction Fuzzy Hash: 35E01AB09097144BC750BF28958641FBAE4EF48B58F064D6EF8C89B306D678CC408BD2
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: freestrlen$strchr
                                                  • String ID:
                                                  • API String ID: 2161346236-0
                                                  • Opcode ID: a5ca42b07b0b332eb1bda6367aa7a222a4ad064eca75f36c013bb39282fc6abd
                                                  • Instruction ID: 881ee802812e07cdcae6acc596adc3cc4d8b47ad92f8e32ab071326a37d6f872
                                                  • Opcode Fuzzy Hash: a5ca42b07b0b332eb1bda6367aa7a222a4ad064eca75f36c013bb39282fc6abd
                                                  • Instruction Fuzzy Hash: 07811674A04248CFCB10EF68C8847AEB7F1EF49314F12856BE464DB361E7789981DB5A
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: memcpy
                                                  • String ID:
                                                  • API String ID: 3510742995-0
                                                  • Opcode ID: 5d3bbc39cddabb0cd8f415be2921467b09b5696671d1690e52f7636433b88e64
                                                  • Instruction ID: 76ab6be8e3b995398ddc18ca7b35c780efb9cbb3b60b6dda6742eb0cc1f0b698
                                                  • Opcode Fuzzy Hash: 5d3bbc39cddabb0cd8f415be2921467b09b5696671d1690e52f7636433b88e64
                                                  • Instruction Fuzzy Hash: 74817DB4A0420A9FCB44DF58C5819AEBBF1FF88304F10981AF858EB350E734EA55CB56
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$strcmp
                                                  • String ID:
                                                  • API String ID: 507678545-0
                                                  • Opcode ID: 02afefc0a4dead14cab2b7d234294687f19ccfed5358a5a2f722d3aa55c16f9d
                                                  • Instruction ID: 0314209b880bfa7965aefab8bf48d9330b8014cbfd65c81e8e1eb9470fbd4801
                                                  • Opcode Fuzzy Hash: 02afefc0a4dead14cab2b7d234294687f19ccfed5358a5a2f722d3aa55c16f9d
                                                  • Instruction Fuzzy Hash: 8E5195B4A047059FCB40EFA5D48569EBBF0EF88354F01C82EE9989B351E778D9818F46
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: d$e
                                                  • API String ID: 0-2091896479
                                                  • Opcode ID: 1738e669481e992b97892dc1dd00ebd1602f8afda7b910a3160274d552a9fcc6
                                                  • Instruction ID: 8705651d6c4c4153acc9892bfdee204b33a1c85f0be5924aae9a5b3b7cf3fe81
                                                  • Opcode Fuzzy Hash: 1738e669481e992b97892dc1dd00ebd1602f8afda7b910a3160274d552a9fcc6
                                                  • Instruction Fuzzy Hash: B7E168716087458FD710DF68C09466AFFE0FF88358F08896EE8898B342E3B5D945CB96
                                                  APIs
                                                    • Part of subcall function 0040D4FF: strpbrk.MSVCRT ref: 0040D51E
                                                    • Part of subcall function 0040D4FF: strlen.MSVCRT ref: 0040D53D
                                                    • Part of subcall function 0040D4FF: strcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040E4F4), ref: 0040D587
                                                    • Part of subcall function 0040D4FF: strncmp.MSVCRT ref: 0040D682
                                                  • strlen.MSVCRT ref: 0040F189
                                                  • free.MSVCRT ref: 0040F1BB
                                                  • free.MSVCRT ref: 0040F1D4
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: freestrlen$strcpystrncmpstrpbrk
                                                  • String ID:
                                                  • API String ID: 4034866347-0
                                                  • Opcode ID: 5b9318574c05414045dcac178074bcc64c32adfc121d44a8e832eaa00b1ff210
                                                  • Instruction ID: 61909c09539d82ab4d277844b135435545862b271f4ef5ba74da7ed50397a5f0
                                                  • Opcode Fuzzy Hash: 5b9318574c05414045dcac178074bcc64c32adfc121d44a8e832eaa00b1ff210
                                                  • Instruction Fuzzy Hash: 593185B4D04309DFCB50EFA8C4856AEBBF1EF08314F00886EE998A7341D77899458F96
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: strncmp
                                                  • String ID: DEFAULT$SECLEVEL=$STRENGTH
                                                  • API String ID: 1114863663-1671674613
                                                  • Opcode ID: 32ea227b58dda6ba90265086afc670bac1354ff2cff5b4a2c30016aa7cf1b71c
                                                  • Instruction ID: 17a5e4dc33fad8a1a0d9940f9703340b7d33bad675b234aaf070e37d5d0979c7
                                                  • Opcode Fuzzy Hash: 32ea227b58dda6ba90265086afc670bac1354ff2cff5b4a2c30016aa7cf1b71c
                                                  • Instruction Fuzzy Hash: F3C18D785083459FD7A4CF58C084B6BBBE3BB85304F58892EE8958B351D77DDC4A8B0A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: memcpy
                                                  • String ID: !$A$n
                                                  • API String ID: 3510742995-1063879630
                                                  • Opcode ID: bf48037dac0f04f895ff68b0127cf50889267ee0accfb42769105e8647f8a8ba
                                                  • Instruction ID: ca227b7be8ac40626a1b427dd8b444a87e7fcf52428d572dd118c6758efface6
                                                  • Opcode Fuzzy Hash: bf48037dac0f04f895ff68b0127cf50889267ee0accfb42769105e8647f8a8ba
                                                  • Instruction Fuzzy Hash: 92A13AB0608B118FDB10EF25E48572ABFE1FF86314F44896DE8888B395E775D845CB92
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: memcpy$realloc
                                                  • String ID:
                                                  • API String ID: 3498169086-0
                                                  • Opcode ID: 3dd5fd27aa0475244140fe7c2abc5db9d387265cba294067eef4e9a411db6628
                                                  • Instruction ID: 25e4e0f0af3c0f02c5e5f4498a772d6cbd84119475b07d9e7cbdbf9b9d21fc16
                                                  • Opcode Fuzzy Hash: 3dd5fd27aa0475244140fe7c2abc5db9d387265cba294067eef4e9a411db6628
                                                  • Instruction Fuzzy Hash: 0AC19E78A00609DFCB04CF59C585AAABBF1FF58350F15C569E959DB321E338EA81CB81
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: P$n$t
                                                  • API String ID: 0-900248086
                                                  • Opcode ID: 321a567dbbd36d83e07ca71f30b9cfaed11306467cb1d004a8b857edfdb6aa2a
                                                  • Instruction ID: 101434c1dc54e0bb650a1eeabd85f089cd828d83739bdb63fc1052460786ad2c
                                                  • Opcode Fuzzy Hash: 321a567dbbd36d83e07ca71f30b9cfaed11306467cb1d004a8b857edfdb6aa2a
                                                  • Instruction Fuzzy Hash: 9C6103B05183059FD724AF24D48839FBBE1BF84358F118D2DE4D887391E7B99489CB52
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$_fileno_read
                                                  • String ID:
                                                  • API String ID: 2544081419-0
                                                  • Opcode ID: 5826e7909c431e709536cae9bc098acd7e58b675f3512d59643295725b3b7dc2
                                                  • Instruction ID: c80407ab8e3d9d67e625f67603bdd3b745ff4088f2e6a87b829444f17b038d69
                                                  • Opcode Fuzzy Hash: 5826e7909c431e709536cae9bc098acd7e58b675f3512d59643295725b3b7dc2
                                                  • Instruction Fuzzy Hash: F951A5B4E046098FCB04DFA8C485BAEBBF1AF48314F158459E994EB351E778E881CB95
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: strcpystrlenstrncmpstrpbrk
                                                  • String ID:
                                                  • API String ID: 1641922644-0
                                                  • Opcode ID: 26dff9fd53af1bdf8f76a88192bab8515dce6f7f54f493afcc77f3692746a484
                                                  • Instruction ID: 4c09633717028b7603d32d667b1a08b2ced639035c6cad10bff597db142cb581
                                                  • Opcode Fuzzy Hash: 26dff9fd53af1bdf8f76a88192bab8515dce6f7f54f493afcc77f3692746a484
                                                  • Instruction Fuzzy Hash: A551B3B49083059FDB00EFA9C1516AEBBF1EF48304F14882EE898AB341D778D945DF56
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: memset$abort
                                                  • String ID:
                                                  • API String ID: 555401181-0
                                                  • Opcode ID: 342784479f6f7dfef88689ee002c99257524d8c24325fefd012827274886a023
                                                  • Instruction ID: 4742ae14d3f4bf0e512eadfeee0d567255e0c34e9d00a8df9cacda78cb028b19
                                                  • Opcode Fuzzy Hash: 342784479f6f7dfef88689ee002c99257524d8c24325fefd012827274886a023
                                                  • Instruction Fuzzy Hash: D941D5B89043059FDB50DF68C5846AABBF0FF48310F10C9AAE858AB391D778D981CF56
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: strlen
                                                  • String ID: PRIVATE KEY
                                                  • API String ID: 39653677-3918793146
                                                  • Opcode ID: 6850bde1f3366bf81d08e39fe5ed23b1ea34227714df3f4863de142fc5d2792d
                                                  • Instruction ID: dea473fb9499e73b70c7f5b885891c30eec5e01c0a0aebf8a838b66770893a2b
                                                  • Opcode Fuzzy Hash: 6850bde1f3366bf81d08e39fe5ed23b1ea34227714df3f4863de142fc5d2792d
                                                  • Instruction Fuzzy Hash: 2D316C75A087068FCB10AF69D8D426FBBE4FB89750F00482FE998C7301EB79D8458B56
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: -$GI
                                                  • API String ID: 1294909896-3764463600
                                                  • Opcode ID: 7a949826d61e7ccc000a20883232404de1c032ec69143a67d381d830ff2acf9e
                                                  • Instruction ID: be910e61166184c1282237cafe1a5b6e165960512543fe0e86bd6e7daa6b4a26
                                                  • Opcode Fuzzy Hash: 7a949826d61e7ccc000a20883232404de1c032ec69143a67d381d830ff2acf9e
                                                  • Instruction Fuzzy Hash: DC41E974A042049FDB10EF65D4857DEBBF1BF09304F04886AE889AB351C77DD886CB5A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: strlen
                                                  • String ID: R"j$VUUU
                                                  • API String ID: 39653677-4025554640
                                                  • Opcode ID: 1acc5504e87c000de7eee4ffabeccfc953b12c3228e3fd04139b68576bc925e5
                                                  • Instruction ID: e2afc70438765ff70df85d60a5c0854ccb82b65826decb45b4e2884144c2b199
                                                  • Opcode Fuzzy Hash: 1acc5504e87c000de7eee4ffabeccfc953b12c3228e3fd04139b68576bc925e5
                                                  • Instruction Fuzzy Hash: D8313EB1A046099FDB04EF69C58278EBBF5EF88304F10C929F898DB341E674DA458B42
                                                  APIs
                                                  • strlen.MSVCRT ref: 0040E26A
                                                  • free.MSVCRT ref: 0040E2DC
                                                  • free.MSVCRT ref: 0040E2EE
                                                    • Part of subcall function 0040D4FF: strpbrk.MSVCRT ref: 0040D51E
                                                    • Part of subcall function 0040D4FF: strlen.MSVCRT ref: 0040D53D
                                                    • Part of subcall function 0040D4FF: strcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040E4F4), ref: 0040D587
                                                    • Part of subcall function 0040D4FF: strncmp.MSVCRT ref: 0040D682
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: freestrlen$strcpystrncmpstrpbrk
                                                  • String ID:
                                                  • API String ID: 4034866347-3916222277
                                                  • Opcode ID: 1a0f70a3d0b64e1ad74b9d68cea7199c0ea77c6b1c13aecd8bb1d0f8f0f26de7
                                                  • Instruction ID: 080edf03632529b28ce316c5157b73fb6662ff82e7c0830075f84125d9eaa242
                                                  • Opcode Fuzzy Hash: 1a0f70a3d0b64e1ad74b9d68cea7199c0ea77c6b1c13aecd8bb1d0f8f0f26de7
                                                  • Instruction Fuzzy Hash: 5E2180B4D083099FDB40EFA5C5497AEBBF4BF04314F00886DE594A7380D3B896488F96
                                                  APIs
                                                    • Part of subcall function 0040D4FF: strpbrk.MSVCRT ref: 0040D51E
                                                    • Part of subcall function 0040D4FF: strlen.MSVCRT ref: 0040D53D
                                                    • Part of subcall function 0040D4FF: strcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040E4F4), ref: 0040D587
                                                    • Part of subcall function 0040D4FF: strncmp.MSVCRT ref: 0040D682
                                                  • strlen.MSVCRT ref: 0040E433
                                                  • free.MSVCRT ref: 0040E49C
                                                  • free.MSVCRT ref: 0040E4AE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: freestrlen$strcpystrncmpstrpbrk
                                                  • String ID: ,
                                                  • API String ID: 4034866347-3772416878
                                                  • Opcode ID: 4875fc27bffa9390a5751e94cb77b6040db72ccef224c934ad1a07695df381ca
                                                  • Instruction ID: c1f315b4d1e8afb9ded99d055467b76c5d2de8ed173a437f71661900fdb02ef4
                                                  • Opcode Fuzzy Hash: 4875fc27bffa9390a5751e94cb77b6040db72ccef224c934ad1a07695df381ca
                                                  • Instruction Fuzzy Hash: B92192B4D0420ADFDB00EFA5C1457AEBBF1AF04314F108869E594B7341D7789A48CF96
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: __dllonexit_lock_onexit_unlock
                                                  • String ID:
                                                  • API String ID: 209411981-0
                                                  • Opcode ID: 448557ca1dd2cfbdcf81c72d8946961dc32e4e1a9dcf9ceb0da74e856e2e7ca5
                                                  • Instruction ID: 0dcb538493313c8bad2047058ded7d9807b082d6a3c56fb47ff16a121c433578
                                                  • Opcode Fuzzy Hash: 448557ca1dd2cfbdcf81c72d8946961dc32e4e1a9dcf9ceb0da74e856e2e7ca5
                                                  • Instruction Fuzzy Hash: 5D11AFB09193008BC780EFB8D48555EBBE1FF48351F409D2EE4C8D7351EA7898848B86
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: memset
                                                  • String ID: 0
                                                  • API String ID: 2221118986-4108050209
                                                  • Opcode ID: 9a3371fbc08bb2320efb9a66f5217fea2f71186ba9fe69faf010ab64a9acaf70
                                                  • Instruction ID: 1a6843beecda9b036c12b300968ae350e07218c98cfa1b2940006f4a612fee06
                                                  • Opcode Fuzzy Hash: 9a3371fbc08bb2320efb9a66f5217fea2f71186ba9fe69faf010ab64a9acaf70
                                                  • Instruction Fuzzy Hash: 4CF062B0509304ABE700AF68C09974EBBF0AF41388F41CD4CE4889B351D7B9D9889B86
                                                  APIs
                                                  Strings
                                                  • %s (%s) - written to stdout %s[%s], xrefs: 0040A244
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: freetime
                                                  • String ID: %s (%s) - written to stdout %s[%s]
                                                  • API String ID: 1332385498-177992797
                                                  • Opcode ID: 50049f2b49a54382c1086fef41ad933bd30cf25daa2895565f14c4227653d992
                                                  • Instruction ID: cd992a3e185eacfc30e0a8746f43b83936ba128a81b1190ff053f77791a6c81f
                                                  • Opcode Fuzzy Hash: 50049f2b49a54382c1086fef41ad933bd30cf25daa2895565f14c4227653d992
                                                  • Instruction Fuzzy Hash: CC6126B49083449FCB50DFA8D180B9EBBF0EF49314F10896EE894AB392D379D855CB56
                                                  APIs
                                                  Strings
                                                  • --2024-09-29 08:19:01-- https://download.yandex.ru/yandex-pack/downloader/downloader.exe, xrefs: 00424258
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: fflush
                                                  • String ID: --2024-09-29 08:19:01-- https://download.yandex.ru/yandex-pack/downloader/downloader.exe
                                                  • API String ID: 497872470-910687100
                                                  • Opcode ID: b891c21f041fe2174c5df9b604720f97a14e7162263b629953abb1609b50ffb8
                                                  • Instruction ID: 811616238678588f616a86844f97d056cfd5f6635670f06d074cc7c86fc7556e
                                                  • Opcode Fuzzy Hash: b891c21f041fe2174c5df9b604720f97a14e7162263b629953abb1609b50ffb8
                                                  • Instruction Fuzzy Hash: A1412474F002158BCB00DFA9E8857AEB7F2EB88300F98C66AD844D7355E678DA45CB95
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: getenvmemset
                                                  • String ID: @Fu
                                                  • API String ID: 2427648170-160905698
                                                  • Opcode ID: 164325a2fb92b9150e8f14da321161fb5e3fbf1df651d95c20aebb15549ce4de
                                                  • Instruction ID: 7a99202e98306228c4b82602ea91bc0a6e1667b51096a519d677f62a00898e17
                                                  • Opcode Fuzzy Hash: 164325a2fb92b9150e8f14da321161fb5e3fbf1df651d95c20aebb15549ce4de
                                                  • Instruction Fuzzy Hash: C0411670419384CBE3919F68E8593C63EE1E31535EF54C688D4912A3E2CBFF21488B5B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 9
                                                  • API String ID: 0-2366072709
                                                  • Opcode ID: 2c4d8f56a7095f208754471cc3d8d4dff81a768f27379315d91e3435a4c8f075
                                                  • Instruction ID: 412300ee3f83be9774a59ccb955bc4eef5c7af9eb8d8db249e088e34fd80266d
                                                  • Opcode Fuzzy Hash: 2c4d8f56a7095f208754471cc3d8d4dff81a768f27379315d91e3435a4c8f075
                                                  • Instruction Fuzzy Hash: 9F31A274909304ABCB10AFA9C09569DBBF1EF45304F01882EE58A9B351D7B8D9C59F8A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: getenv
                                                  • String ID: ENV
                                                  • API String ID: 498649692-1709310067
                                                  • Opcode ID: 964fc39699854814b12d10ecebe3f66be287b98df8c55680362671c3e44cfd44
                                                  • Instruction ID: 79fa6a54415a39d9eb2d4a6c160f0485138a8e8fa9d56c54a012500992b59bb8
                                                  • Opcode Fuzzy Hash: 964fc39699854814b12d10ecebe3f66be287b98df8c55680362671c3e44cfd44
                                                  • Instruction Fuzzy Hash: 7111E471A083058FE710DF69D595A2ABBF4FB84790F08082DEA8887200E731DD44CBA2
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: exitgetenv
                                                  • String ID: D4j
                                                  • API String ID: 3838239448-2661255103
                                                  • Opcode ID: bb3b07b06fc19e56a2a810309206d09ae93f9ce11f083a043cbb3f40febba6b2
                                                  • Instruction ID: b08d63f4bff3b6f2c626c0a079d026ebc0a138e7dd3a85ae493b041b55f70fc3
                                                  • Opcode Fuzzy Hash: bb3b07b06fc19e56a2a810309206d09ae93f9ce11f083a043cbb3f40febba6b2
                                                  • Instruction Fuzzy Hash: BC11B3B49043189FCB00EFA5D0456AEFBF1EF49304F80C86EA899A7351D7789941CF5A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: abort
                                                  • String ID: EH$EH
                                                  • API String ID: 4206212132-1143124007
                                                  • Opcode ID: 67719b3dabf38655a7a3fd5264408ad8d4603e7bd08c643ff3b4d1ee609edb2e
                                                  • Instruction ID: 774e43e9fc1f0ca275cf251fc0ce1fe880004b86ccbf7194f62e25e3bbcfcea8
                                                  • Opcode Fuzzy Hash: 67719b3dabf38655a7a3fd5264408ad8d4603e7bd08c643ff3b4d1ee609edb2e
                                                  • Instruction Fuzzy Hash: C0F0DA7490420AAB8B00FF69C08545EBBF4AA96308F51CC1BE979E7340E37CD9459F4A
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: strchrstrrchr
                                                  • String ID: /
                                                  • API String ID: 3976189772-2043925204
                                                  • Opcode ID: 4213c0de15f9e4cb033179699396065e0a5aee4ad635f512dcef2d2c41a1efe7
                                                  • Instruction ID: d36c20ec37d871ea10197bbd8d626ab7eb2babad295817790a31e7f9482c9c3d
                                                  • Opcode Fuzzy Hash: 4213c0de15f9e4cb033179699396065e0a5aee4ad635f512dcef2d2c41a1efe7
                                                  • Instruction Fuzzy Hash: 9DE0ED70904708ABDB04AFA9C58939EB7F8AF08344F009868A4A5D7381E678D941CF46
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: callocmemsetstrcmp
                                                  • String ID:
                                                  • API String ID: 515720262-0
                                                  • Opcode ID: f6e82c6615333a988c97fe6d5083ae64f1d918c9b3896d98f1e11dc6902ce298
                                                  • Instruction ID: 0f11a368acdaad632c1ac94120a56225603180055a15731b18995a5d29140032
                                                  • Opcode Fuzzy Hash: f6e82c6615333a988c97fe6d5083ae64f1d918c9b3896d98f1e11dc6902ce298
                                                  • Instruction Fuzzy Hash: 1AA14A70E042498FDB10DF58C484BAEBBF1EF09354F148566E8A8AB351E339DD85CB96
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: memsetstrlen
                                                  • String ID:
                                                  • API String ID: 841943882-0
                                                  • Opcode ID: 5fb7e855fa65b02f7f62f6cb986c457631bc30fab7aaef14718a49387229d470
                                                  • Instruction ID: 87af1275d6617d1b1d43465a42f61a8ce342100c32c3aa2ee436d7f5caa94b52
                                                  • Opcode Fuzzy Hash: 5fb7e855fa65b02f7f62f6cb986c457631bc30fab7aaef14718a49387229d470
                                                  • Instruction Fuzzy Hash: CA71A374904249DFDB00EF68C485A9EBBF1FF49304F10896AE498A7351E7749A88CF56
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$strrchr
                                                  • String ID:
                                                  • API String ID: 274422233-0
                                                  • Opcode ID: 2bc4ce756a987293b4bdd4645ed79a6bc270aa514e8f8d11ce71549ef8c4474e
                                                  • Instruction ID: d84a44be9d128ede88ef400b6ecd9853d4472d724eb76920e06b3b612a42a497
                                                  • Opcode Fuzzy Hash: 2bc4ce756a987293b4bdd4645ed79a6bc270aa514e8f8d11ce71549ef8c4474e
                                                  • Instruction Fuzzy Hash: F25185B49047058FCB40EF68C58566EBBF0FF48304F11892DE898AB351D778D950CB66
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$strlen
                                                  • String ID:
                                                  • API String ID: 667451143-0
                                                  • Opcode ID: bb7733415e9dddd495705376d1e2e24074763acb2ca9debf8bdf5502b9cde1dd
                                                  • Instruction ID: 3ba40ede93f5896a3ef65ad6a5734a4f8dc87a7ce60f4c15af8a1eea008e3fe8
                                                  • Opcode Fuzzy Hash: bb7733415e9dddd495705376d1e2e24074763acb2ca9debf8bdf5502b9cde1dd
                                                  • Instruction Fuzzy Hash: 1241D5B4D042499EDB20DFA8C4457AEBBF0AF19314F048479E894B7781D3789989CF66
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.2129919081.0000000000401000.00000020.00000001.01000000.00000010.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.2129894893.0000000000400000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130091293.000000000067E000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130111034.0000000000680000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130132423.0000000000681000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130153464.0000000000687000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130174402.000000000068A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.000000000068B000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130187801.00000000006E2000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130265528.0000000000751000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                  • Associated: 00000004.00000002.2130281737.000000000075A000.00000008.00000001.01000000.00000010.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Xr5XVue.jbxd
                                                  Similarity
                                                  • API ID: free$memset
                                                  • String ID:
                                                  • API String ID: 2717317152-0
                                                  • Opcode ID: 11696d5e6eae9ba1bab53ef73d143f883507d9df223ae1f02666ff48eef4f121
                                                  • Instruction ID: 145e6a165ab6334dfbf9447ae0f117794e94c639310b598d9b089a8edc3033f0
                                                  • Opcode Fuzzy Hash: 11696d5e6eae9ba1bab53ef73d143f883507d9df223ae1f02666ff48eef4f121
                                                  • Instruction Fuzzy Hash: C6212F78A04608EFCB40DF99C484A9DBBF0FF48354F01C89AE858AB361D374A940DF45