Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe

Overview

General Information

Sample name:1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe
Analysis ID:1527258
MD5:e9057285aafb6978445c07029fdc5898
SHA1:f928987a99bfde3cf80730d04e5c1436271d71d0
SHA256:a21c68c24894a9bd385b58971c4a35d8c4b896a5d4da56ad47832114af033ad6
Tags:base64-decodedexeRemcosRATuser-abuse_ch
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Machine Learning detection for sample
Maps a DLL or memory area into another process
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses dynamic DNS services
Yara detected WebBrowserPassView password recovery tool
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "cavps7.duckdns.org:1991:1", "Assigned name": "Agent-010524", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-43JG4A", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeJoeSecurity_RemcosYara detected Remcos RATJoe Security
    1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
      1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeWindows_Trojan_Remcos_b296e965unknownunknown
      • 0x6aaa8:$a1: Remcos restarted by watchdog!
      • 0x6b020:$a3: %02i:%02i:%02i:%03i
      1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeREMCOS_RAT_variantsunknownunknown
      • 0x64afc:$str_a1: C:\Windows\System32\cmd.exe
      • 0x64a78:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
      • 0x64a78:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
      • 0x64f78:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
      • 0x657a8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
      • 0x64b6c:$str_b2: Executing file:
      • 0x65bec:$str_b3: GetDirectListeningPort
      • 0x65598:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
      • 0x65718:$str_b7: \update.vbs
      • 0x64b94:$str_b9: Downloaded file:
      • 0x64b80:$str_b10: Downloading file:
      • 0x64c24:$str_b12: Failed to upload file:
      • 0x65bb4:$str_b13: StartForward
      • 0x65bd4:$str_b14: StopForward
      • 0x65670:$str_b15: fso.DeleteFile "
      • 0x65604:$str_b16: On Error Resume Next
      • 0x656a0:$str_b17: fso.DeleteFolder "
      • 0x64c14:$str_b18: Uploaded file:
      • 0x64bd4:$str_b19: Unable to delete:
      • 0x65638:$str_b20: while fso.FileExists("
      • 0x650b1:$str_c0: [Firefox StoredLogins not found]
      1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
      • 0x649e8:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
      • 0x6497c:$s1: CoGetObject
      • 0x64990:$s1: CoGetObject
      • 0x649ac:$s1: CoGetObject
      • 0x6e938:$s1: CoGetObject
      • 0x6493c:$s2: Elevation:Administrator!new:
      SourceRuleDescriptionAuthorStrings
      00000006.00000000.1273413093.0000000000459000.00000002.00000001.01000000.00000004.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000006.00000000.1273413093.0000000000459000.00000002.00000001.01000000.00000004.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
          00000006.00000000.1273413093.0000000000459000.00000002.00000001.01000000.00000004.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
          • 0x134a8:$a1: Remcos restarted by watchdog!
          • 0x13a20:$a3: %02i:%02i:%02i:%03i
          00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
              Click to see the 25 entries
              SourceRuleDescriptionAuthorStrings
              11.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                11.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                  11.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                  • 0x6aaa8:$a1: Remcos restarted by watchdog!
                  • 0x6b020:$a3: %02i:%02i:%02i:%03i
                  11.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpackREMCOS_RAT_variantsunknownunknown
                  • 0x64afc:$str_a1: C:\Windows\System32\cmd.exe
                  • 0x64a78:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                  • 0x64a78:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                  • 0x64f78:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                  • 0x657a8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                  • 0x64b6c:$str_b2: Executing file:
                  • 0x65bec:$str_b3: GetDirectListeningPort
                  • 0x65598:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                  • 0x65718:$str_b7: \update.vbs
                  • 0x64b94:$str_b9: Downloaded file:
                  • 0x64b80:$str_b10: Downloading file:
                  • 0x64c24:$str_b12: Failed to upload file:
                  • 0x65bb4:$str_b13: StartForward
                  • 0x65bd4:$str_b14: StopForward
                  • 0x65670:$str_b15: fso.DeleteFile "
                  • 0x65604:$str_b16: On Error Resume Next
                  • 0x656a0:$str_b17: fso.DeleteFolder "
                  • 0x64c14:$str_b18: Uploaded file:
                  • 0x64bd4:$str_b19: Unable to delete:
                  • 0x65638:$str_b20: while fso.FileExists("
                  • 0x650b1:$str_c0: [Firefox StoredLogins not found]
                  11.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
                  • 0x649e8:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                  • 0x6497c:$s1: CoGetObject
                  • 0x64990:$s1: CoGetObject
                  • 0x649ac:$s1: CoGetObject
                  • 0x6e938:$s1: CoGetObject
                  • 0x6493c:$s2: Elevation:Administrator!new:
                  Click to see the 20 entries

                  Stealing of Sensitive Information

                  barindex
                  Source: Registry Key setAuthor: Joe Security: Data: Details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ventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, ProcessId: 7172, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-43JG4A\exepath
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-10-06T22:00:16.940137+020020365941Malware Command and Control Activity Detected192.168.2.74970184.32.44.1391991TCP
                  2024-10-06T22:00:18.221401+020020365941Malware Command and Control Activity Detected192.168.2.74970284.32.44.1391991TCP
                  2024-10-06T22:00:18.249317+020020365941Malware Command and Control Activity Detected192.168.2.74970384.32.44.1391991TCP
                  2024-10-06T22:00:18.783923+020020365941Malware Command and Control Activity Detected192.168.2.74970484.32.44.1391991TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-10-06T22:00:20.538733+020028033043Unknown Traffic192.168.2.749705178.237.33.5080TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeAvira: detected
                  Source: 00000006.00000002.3736983061.00000000004BE000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "cavps7.duckdns.org:1991:1", "Assigned name": "Agent-010524", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-43JG4A", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeReversingLabs: Detection: 89%
                  Source: Yara matchFile source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, type: SAMPLE
                  Source: Yara matchFile source: 11.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000006.00000000.1273413093.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000000.1306494613.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.3736983061.00000000004BE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000000.1306197099.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000000.1305912992.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe PID: 7172, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe PID: 7432, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe PID: 7440, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe PID: 7456, type: MEMORYSTR
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_00433837 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,6_2_00433837
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_00406A63 CryptUnprotectData,LoadLibraryA,GetProcAddress,CryptUnprotectData,6_2_00406A63
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_00404423 GetProcAddress,FreeLibrary,CryptUnprotectData,9_2_00404423
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000000.1273413093.0000000000459000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_956bbdb0-a

                  Exploits

                  barindex
                  Source: Yara matchFile source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, type: SAMPLE
                  Source: Yara matchFile source: 11.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000006.00000000.1273413093.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000000.1306494613.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000000.1306197099.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000000.1305912992.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe PID: 7172, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe PID: 7432, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe PID: 7440, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe PID: 7456, type: MEMORYSTR

                  Privilege Escalation

                  barindex
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_004074FD _wcslen,CoGetObject,6_2_004074FD
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,6_2_0040C34D
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,6_2_00409253
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,6_2_0041C291
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,6_2_00409665
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0044E879 FindFirstFileExA,6_2_0044E879
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,6_2_0040880C
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0040783C FindFirstFileW,FindNextFileW,6_2_0040783C
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,6_2_00419AF5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,6_2_0040BB30
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,6_2_0040BD37
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,6_2_100010F1
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_10006580 FindFirstFileExA,6_2_10006580
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_0040AE51 FindFirstFileW,FindNextFileW,9_2_0040AE51
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 10_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,10_2_00407EF8
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 11_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,11_2_00407898
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,6_2_00407C97

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49702 -> 84.32.44.139:1991
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49703 -> 84.32.44.139:1991
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49701 -> 84.32.44.139:1991
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.7:49704 -> 84.32.44.139:1991
                  Source: Malware configuration extractorURLs: cavps7.duckdns.org
                  Source: unknownDNS query: name: cavps7.duckdns.org
                  Source: global trafficTCP traffic: 192.168.2.7:49701 -> 84.32.44.139:1991
                  Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                  Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                  Source: Joe Sandbox ViewASN Name: NTT-LT-ASLT NTT-LT-ASLT
                  Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.7:49705 -> 178.237.33.50:80
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0041B380 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,6_2_0041B380
                  Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000002.3739172527.0000000003B50000.00000040.10000000.00040000.00000000.sdmp, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 0000000B.00000002.1309855073.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000009.00000003.1326057685.000000000099A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ccounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000009.00000003.1326057685.000000000099A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ccounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 0000000B.00000002.1309855073.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000002.3738878315.0000000003A40000.00000040.10000000.00040000.00000000.sdmp, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000002.3738878315.0000000003A40000.00000040.10000000.00040000.00000000.sdmp, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
                  Source: global trafficDNS traffic detected: DNS query: cavps7.duckdns.org
                  Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                  Source: bhvD06.tmp.9.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                  Source: bhvD06.tmp.9.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                  Source: bhvD06.tmp.9.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                  Source: bhvD06.tmp.9.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
                  Source: bhvD06.tmp.9.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0
                  Source: bhvD06.tmp.9.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0
                  Source: bhvD06.tmp.9.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
                  Source: bhvD06.tmp.9.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                  Source: bhvD06.tmp.9.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                  Source: bhvD06.tmp.9.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
                  Source: bhvD06.tmp.9.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                  Source: bhvD06.tmp.9.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07
                  Source: bhvD06.tmp.9.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                  Source: bhvD06.tmp.9.drString found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0?
                  Source: bhvD06.tmp.9.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
                  Source: bhvD06.tmp.9.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                  Source: bhvD06.tmp.9.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                  Source: bhvD06.tmp.9.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0
                  Source: bhvD06.tmp.9.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                  Source: bhvD06.tmp.9.drString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0
                  Source: bhvD06.tmp.9.drString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0~
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000003.1305698681.000000000059F000.00000004.00000020.00020000.00000000.sdmp, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000002.3738021667.0000000000540000.00000004.00000020.00020000.00000000.sdmp, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000002.3736983061.00000000004BE000.00000004.00000020.00020000.00000000.sdmp, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000003.1330242273.00000000004FE000.00000004.00000020.00020000.00000000.sdmp, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000003.1332955919.0000000000540000.00000004.00000020.00020000.00000000.sdmp, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000002.3737442433.00000000004FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeString found in binary or memory: http://geoplugin.net/json.gp/C
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000003.3283867911.00000000004FE000.00000004.00000020.00020000.00000000.sdmp, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000003.1330242273.00000000004FE000.00000004.00000020.00020000.00000000.sdmp, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000002.3737442433.00000000004FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp3U
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000003.1330242273.00000000004FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp:U
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000003.3283867911.00000000004FE000.00000004.00000020.00020000.00000000.sdmp, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000003.1330242273.00000000004FE000.00000004.00000020.00020000.00000000.sdmp, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000002.3737442433.00000000004FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpl
                  Source: bhvD06.tmp.9.drString found in binary or memory: http://ocsp.digicert.com0
                  Source: bhvD06.tmp.9.drString found in binary or memory: http://ocsp.digicert.com0:
                  Source: bhvD06.tmp.9.drString found in binary or memory: http://ocsp.digicert.com0H
                  Source: bhvD06.tmp.9.drString found in binary or memory: http://ocsp.digicert.com0I
                  Source: bhvD06.tmp.9.drString found in binary or memory: http://ocsp.msocsp.com0
                  Source: bhvD06.tmp.9.drString found in binary or memory: http://ocsp.msocsp.com0S
                  Source: bhvD06.tmp.9.drString found in binary or memory: http://www.digicert.com/CPS0
                  Source: bhvD06.tmp.9.drString found in binary or memory: http://www.digicert.com/CPS0~
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 0000000B.00000002.1309855073.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 0000000B.00000003.1309623760.000000000099D000.00000004.00000020.00020000.00000000.sdmp, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 0000000B.00000003.1309681180.000000000099D000.00000004.00000020.00020000.00000000.sdmp, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 0000000B.00000002.1309855073.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000002.3739172527.0000000003B50000.00000040.10000000.00040000.00000000.sdmp, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 0000000B.00000002.1309855073.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 0000000B.00000003.1309623760.000000000099D000.00000004.00000020.00020000.00000000.sdmp, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 0000000B.00000003.1309681180.000000000099D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.comppData
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000002.3739172527.0000000003B50000.00000040.10000000.00040000.00000000.sdmp, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 0000000B.00000002.1309855073.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000009.00000002.1327229826.0000000000193000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 0000000B.00000002.1309855073.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=P
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaot
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingth
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://config.edge.skype.com/config/v1/ODSP_Sync_Client/19.043.0304.0013?UpdateRing=Prod&OS=Win&OSV
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://ecfdb90f321c52ef6e93077f63413543.azr.footprintdns.com/apc/trans.gif?bd78002c55888096ce060c58
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://ecfdb90f321c52ef6e93077f63413543.azr.footprintdns.com/apc/trans.gif?c2fcd52267835a3e34f9ac05
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5c&
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://fp-afd.azurefd.us/apc/trans.gif?69c749c200c753dfb00f5bc8299ab8eb
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://fp-afd.azurefd.us/apc/trans.gif?a2555e10569a45fe03b885d268c50da9
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://fp-as.azureedge.net/apc/trans.gif?23ecc2fb73d617d9826364f47d1067db
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://fp-as.azureedge.net/apc/trans.gif?7bac4e73e9b20fcc41dc97447167937d
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://fp.msedge.net/conf/v2/asgw/fpconfig.min.json?monitorId=asgw
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeString found in binary or memory: https://login.yahoo.com/config/login
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v22057_4HqSCTf5FFStBMz0_eIqyA2.css
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en-gb_RP-iR89BipE4i7ZOq
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_tSc0Su-bb7Jt0QVuF6v9Cg2.js
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2022-09-17-00-05-23/PreSignInSettingsConfig.json?One
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2023-10-05-07-50-22/PreSignInSettingsConfig.json
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/update100.xml?OneDriveUpdate=d75433bcf1f9312f1975
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/741e3e8c607c445262f3add0e58b18f19e0502af.xml?OneDriveUpdate=ad62f4
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/ew-preload-inline-2523c8c1505f1172be19.js
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/otel-logger-104bffe9378b8041455c.js
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-35de8a913e.css
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-async-styles.a903b7d0ab82e5bd2f8a.chunk.v7.css
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bootstrap-5e7af218e953d095fabf.js
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-3a99f64809c6780df035.js
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-994d8943fc9264e2f8d3.css
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-fluent~left-nav-rc.ac5cfbeadfd63fc27ffd.chunk.v7.js
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-forms-group~mru~officeforms-group-forms~officeforms
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-left-nav-rc.68ab311bcca4f86f9ef5.chunk.v7.js
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-mru.2ce72562ad7c0ae7059c.chunk.v7.js
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendor-bundle-ba2888a24179bf152f3d.js
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.169ce481376dceef3ef6.chunk.v7.c
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.b24d6b48aeb44c7b5bf6.chunk.v7.j
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwaunauth-9d8bc214ac.css
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedfontstyles-27fa2598d8.css
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedscripts-939520eada.js
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticpwascripts-30998bff8f.js
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticstylesfabric-35c34b95e3.css
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/hero-image-desktop-f6720a4145.jpg
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/lockup-mslogo-color-78c06e8898.png
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/microsoft-365-logo-01d5ecd01a.png
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-apps-image-46596a6856.png
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-checkmark-image-1999f0bf81.png
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/officehome/thirdpartynotice.html
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_regular.woff2
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_semibold.woff2
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 0000000B.00000002.1309855073.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
                  Source: bhvD06.tmp.9.drString found in binary or memory: https://www.office.com/

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0040A2B8 SetWindowsHookExA 0000000D,0040A2A4,000000006_2_0040A2B8
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,6_2_0040B70E
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_004168C1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,6_2_004168C1
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,9_2_0040987A
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,9_2_004098E2
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 10_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,10_2_00406DFC
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 10_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,10_2_00406E9F
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 11_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,11_2_004068B5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 11_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,11_2_004072B5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,6_2_0040B70E
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0040A3E0 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,6_2_0040A3E0

                  E-Banking Fraud

                  barindex
                  Source: Yara matchFile source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, type: SAMPLE
                  Source: Yara matchFile source: 11.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000006.00000000.1273413093.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000000.1306494613.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.3736983061.00000000004BE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000000.1306197099.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000000.1305912992.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe PID: 7172, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe PID: 7432, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe PID: 7440, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe PID: 7456, type: MEMORYSTR

                  Spam, unwanted Advertisements and Ransom Demands

                  barindex
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0041C9E2 SystemParametersInfoW,6_2_0041C9E2

                  System Summary

                  barindex
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, type: SAMPLEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, type: SAMPLEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, type: SAMPLEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 11.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 11.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 11.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 6.2.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 6.2.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 6.2.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 10.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 10.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 10.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 6.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 6.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 6.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 9.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 9.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 9.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 00000006.00000000.1273413093.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0000000B.00000000.1306494613.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0000000A.00000000.1306197099.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000009.00000000.1305912992.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe PID: 7172, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe PID: 7432, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe PID: 7440, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe PID: 7456, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_004180EF GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,6_2_004180EF
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_004132D2 OpenProcess,NtQueryInformationProcess,GetCurrentProcess,DuplicateHandle,GetFinalPathNameByHandleW,CloseHandle,CreateFileMappingW,MapViewOfFile,GetFileSize,UnmapViewOfFile,CloseHandle,CloseHandle,CloseHandle,6_2_004132D2
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0041BB09 OpenProcess,NtSuspendProcess,CloseHandle,6_2_0041BB09
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0041BB35 OpenProcess,NtResumeProcess,CloseHandle,6_2_0041BB35
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,9_2_0040DD85
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_00401806 NtdllDefWindowProc_W,9_2_00401806
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_004018C0 NtdllDefWindowProc_W,9_2_004018C0
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 10_2_004016FD NtdllDefWindowProc_A,10_2_004016FD
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 10_2_004017B7 NtdllDefWindowProc_A,10_2_004017B7
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 11_2_00402CAC NtdllDefWindowProc_A,11_2_00402CAC
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 11_2_00402D66 NtdllDefWindowProc_A,11_2_00402D66
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_004167B4 ExitWindowsEx,LoadLibraryA,GetProcAddress,6_2_004167B4
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0043E0CC6_2_0043E0CC
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0041F0FA6_2_0041F0FA
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_004541596_2_00454159
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_004381686_2_00438168
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_004461F06_2_004461F0
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0043E2FB6_2_0043E2FB
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0045332B6_2_0045332B
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0042739D6_2_0042739D
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_004374E66_2_004374E6
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0043E5586_2_0043E558
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_004387706_2_00438770
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_004378FE6_2_004378FE
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_004339466_2_00433946
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0044D9C96_2_0044D9C9
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_00427A466_2_00427A46
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0041DB626_2_0041DB62
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_00427BAF6_2_00427BAF
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_00437D336_2_00437D33
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_00435E5E6_2_00435E5E
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_00426E0E6_2_00426E0E
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0043DE9D6_2_0043DE9D
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_00413FCA6_2_00413FCA
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_00436FEA6_2_00436FEA
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_100171946_2_10017194
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_1000B5C16_2_1000B5C1
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_0044B0409_2_0044B040
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_0043610D9_2_0043610D
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_004473109_2_00447310
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_0044A4909_2_0044A490
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_0040755A9_2_0040755A
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_0043C5609_2_0043C560
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_0044B6109_2_0044B610
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_0044D6C09_2_0044D6C0
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_004476F09_2_004476F0
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_0044B8709_2_0044B870
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_0044081D9_2_0044081D
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_004149579_2_00414957
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_004079EE9_2_004079EE
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_00407AEB9_2_00407AEB
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_0044AA809_2_0044AA80
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_00412AA99_2_00412AA9
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_00404B749_2_00404B74
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_00404B039_2_00404B03
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_0044BBD89_2_0044BBD8
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_00404BE59_2_00404BE5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_00404C769_2_00404C76
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_00415CFE9_2_00415CFE
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_00416D729_2_00416D72
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_00446D309_2_00446D30
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_00446D8B9_2_00446D8B
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_00406E8F9_2_00406E8F
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 10_2_0040503810_2_00405038
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 10_2_0041208C10_2_0041208C
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 10_2_004050A910_2_004050A9
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 10_2_0040511A10_2_0040511A
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 10_2_0043C13A10_2_0043C13A
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 10_2_004051AB10_2_004051AB
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 10_2_0044930010_2_00449300
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 10_2_0040D32210_2_0040D322
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 10_2_0044A4F010_2_0044A4F0
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 10_2_0043A5AB10_2_0043A5AB
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 10_2_0041363110_2_00413631
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 10_2_0044669010_2_00446690
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 10_2_0044A73010_2_0044A730
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 10_2_004398D810_2_004398D8
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 10_2_004498E010_2_004498E0
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 10_2_0044A88610_2_0044A886
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 10_2_0043DA0910_2_0043DA09
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 10_2_00438D5E10_2_00438D5E
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 10_2_00449ED010_2_00449ED0
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 10_2_0041FE8310_2_0041FE83
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 10_2_00430F5410_2_00430F54
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 11_2_004050C211_2_004050C2
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 11_2_004014AB11_2_004014AB
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 11_2_0040513311_2_00405133
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 11_2_004051A411_2_004051A4
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 11_2_0040124611_2_00401246
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 11_2_0040CA4611_2_0040CA46
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 11_2_0040523511_2_00405235
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 11_2_004032C811_2_004032C8
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 11_2_004222D911_2_004222D9
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 11_2_0040168911_2_00401689
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 11_2_00402F6011_2_00402F60
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: String function: 00434E10 appears 54 times
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: String function: 004169A7 appears 87 times
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: String function: 004165FF appears 35 times
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: String function: 00422297 appears 42 times
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: String function: 00402093 appears 50 times
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: String function: 00434770 appears 42 times
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: String function: 0044DB70 appears 41 times
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: String function: 00401E65 appears 35 times
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: String function: 00444B5A appears 37 times
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: String function: 00413025 appears 79 times
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: String function: 00416760 appears 69 times
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000003.1303591020.000000000052A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000003.1332455032.0000000000566000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000003.1333128165.0000000000566000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000003.1305603522.0000000000566000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000002.3739172527.0000000003B6B000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000003.1332955919.0000000000540000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeBinary or memory string: OriginalFileName vs 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeBinary or memory string: OriginalFilename vs 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 0000000B.00000002.1309855073.000000000041B000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, type: SAMPLEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, type: SAMPLEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 11.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 11.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 11.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 6.2.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 6.2.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 6.2.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 10.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 10.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 10.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 6.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 6.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 6.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 9.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 9.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 9.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 00000006.00000000.1273413093.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0000000B.00000000.1306494613.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0000000A.00000000.1306197099.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000009.00000000.1305912992.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe PID: 7172, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe PID: 7432, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe PID: 7440, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe PID: 7456, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: classification engineClassification label: mal100.rans.phis.troj.spyw.expl.evad.winEXE@7/3@2/2
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,9_2_004182CE
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_00417952 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,6_2_00417952
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 11_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,CloseHandle,11_2_00410DE1
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_00418758 GetDiskFreeSpaceW,GetDiskFreeSpaceA,free,9_2_00418758
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0040F474 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,6_2_0040F474
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0041B4A8 FindResourceA,LoadResource,LockResource,SizeofResource,6_2_0041B4A8
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,6_2_0041AA4A
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\json[1].jsonJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-43JG4A
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeFile created: C:\Users\user~1\AppData\Local\Temp\bhvD06.tmpJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCommand line argument: PG6_2_0040E9C5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCommand line argument: PG6_2_0040E9C5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCommand line argument: Software\6_2_0040E9C5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCommand line argument: Rmc-43JG4A6_2_0040E9C5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCommand line argument: Exe6_2_0040E9C5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCommand line argument: Exe6_2_0040E9C5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCommand line argument: Rmc-43JG4A6_2_0040E9C5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCommand line argument: Inj6_2_0040E9C5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCommand line argument: Inj6_2_0040E9C5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCommand line argument: PG6_2_0040E9C5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCommand line argument: PG6_2_0040E9C5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCommand line argument: PG6_2_0040E9C5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCommand line argument: 8SG6_2_0040E9C5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCommand line argument: exepath6_2_0040E9C5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCommand line argument: PG6_2_0040E9C5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCommand line argument: 8SG6_2_0040E9C5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCommand line argument: exepath6_2_0040E9C5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCommand line argument: PG6_2_0040E9C5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCommand line argument: licence6_2_0040E9C5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCommand line argument: PG6_2_0040E9C5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCommand line argument: PG6_2_0040E9C5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCommand line argument: PG6_2_0040E9C5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCommand line argument: PG6_2_0040E9C5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCommand line argument: PG6_2_0040E9C5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCommand line argument: PG6_2_0040E9C5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCommand line argument: dMG6_2_0040E9C5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCommand line argument: PG6_2_0040E9C5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCommand line argument: PG6_2_0040E9C5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCommand line argument: PSG6_2_0040E9C5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCommand line argument: Administrator6_2_0040E9C5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCommand line argument: User6_2_0040E9C5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCommand line argument: del6_2_0040E9C5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCommand line argument: del6_2_0040E9C5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCommand line argument: del6_2_0040E9C5
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSystem information queried: HandleInformationJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 0000000A.00000002.1308207689.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000002.3738878315.0000000003A40000.00000040.10000000.00040000.00000000.sdmp, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000009.00000003.1326057685.000000000099A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeReversingLabs: Detection: 89%
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeEvasive API call chain: __getmainargs,DecisionNodes,exit
                  Source: unknownProcess created: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe "C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe"
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeProcess created: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\xttxrevmuropxyhmme"
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeProcess created: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\hnyqswgoizgciedqvprkl"
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeProcess created: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\jpebsprhwhyhkkrunalmokuw"
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeProcess created: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\xttxrevmuropxyhmme"Jump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeProcess created: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\hnyqswgoizgciedqvprkl"Jump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeProcess created: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\jpebsprhwhyhkkrunalmokuw"Jump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: rstrtmgr.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: pstorec.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: vaultcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: pstorec.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeFile opened: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.cfgJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                  Data Obfuscation

                  barindex
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeUnpacked PE file: 9.2.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.tls:W;.gfids:R;.rsrc:R;.reloc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeUnpacked PE file: 10.2.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.tls:W;.gfids:R;.rsrc:R;.reloc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeUnpacked PE file: 11.2.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.tls:W;.gfids:R;.rsrc:R;.reloc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_00406A63 CryptUnprotectData,LoadLibraryA,GetProcAddress,CryptUnprotectData,6_2_00406A63
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_3_00511A00 push ss; iretd 6_3_00511A36
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_3_00511A00 push ss; iretd 6_3_00511A36
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_3_00507B9C pushad ; ret 6_3_00507BA5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_3_00507B9C pushad ; ret 6_3_00507BA5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_3_00511A00 push ss; iretd 6_3_00511A36
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_3_00511A00 push ss; iretd 6_3_00511A36
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_3_00507B9C pushad ; ret 6_3_00507BA5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_3_00507B9C pushad ; ret 6_3_00507BA5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_00457106 push ecx; ret 6_2_00457119
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_00457A28 push eax; ret 6_2_00457A46
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_00434E56 push ecx; ret 6_2_00434E69
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_10002806 push ecx; ret 6_2_10002819
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_0044693D push ecx; ret 9_2_0044694D
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_0044DB70 push eax; ret 9_2_0044DB84
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_0044DB70 push eax; ret 9_2_0044DBAC
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_00451D54 push eax; ret 9_2_00451D61
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 10_2_0044B090 push eax; ret 10_2_0044B0A4
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 10_2_0044B090 push eax; ret 10_2_0044B0CC
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 10_2_00451D34 push eax; ret 10_2_00451D41
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 10_2_00444E71 push ecx; ret 10_2_00444E81
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 11_2_00414060 push eax; ret 11_2_00414074
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 11_2_00414060 push eax; ret 11_2_0041409C
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 11_2_00414039 push ecx; ret 11_2_00414049
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 11_2_004164EB push 0000006Ah; retf 11_2_004165C4
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 11_2_00416553 push 0000006Ah; retf 11_2_004165C4
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 11_2_00416555 push 0000006Ah; retf 11_2_004165C4
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_00406EB0 ShellExecuteW,URLDownloadToFileW,6_2_00406EB0
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,6_2_0041AA4A
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,6_2_0041CB50
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0040F7A7 Sleep,ExitProcess,6_2_0040F7A7
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,9_2_0040DD85
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,6_2_0041A748
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeWindow / User API: threadDelayed 8096Jump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeWindow / User API: threadDelayed 1890Jump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_6-53194
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeAPI coverage: 10.0 %
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe TID: 7208Thread sleep count: 8096 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe TID: 7208Thread sleep time: -24288000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe TID: 7208Thread sleep count: 1890 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe TID: 7208Thread sleep time: -5670000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,6_2_0040C34D
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,6_2_00409253
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,6_2_0041C291
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,6_2_00409665
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0044E879 FindFirstFileExA,6_2_0044E879
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,6_2_0040880C
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0040783C FindFirstFileW,FindNextFileW,6_2_0040783C
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,6_2_00419AF5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,6_2_0040BB30
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,6_2_0040BD37
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,6_2_100010F1
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_10006580 FindFirstFileExA,6_2_10006580
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_0040AE51 FindFirstFileW,FindNextFileW,9_2_0040AE51
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 10_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,10_2_00407EF8
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 11_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,11_2_00407898
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,6_2_00407C97
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_00418981 memset,GetSystemInfo,9_2_00418981
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000002.3738021667.0000000000540000.00000004.00000020.00020000.00000000.sdmp, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000003.1303591020.0000000000540000.00000004.00000020.00020000.00000000.sdmp, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000003.1305394560.0000000000540000.00000004.00000020.00020000.00000000.sdmp, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000003.1304492196.000000000052A000.00000004.00000020.00020000.00000000.sdmp, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000002.3736983061.00000000004BE000.00000004.00000020.00020000.00000000.sdmp, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000003.1303591020.000000000052A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: bhvD06.tmp.9.drBinary or memory string: https://r.bing.com/rb/18/jnc,nj/6hU_LneafI_NFLeDvM367ebFaKQ.js?bu=Dx0ma3d6fXRucbIBtQEmpQEmuAE&or=w
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_004349F9
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,9_2_0040DD85
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_00406A63 CryptUnprotectData,LoadLibraryA,GetProcAddress,CryptUnprotectData,6_2_00406A63
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_004432B5 mov eax, dword ptr fs:[00000030h]6_2_004432B5
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_10004AB4 mov eax, dword ptr fs:[00000030h]6_2_10004AB4
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_00411CFE SetLastError,GetNativeSystemInfo,SetLastError,GetProcessHeap,HeapAlloc,SetLastError,6_2_00411CFE
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_004349F9
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_00434B47 SetUnhandledExceptionFilter,6_2_00434B47
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0043BB22 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_0043BB22
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_00434FDC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_00434FDC
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_100060E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_100060E2
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_10002B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_10002B1C
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_10002639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_10002639

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_004180EF GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,6_2_004180EF
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: NULL target: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: NULL target: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeSection loaded: NULL target: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe6_2_004120F7
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_00419627 mouse_event,6_2_00419627
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeProcess created: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\xttxrevmuropxyhmme"Jump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeProcess created: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\hnyqswgoizgciedqvprkl"Jump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeProcess created: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\jpebsprhwhyhkkrunalmokuw"Jump to behavior
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000003.3283675690.000000000059F000.00000004.00000020.00020000.00000000.sdmp, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000002.3738206095.000000000059F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager&
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000003.3283675690.000000000059F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                  Source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000003.3283867911.00000000004FE000.00000004.00000020.00020000.00000000.sdmp, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000002.3736983061.00000000004BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_00434C52 cpuid 6_2_00434C52
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: GetLocaleInfoA,6_2_0040F8D1
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: EnumSystemLocalesW,6_2_00452036
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,6_2_004520C3
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: GetLocaleInfoW,6_2_00452313
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: EnumSystemLocalesW,6_2_00448404
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,6_2_0045243C
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: GetLocaleInfoW,6_2_00452543
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,6_2_00452610
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: GetLocaleInfoW,6_2_004488ED
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,6_2_00451CD8
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: EnumSystemLocalesW,6_2_00451F50
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: EnumSystemLocalesW,6_2_00451F9B
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_00404F51 GetLocalTime,CreateEventA,CreateThread,6_2_00404F51
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_0041B60D GetComputerNameExW,GetUserNameW,6_2_0041B60D
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 6_2_00449190 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,6_2_00449190
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: 9_2_0041739B GetVersionExW,9_2_0041739B
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, type: SAMPLE
                  Source: Yara matchFile source: 11.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000006.00000000.1273413093.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000000.1306494613.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.3736983061.00000000004BE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000000.1306197099.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000000.1305912992.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe PID: 7172, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe PID: 7432, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe PID: 7440, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe PID: 7456, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data6_2_0040BA12
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\6_2_0040BB30
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: \key3.db6_2_0040BB30
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\key4.dbJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqliteJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqliteJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: ESMTPPassword10_2_004033F0
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword10_2_00402DB3
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword10_2_00402DB3
                  Source: Yara matchFile source: Process Memory Space: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe PID: 7172, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe PID: 7432, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-43JG4AJump to behavior
                  Source: Yara matchFile source: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, type: SAMPLE
                  Source: Yara matchFile source: 11.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.0.1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000006.00000000.1273413093.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000000.1306494613.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.3736983061.00000000004BE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000000.1306197099.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000000.1305912992.0000000000459000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe PID: 7172, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe PID: 7432, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe PID: 7440, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe PID: 7456, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeCode function: cmd.exe6_2_0040569A
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
                  Native API
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Deobfuscate/Decode Files or Information
                  2
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  12
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts13
                  Command and Scripting Interpreter
                  1
                  Windows Service
                  1
                  Bypass User Account Control
                  2
                  Obfuscated Files or Information
                  111
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  2
                  Encrypted Channel
                  Exfiltration Over Bluetooth1
                  Defacement
                  Email AddressesDNS ServerDomain Accounts2
                  Service Execution
                  Logon Script (Windows)1
                  Access Token Manipulation
                  1
                  Software Packing
                  2
                  Credentials in Registry
                  1
                  System Service Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                  Windows Service
                  1
                  DLL Side-Loading
                  3
                  Credentials In Files
                  3
                  File and Directory Discovery
                  Distributed Component Object Model111
                  Input Capture
                  1
                  Remote Access Software
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script222
                  Process Injection
                  1
                  Bypass User Account Control
                  LSA Secrets38
                  System Information Discovery
                  SSH3
                  Clipboard Data
                  2
                  Non-Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  Masquerading
                  Cached Domain Credentials31
                  Security Software Discovery
                  VNCGUI Input Capture22
                  Application Layer Protocol
                  Data Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Virtualization/Sandbox Evasion
                  DCSync1
                  Virtualization/Sandbox Evasion
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                  Access Token Manipulation
                  Proc Filesystem4
                  Process Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt222
                  Process Injection
                  /etc/passwd and /etc/shadow1
                  Application Window Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                  System Owner/User Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1527258 Sample: 1728239644b6c097b50f50c5ed7... Startdate: 06/10/2024 Architecture: WINDOWS Score: 100 18 cavps7.duckdns.org 2->18 20 geoplugin.net 2->20 26 Suricata IDS alerts for network traffic 2->26 28 Found malware configuration 2->28 30 Malicious sample detected (through community Yara rule) 2->30 34 9 other signatures 2->34 7 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe 3 13 2->7         started        signatures3 32 Uses dynamic DNS services 18->32 process4 dnsIp5 22 cavps7.duckdns.org 84.32.44.139, 1991, 49701, 49702 NTT-LT-ASLT Lithuania 7->22 24 geoplugin.net 178.237.33.50, 49705, 80 ATOM86-ASATOM86NL Netherlands 7->24 36 Contains functionality to bypass UAC (CMSTPLUA) 7->36 38 Detected unpacking (changes PE section rights) 7->38 40 Detected Remcos RAT 7->40 42 9 other signatures 7->42 11 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe 1 7->11         started        14 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe 1 7->14         started        16 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe 2 7->16         started        signatures6 process7 signatures8 44 Tries to steal Instant Messenger accounts or passwords 11->44 46 Tries to harvest and steal browser information (history, passwords, etc) 11->46 48 Tries to steal Mail credentials (via file / registry access) 14->48

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe89%ReversingLabsWin32.Backdoor.Remcos
                  1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe100%AviraBDS/Backdoor.Gen
                  1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://www.imvu.comr0%URL Reputationsafe
                  http://www.imvu.com0%URL Reputationsafe
                  https://deff.nelreports.net/api/report?cat=msn0%URL Reputationsafe
                  http://geoplugin.net/json.gp0%URL Reputationsafe
                  http://geoplugin.net/json.gp/C0%URL Reputationsafe
                  https://login.yahoo.com/config/login0%URL Reputationsafe
                  http://www.ebuddy.com0%URL Reputationsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  cavps7.duckdns.org
                  84.32.44.139
                  truetrue
                    unknown
                    geoplugin.net
                    178.237.33.50
                    truefalse
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      cavps7.duckdns.orgtrue
                        unknown
                        http://geoplugin.net/json.gpfalse
                        • URL Reputation: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=PbhvD06.tmp.9.drfalse
                          unknown
                          https://www.office.com/bhvD06.tmp.9.drfalse
                            unknown
                            http://geoplugin.net/json.gp:U1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000003.1330242273.00000000004FE000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              https://fp-afd.azurefd.us/apc/trans.gif?a2555e10569a45fe03b885d268c50da9bhvD06.tmp.9.drfalse
                                unknown
                                http://www.imvu.comr1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000002.3739172527.0000000003B50000.00000040.10000000.00040000.00000000.sdmp, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 0000000B.00000002.1309855073.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://geoplugin.net/json.gpl1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000003.3283867911.00000000004FE000.00000004.00000020.00020000.00000000.sdmp, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000003.1330242273.00000000004FE000.00000004.00000020.00020000.00000000.sdmp, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000002.3737442433.00000000004FE000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  https://aefd.nelreports.net/api/report?cat=bingthbhvD06.tmp.9.drfalse
                                    unknown
                                    http://www.imvu.com1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 0000000B.00000003.1309623760.000000000099D000.00000004.00000020.00020000.00000000.sdmp, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 0000000B.00000003.1309681180.000000000099D000.00000004.00000020.00020000.00000000.sdmp, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 0000000B.00000002.1309855073.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://aefd.nelreports.net/api/report?cat=wsbbhvD06.tmp.9.drfalse
                                      unknown
                                      http://www.imvu.comppData1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 0000000B.00000003.1309623760.000000000099D000.00000004.00000020.00020000.00000000.sdmp, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 0000000B.00000003.1309681180.000000000099D000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        http://www.nirsoft.net1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000009.00000002.1327229826.0000000000193000.00000004.00000010.00020000.00000000.sdmpfalse
                                          unknown
                                          https://aefd.nelreports.net/api/report?cat=bingaotakbhvD06.tmp.9.drfalse
                                            unknown
                                            https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svgbhvD06.tmp.9.drfalse
                                              unknown
                                              https://deff.nelreports.net/api/report?cat=msnbhvD06.tmp.9.drfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://ecfdb90f321c52ef6e93077f63413543.azr.footprintdns.com/apc/trans.gif?c2fcd52267835a3e34f9ac05bhvD06.tmp.9.drfalse
                                                unknown
                                                https://ecfdb90f321c52ef6e93077f63413543.azr.footprintdns.com/apc/trans.gif?bd78002c55888096ce060c58bhvD06.tmp.9.drfalse
                                                  unknown
                                                  http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000002.3739172527.0000000003B50000.00000040.10000000.00040000.00000000.sdmp, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 0000000B.00000002.1309855073.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                    unknown
                                                    http://geoplugin.net/json.gp3U1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000003.3283867911.00000000004FE000.00000004.00000020.00020000.00000000.sdmp, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000003.1330242273.00000000004FE000.00000004.00000020.00020000.00000000.sdmp, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 00000006.00000002.3737442433.00000000004FE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      unknown
                                                      https://www.google.com1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 0000000B.00000002.1309855073.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                        unknown
                                                        https://aefd.nelreports.net/api/report?cat=bingaotbhvD06.tmp.9.drfalse
                                                          unknown
                                                          https://fp-afd.azurefd.us/apc/trans.gif?69c749c200c753dfb00f5bc8299ab8ebbhvD06.tmp.9.drfalse
                                                            unknown
                                                            http://geoplugin.net/json.gp/C1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exefalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&platbhvD06.tmp.9.drfalse
                                                              unknown
                                                              https://aefd.nelreports.net/api/report?cat=bingrmsbhvD06.tmp.9.drfalse
                                                                unknown
                                                                https://www.google.com/accounts/servicelogin1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exefalse
                                                                  unknown
                                                                  https://login.yahoo.com/config/login1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exefalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  http://www.nirsoft.net/1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 0000000B.00000002.1309855073.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                    unknown
                                                                    https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5c&bhvD06.tmp.9.drfalse
                                                                      unknown
                                                                      http://www.ebuddy.com1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, 0000000B.00000002.1309855073.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      • No. of IPs < 25%
                                                                      • 25% < No. of IPs < 50%
                                                                      • 50% < No. of IPs < 75%
                                                                      • 75% < No. of IPs
                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                      84.32.44.139
                                                                      cavps7.duckdns.orgLithuania
                                                                      33922NTT-LT-ASLTtrue
                                                                      178.237.33.50
                                                                      geoplugin.netNetherlands
                                                                      8455ATOM86-ASATOM86NLfalse
                                                                      Joe Sandbox version:41.0.0 Charoite
                                                                      Analysis ID:1527258
                                                                      Start date and time:2024-10-06 21:59:19 +02:00
                                                                      Joe Sandbox product:CloudBasic
                                                                      Overall analysis duration:0h 7m 58s
                                                                      Hypervisor based Inspection enabled:false
                                                                      Report type:full
                                                                      Cookbook file name:default.jbs
                                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                      Number of analysed new started processes analysed:19
                                                                      Number of new started drivers analysed:0
                                                                      Number of existing processes analysed:0
                                                                      Number of existing drivers analysed:0
                                                                      Number of injected processes analysed:0
                                                                      Technologies:
                                                                      • HCA enabled
                                                                      • EGA enabled
                                                                      • AMSI enabled
                                                                      Analysis Mode:default
                                                                      Analysis stop reason:Timeout
                                                                      Sample name:1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe
                                                                      Detection:MAL
                                                                      Classification:mal100.rans.phis.troj.spyw.expl.evad.winEXE@7/3@2/2
                                                                      EGA Information:
                                                                      • Successful, ratio: 100%
                                                                      HCA Information:
                                                                      • Successful, ratio: 98%
                                                                      • Number of executed functions: 146
                                                                      • Number of non-executed functions: 292
                                                                      Cookbook Comments:
                                                                      • Found application associated with file extension: .exe
                                                                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                                                                      • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                      • VT rate limit hit for: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe
                                                                      TimeTypeDescription
                                                                      17:16:17API Interceptor4440974x Sleep call for process: 1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe modified
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      84.32.44.139MKWbWHd5Ni.rtfGet hashmaliciousRemcosBrowse
                                                                        GEJMING DUO USD 20241002144902.docx.docGet hashmaliciousRemcosBrowse
                                                                          178.237.33.50na.rtfGet hashmaliciousRemcosBrowse
                                                                          • geoplugin.net/json.gp
                                                                          na.rtfGet hashmaliciousRemcosBrowse
                                                                          • geoplugin.net/json.gp
                                                                          na.rtfGet hashmaliciousRemcosBrowse
                                                                          • geoplugin.net/json.gp
                                                                          MKWbWHd5Ni.rtfGet hashmaliciousRemcosBrowse
                                                                          • geoplugin.net/json.gp
                                                                          DSpWOKW7zn.rtfGet hashmaliciousRemcosBrowse
                                                                          • geoplugin.net/json.gp
                                                                          1728080706a248a4f632b137f140bbdefdc6243fcfee4f77d8efc81faca52425088e5ea1dc575.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                          • geoplugin.net/json.gp
                                                                          DHL Shipment Doc's.xlsGet hashmaliciousRemcosBrowse
                                                                          • geoplugin.net/json.gp
                                                                          GEJMING DUO USD 20241002144902.docx.docGet hashmaliciousRemcosBrowse
                                                                          • geoplugin.net/json.gp
                                                                          PO-00536.xlsGet hashmaliciousRemcosBrowse
                                                                          • geoplugin.net/json.gp
                                                                          Formularz instrukcji p#U0142atno#U015bci Millennium.xlsGet hashmaliciousRemcosBrowse
                                                                          • geoplugin.net/json.gp
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          cavps7.duckdns.orgMKWbWHd5Ni.rtfGet hashmaliciousRemcosBrowse
                                                                          • 84.32.44.139
                                                                          GEJMING DUO USD 20241002144902.docx.docGet hashmaliciousRemcosBrowse
                                                                          • 84.32.44.139
                                                                          rSignedContract.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                          • 54.39.12.74
                                                                          rContract-FP.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                          • 54.39.12.74
                                                                          geoplugin.netna.rtfGet hashmaliciousRemcosBrowse
                                                                          • 178.237.33.50
                                                                          na.rtfGet hashmaliciousRemcosBrowse
                                                                          • 178.237.33.50
                                                                          na.rtfGet hashmaliciousRemcosBrowse
                                                                          • 178.237.33.50
                                                                          MKWbWHd5Ni.rtfGet hashmaliciousRemcosBrowse
                                                                          • 178.237.33.50
                                                                          DSpWOKW7zn.rtfGet hashmaliciousRemcosBrowse
                                                                          • 178.237.33.50
                                                                          1728080706a248a4f632b137f140bbdefdc6243fcfee4f77d8efc81faca52425088e5ea1dc575.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                          • 178.237.33.50
                                                                          DHL Shipment Doc's.xlsGet hashmaliciousRemcosBrowse
                                                                          • 178.237.33.50
                                                                          GEJMING DUO USD 20241002144902.docx.docGet hashmaliciousRemcosBrowse
                                                                          • 178.237.33.50
                                                                          PO-00536.xlsGet hashmaliciousRemcosBrowse
                                                                          • 178.237.33.50
                                                                          Formularz instrukcji p#U0142atno#U015bci Millennium.xlsGet hashmaliciousRemcosBrowse
                                                                          • 178.237.33.50
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          NTT-LT-ASLTMKWbWHd5Ni.rtfGet hashmaliciousRemcosBrowse
                                                                          • 84.32.44.139
                                                                          Narudzba ACH0036173.vbeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                          • 84.32.84.32
                                                                          http://ipscanadvsf.comGet hashmaliciousUnknownBrowse
                                                                          • 84.32.84.33
                                                                          GEJMING DUO USD 20241002144902.docx.docGet hashmaliciousRemcosBrowse
                                                                          • 84.32.44.139
                                                                          -pdf.bat.exeGet hashmaliciousFormBookBrowse
                                                                          • 84.32.84.32
                                                                          BDncqpUxZl.dllGet hashmaliciousBumbleBeeBrowse
                                                                          • 84.32.84.32
                                                                          Midjourney.msiGet hashmaliciousUnknownBrowse
                                                                          • 84.32.84.32
                                                                          BDncqpUxZl.dll.dllGet hashmaliciousBumbleBeeBrowse
                                                                          • 84.32.84.32
                                                                          Midjourney.msiGet hashmaliciousUnknownBrowse
                                                                          • 84.32.84.32
                                                                          DHL_ 46773482.exeGet hashmaliciousFormBookBrowse
                                                                          • 84.32.84.32
                                                                          ATOM86-ASATOM86NLna.rtfGet hashmaliciousRemcosBrowse
                                                                          • 178.237.33.50
                                                                          na.rtfGet hashmaliciousRemcosBrowse
                                                                          • 178.237.33.50
                                                                          na.rtfGet hashmaliciousRemcosBrowse
                                                                          • 178.237.33.50
                                                                          MKWbWHd5Ni.rtfGet hashmaliciousRemcosBrowse
                                                                          • 178.237.33.50
                                                                          DSpWOKW7zn.rtfGet hashmaliciousRemcosBrowse
                                                                          • 178.237.33.50
                                                                          1728080706a248a4f632b137f140bbdefdc6243fcfee4f77d8efc81faca52425088e5ea1dc575.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                          • 178.237.33.50
                                                                          DHL Shipment Doc's.xlsGet hashmaliciousRemcosBrowse
                                                                          • 178.237.33.50
                                                                          GEJMING DUO USD 20241002144902.docx.docGet hashmaliciousRemcosBrowse
                                                                          • 178.237.33.50
                                                                          PO-00536.xlsGet hashmaliciousRemcosBrowse
                                                                          • 178.237.33.50
                                                                          Formularz instrukcji p#U0142atno#U015bci Millennium.xlsGet hashmaliciousRemcosBrowse
                                                                          • 178.237.33.50
                                                                          No context
                                                                          No context
                                                                          Process:C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe
                                                                          File Type:JSON data
                                                                          Category:dropped
                                                                          Size (bytes):962
                                                                          Entropy (8bit):5.013811273052389
                                                                          Encrypted:false
                                                                          SSDEEP:12:tklu+mnd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkk:qlu+KdRNuKyGX85jvXhNlT3/7AcV9Wro
                                                                          MD5:18BC6D34FABB00C1E30D98E8DAEC814A
                                                                          SHA1:D21EF72B8421AA7D1F8E8B1DB1323AA93B884C54
                                                                          SHA-256:862D5523F77D193121112B15A36F602C4439791D03E24D97EF25F3A6CBE37ED0
                                                                          SHA-512:8DF14178B08AD2EDE670572394244B5224C8B070199A4BD851245B88D4EE3D7324FC7864D180DE85221ADFBBCAACB9EE9D2A77B5931D4E878E27334BF8589D71
                                                                          Malicious:false
                                                                          Reputation:moderate, very likely benign file
                                                                          Preview:{. "geoplugin_request":"8.46.123.33",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                          Process:C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe
                                                                          File Type:Extensible storage engine DataBase, version 0x620, checksum 0xe41c9139, page size 32768, DirtyShutdown, Windows version 10.0
                                                                          Category:dropped
                                                                          Size (bytes):14680064
                                                                          Entropy (8bit):0.9773332236397271
                                                                          Encrypted:false
                                                                          SSDEEP:6144:QgMnQEUUMBPPpBPJmNjfiEWC7WswQpWK/qZCCkxpu514dCVZ3L9yqXx4SU8GxJHL:hn/cj5tND5ApBK4K
                                                                          MD5:05D637853741BF148A7C412A60715BD1
                                                                          SHA1:F5ED9E134B9888C15ECDF6DEA9DE99EBFB6018F7
                                                                          SHA-256:138B03A3BCF55C30AB2EF2251541F0C7DEC8662B91AE778456B412E71D25FF4F
                                                                          SHA-512:5BF0CC4507B0097904A4BE00AF4A0D829C4B98537DD2C101B416BAB61304549D42AC26F90C5A102896810DA4CC8F3BA26241AD6C9B2861593B0A8D0BBB9C1BE1
                                                                          Malicious:false
                                                                          Reputation:low
                                                                          Preview:...9... ................./..(...{........................&....."6...{G......|E.h.(.........................:.I..(...{..............................................................................................P...........eJ......n........................................................................................................... .......93...{a..............................................................................................................................................................................................(...{................................../.f(.....|c..................a.{.....|E..........................#......h.(.....................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe
                                                                          File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                                          Category:modified
                                                                          Size (bytes):2
                                                                          Entropy (8bit):1.0
                                                                          Encrypted:false
                                                                          SSDEEP:3:Qn:Qn
                                                                          MD5:F3B25701FE362EC84616A93A45CE9998
                                                                          SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                          SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                          SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                          Malicious:false
                                                                          Reputation:high, very likely benign file
                                                                          Preview:..
                                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                          Entropy (8bit):6.5997028894119785
                                                                          TrID:
                                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                                          • DOS Executable Generic (2002/1) 0.02%
                                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                          File name:1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe
                                                                          File size:494'592 bytes
                                                                          MD5:e9057285aafb6978445c07029fdc5898
                                                                          SHA1:f928987a99bfde3cf80730d04e5c1436271d71d0
                                                                          SHA256:a21c68c24894a9bd385b58971c4a35d8c4b896a5d4da56ad47832114af033ad6
                                                                          SHA512:8603477d72a91833fb3d7c63086b5409ce4d39b3387008fcde96c9f94639726ff219bb6ce9fa9f2173da6b71e123b6549d1876b7145f3a0ff431ced7e779d90f
                                                                          SSDEEP:6144:bXIktXfM8Lv86r9uVWAa2je4Z5zl4hgDHQQs4NTQjoHFsAOZZ5AXIcNn5Gv:bX7tPMK8ctGe4Dzl4h2QnuPs/Z56cv
                                                                          TLSH:2DB49E01BAD1C072D57524300D36F776EAB8BD2028364A7BB3D61D5BFE31190B62A6B7
                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........-H..~H..~H..~.f$~[..~.f&~...~.f'~V..~A.Q~I..~.Z.~J..~....R..~....r..~....j..~A.F~Q..~H..~u..~....,..~..*~I..~....I..~RichH..
                                                                          Icon Hash:95694d05214c1b33
                                                                          Entrypoint:0x4349ef
                                                                          Entrypoint Section:.text
                                                                          Digitally signed:false
                                                                          Imagebase:0x400000
                                                                          Subsystem:windows gui
                                                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                          DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                          Time Stamp:0x66728C58 [Wed Jun 19 07:44:24 2024 UTC]
                                                                          TLS Callbacks:
                                                                          CLR (.Net) Version:
                                                                          OS Version Major:5
                                                                          OS Version Minor:1
                                                                          File Version Major:5
                                                                          File Version Minor:1
                                                                          Subsystem Version Major:5
                                                                          Subsystem Version Minor:1
                                                                          Import Hash:8d5087ff5de35c3fbb9f212b47d63cad
                                                                          Instruction
                                                                          call 00007F03F12DAC3Ch
                                                                          jmp 00007F03F12DA653h
                                                                          push ebp
                                                                          mov ebp, esp
                                                                          sub esp, 00000324h
                                                                          push ebx
                                                                          push esi
                                                                          push 00000017h
                                                                          call 00007F03F12FCEB4h
                                                                          test eax, eax
                                                                          je 00007F03F12DA7C7h
                                                                          mov ecx, dword ptr [ebp+08h]
                                                                          int 29h
                                                                          xor esi, esi
                                                                          lea eax, dword ptr [ebp-00000324h]
                                                                          push 000002CCh
                                                                          push esi
                                                                          push eax
                                                                          mov dword ptr [00471D14h], esi
                                                                          call 00007F03F12DCC27h
                                                                          add esp, 0Ch
                                                                          mov dword ptr [ebp-00000274h], eax
                                                                          mov dword ptr [ebp-00000278h], ecx
                                                                          mov dword ptr [ebp-0000027Ch], edx
                                                                          mov dword ptr [ebp-00000280h], ebx
                                                                          mov dword ptr [ebp-00000284h], esi
                                                                          mov dword ptr [ebp-00000288h], edi
                                                                          mov word ptr [ebp-0000025Ch], ss
                                                                          mov word ptr [ebp-00000268h], cs
                                                                          mov word ptr [ebp-0000028Ch], ds
                                                                          mov word ptr [ebp-00000290h], es
                                                                          mov word ptr [ebp-00000294h], fs
                                                                          mov word ptr [ebp-00000298h], gs
                                                                          pushfd
                                                                          pop dword ptr [ebp-00000264h]
                                                                          mov eax, dword ptr [ebp+04h]
                                                                          mov dword ptr [ebp-0000026Ch], eax
                                                                          lea eax, dword ptr [ebp+04h]
                                                                          mov dword ptr [ebp-00000260h], eax
                                                                          mov dword ptr [ebp-00000324h], 00010001h
                                                                          mov eax, dword ptr [eax-04h]
                                                                          push 00000050h
                                                                          mov dword ptr [ebp-00000270h], eax
                                                                          lea eax, dword ptr [ebp-58h]
                                                                          push esi
                                                                          push eax
                                                                          call 00007F03F12DCB9Eh
                                                                          Programming Language:
                                                                          • [C++] VS2008 SP1 build 30729
                                                                          • [IMP] VS2008 SP1 build 30729
                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x6eea80x104.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x790000x4b30.rsrc
                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x7e0000x3bcc.reloc
                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x6d3400x38.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x6d3d40x18.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x6d3780x40.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x590000x4fc.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                          .text0x10000x571750x57200f959ed65f49a903603bc150bbb7292aaFalse0.571329694225251data6.62552167894442IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                          .rdata0x590000x179b60x17a00cb0626634f7bf1c5779954b9e8e456d0False0.5005787037037037Zebra Metafile graphic (comment = \210\002\007)5.859466241544869IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          .data0x710000x5d440xe00fa1a169b9414830def88848af87110b5False0.22154017857142858data3.00580031855032IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          .tls0x770000x90x2001f354d76203061bfdd5a53dae48d5435False0.033203125data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          .gfids0x780000x2300x40009e4699aa75951ab53e804fe4f9a3b6bFalse0.3271484375data2.349075166240886IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          .rsrc0x790000x4b300x4c008d2f4c37d83e3600ad4a1d89e8cf0272False0.28207236842105265data3.9871972382142014IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          .reloc0x7e0000x3bcc0x3c000a6e61b09628beca43d4bf9604f65238False0.7639973958333334data6.718533933603825IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                          RT_ICON0x7918c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.3421985815602837
                                                                          RT_ICON0x795f40x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.27704918032786885
                                                                          RT_ICON0x79f7c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.23686679174484052
                                                                          RT_ICON0x7b0240x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.22977178423236513
                                                                          RT_RCDATA0x7d5cc0x524data1.0083586626139818
                                                                          RT_GROUP_ICON0x7daf00x3edataEnglishUnited States0.8064516129032258
                                                                          DLLImport
                                                                          KERNEL32.dllFindNextFileA, ExpandEnvironmentStringsA, GetLongPathNameW, CopyFileW, GetLocaleInfoA, CreateToolhelp32Snapshot, Process32NextW, Process32FirstW, VirtualProtect, SetLastError, VirtualFree, VirtualAlloc, GetNativeSystemInfo, HeapAlloc, GetProcessHeap, FreeLibrary, IsBadReadPtr, GetTempPathW, OpenProcess, OpenMutexA, lstrcatW, GetCurrentProcessId, GetTempFileNameW, UnmapViewOfFile, DuplicateHandle, CreateFileMappingW, MapViewOfFile, GetSystemDirectoryA, GlobalAlloc, GlobalLock, GetTickCount, GlobalUnlock, WriteProcessMemory, ResumeThread, GetThreadContext, ReadProcessMemory, CreateProcessW, SetThreadContext, LocalAlloc, GlobalFree, MulDiv, SizeofResource, QueryDosDeviceW, FindFirstVolumeW, GetConsoleScreenBufferInfo, SetConsoleTextAttribute, lstrlenW, GetStdHandle, SetFilePointer, FindResourceA, LockResource, LoadResource, LocalFree, FindVolumeClose, GetVolumePathNamesForVolumeNameW, lstrcpyW, FindFirstFileA, FormatMessageA, FindNextVolumeW, AllocConsole, lstrcmpW, GetModuleFileNameA, lstrcpynA, QueryPerformanceFrequency, QueryPerformanceCounter, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSection, DeleteCriticalSection, HeapSize, WriteConsoleW, SetStdHandle, SetEnvironmentVariableW, SetEnvironmentVariableA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetCommandLineA, GetOEMCP, IsValidCodePage, FindFirstFileExA, ReadConsoleW, GetConsoleMode, GetConsoleCP, FlushFileBuffers, GetFileType, GetTimeZoneInformation, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetTimeFormatW, GetDateFormatW, HeapReAlloc, GetACP, GetModuleHandleExW, MoveFileExW, RtlUnwind, RaiseException, LoadLibraryExW, GetCPInfo, GetStringTypeW, GetLocaleInfoW, LCMapStringW, CompareStringW, TlsFree, TlsSetValue, TlsGetValue, GetFileSize, TerminateThread, GetLastError, CreateDirectoryW, GetModuleHandleA, RemoveDirectoryW, MoveFileW, SetFilePointerEx, GetLogicalDriveStringsA, DeleteFileW, DeleteFileA, SetFileAttributesW, GetFileAttributesW, FindClose, lstrlenA, GetDriveTypeA, FindNextFileW, GetFileSizeEx, FindFirstFileW, GetModuleHandleW, ExitProcess, CreateMutexA, GetCurrentProcess, GetProcAddress, LoadLibraryA, CreateProcessA, PeekNamedPipe, CreatePipe, TerminateProcess, ReadFile, HeapFree, HeapCreate, CreateEventA, GetLocalTime, CreateThread, SetEvent, CreateEventW, WaitForSingleObject, Sleep, GetModuleFileNameW, CloseHandle, ExitThread, CreateFileW, WriteFile, SetConsoleOutputCP, TlsAlloc, InitializeCriticalSectionAndSpinCount, MultiByteToWideChar, DecodePointer, EncodePointer, WideCharToMultiByte, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentThreadId, IsProcessorFeaturePresent, GetStartupInfoW, SetUnhandledExceptionFilter, UnhandledExceptionFilter, IsDebuggerPresent, WaitForSingleObjectEx, ResetEvent, SetEndOfFile
                                                                          USER32.dllGetWindowTextW, wsprintfW, GetClipboardData, UnhookWindowsHookEx, GetForegroundWindow, ToUnicodeEx, GetKeyboardLayout, SetWindowsHookExA, CloseClipboard, OpenClipboard, GetKeyboardState, CallNextHookEx, GetKeyboardLayoutNameA, GetKeyState, GetWindowTextLengthW, GetWindowThreadProcessId, GetMessageA, SetClipboardData, EnumWindows, ExitWindowsEx, EmptyClipboard, ShowWindow, SetWindowTextW, MessageBoxW, IsWindowVisible, CloseWindow, SendInput, EnumDisplaySettingsW, mouse_event, CreatePopupMenu, DispatchMessageA, TranslateMessage, TrackPopupMenu, DefWindowProcA, CreateWindowExA, GetIconInfo, GetSystemMetrics, AppendMenuA, RegisterClassExA, GetCursorPos, SetForegroundWindow, DrawIcon, SystemParametersInfoW
                                                                          GDI32.dllBitBlt, CreateCompatibleBitmap, SelectObject, CreateCompatibleDC, StretchBlt, GetDIBits, DeleteObject, CreateDCA, GetObjectA, DeleteDC
                                                                          ADVAPI32.dllCryptAcquireContextA, CryptGenRandom, CryptReleaseContext, GetUserNameW, RegEnumKeyExA, QueryServiceStatus, CloseServiceHandle, OpenSCManagerW, OpenSCManagerA, ControlService, StartServiceW, QueryServiceConfigW, ChangeServiceConfigW, OpenServiceW, EnumServicesStatusW, AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, RegCreateKeyA, RegCloseKey, RegQueryInfoKeyW, RegQueryValueExA, RegCreateKeyExW, RegEnumKeyExW, RegSetValueExW, RegSetValueExA, RegOpenKeyExA, RegOpenKeyExW, RegCreateKeyW, RegDeleteValueW, RegEnumValueW, RegQueryValueExW, RegDeleteKeyA
                                                                          SHELL32.dllShellExecuteExA, Shell_NotifyIconA, ExtractIconA, ShellExecuteW
                                                                          ole32.dllCoInitializeEx, CoUninitialize, CoGetObject
                                                                          SHLWAPI.dllPathFileExistsW, PathFileExistsA, StrToIntA
                                                                          WINMM.dllwaveInUnprepareHeader, waveInOpen, waveInStart, waveInAddBuffer, PlaySoundW, mciSendStringA, mciSendStringW, waveInClose, waveInStop, waveInPrepareHeader
                                                                          WS2_32.dllgethostbyname, send, WSAStartup, closesocket, inet_ntoa, htons, htonl, getservbyname, ntohs, getservbyport, gethostbyaddr, inet_addr, WSASetLastError, WSAGetLastError, recv, connect, socket
                                                                          urlmon.dllURLOpenBlockingStreamW, URLDownloadToFileW
                                                                          gdiplus.dllGdipSaveImageToStream, GdipGetImageEncodersSize, GdipFree, GdipDisposeImage, GdipAlloc, GdipCloneImage, GdipGetImageEncoders, GdiplusStartup, GdipLoadImageFromStream
                                                                          WININET.dllInternetOpenUrlW, InternetOpenW, InternetCloseHandle, InternetReadFile
                                                                          Language of compilation systemCountry where language is spokenMap
                                                                          EnglishUnited States
                                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                          2024-10-06T22:00:16.940137+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.74970184.32.44.1391991TCP
                                                                          2024-10-06T22:00:18.221401+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.74970284.32.44.1391991TCP
                                                                          2024-10-06T22:00:18.249317+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.74970384.32.44.1391991TCP
                                                                          2024-10-06T22:00:18.783923+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.74970484.32.44.1391991TCP
                                                                          2024-10-06T22:00:20.538733+02002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.749705178.237.33.5080TCP
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Oct 6, 2024 22:00:16.251419067 CEST497011991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:16.256293058 CEST19914970184.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:16.256366968 CEST497011991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:16.261158943 CEST497011991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:16.266016960 CEST19914970184.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:16.889314890 CEST19914970184.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:16.940136909 CEST497011991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:17.024967909 CEST19914970184.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:17.028966904 CEST497011991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:17.033745050 CEST19914970184.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:17.033792973 CEST497011991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:17.038654089 CEST19914970184.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:17.307713032 CEST19914970184.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:17.348953009 CEST497011991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:17.354073048 CEST19914970184.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:17.440651894 CEST19914970184.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:17.487019062 CEST497011991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:17.533200026 CEST19914970184.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:17.565056086 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:17.570525885 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:17.570600986 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:17.580858946 CEST497011991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:17.591655016 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:17.596545935 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:17.609384060 CEST497031991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:17.614327908 CEST19914970384.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:17.614463091 CEST497031991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:17.641444921 CEST497031991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:17.646406889 CEST19914970384.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.137986898 CEST497041991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.142795086 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.143090963 CEST497041991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.146537066 CEST497041991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.151550055 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.168909073 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.193833113 CEST19914970384.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.221400976 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.249316931 CEST497031991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.306760073 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.323733091 CEST19914970384.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.346393108 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.377758980 CEST497031991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.438222885 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.443243980 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.473189116 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.477996111 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.478058100 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.478421926 CEST497031991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.482848883 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.482963085 CEST497031991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.483232975 CEST19914970384.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.488281012 CEST19914970384.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.491251945 CEST497031991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.709861040 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.709887028 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.709897995 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.709948063 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.710567951 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.710582972 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.710606098 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.711146116 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.711157084 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.711199999 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.711949110 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.711960077 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.712008953 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.712605000 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.712615967 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.712658882 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.713299036 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.713340998 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.714813948 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.739139080 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.768296003 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.783922911 CEST497041991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.800259113 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.800453901 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.800463915 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.800499916 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.812216997 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.812267065 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.812442064 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.812457085 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.812499046 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.813250065 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.813262939 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.813312054 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.814106941 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.814125061 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.814165115 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.814980030 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.814992905 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.815033913 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.815855980 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.815870047 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.815917015 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.816788912 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.816802025 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.816850901 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.817734003 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.817747116 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.817795038 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.818625927 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.818639040 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.818650007 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.818682909 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.819487095 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.819529057 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.836245060 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.836596966 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.836641073 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.836767912 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.868985891 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.873804092 CEST497041991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.877640963 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.878658056 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.878705978 CEST497041991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.880996943 CEST497041991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.883608103 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.885934114 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.885982037 CEST497041991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.885993004 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.886004925 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.886022091 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.886044979 CEST497041991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.886069059 CEST497041991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.886101007 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.886111975 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.886133909 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.886142015 CEST497041991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.886143923 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.886179924 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.886195898 CEST497041991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.886221886 CEST497041991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.886243105 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.886290073 CEST497041991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.890774012 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.890871048 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.890914917 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.890959024 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.891328096 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.891376972 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.891657114 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.891668081 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.891678095 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.891710043 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.891736031 CEST497041991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.892138004 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.892147064 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.892157078 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.892167091 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.892177105 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.892182112 CEST497041991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.892187119 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.892199039 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.892215014 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.892225981 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.892225027 CEST497041991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.892245054 CEST497041991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.892260075 CEST497041991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.892276049 CEST497041991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.892276049 CEST497041991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.892302036 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.892313957 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.892324924 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.892354965 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.893183947 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.893196106 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.893204927 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.893219948 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.893285036 CEST497041991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.893573046 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.893585920 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.893608093 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.894143105 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.894154072 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.894167900 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.894177914 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.894216061 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.894962072 CEST497041991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.894970894 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.894983053 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.894993067 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.895026922 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.895860910 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.895874023 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.895885944 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.895900011 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.895930052 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.896785021 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.896799088 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.896811008 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.896821976 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.896835089 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.896876097 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.897695065 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.897708893 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.897721052 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.897747993 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.898592949 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.898605108 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.898617029 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.898638010 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.898668051 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.899507046 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.899519920 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.899529934 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.899543047 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.899561882 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.899593115 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.900387049 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.900399923 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.900409937 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.900418997 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.900428057 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.900437117 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.900445938 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.900454998 CEST497041991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.900455952 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.900470018 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.900480986 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.900490046 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.900499105 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.900502920 CEST497041991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.900506973 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.900520086 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.900521994 CEST497041991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.900521994 CEST497041991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.900530100 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.900538921 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.900542974 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.900546074 CEST497041991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.900552034 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.900563002 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.900572062 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.900574923 CEST497041991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.900582075 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.900595903 CEST497041991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.900597095 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.900608063 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.900615931 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.900625944 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.900635004 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.900974989 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.900985003 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.901011944 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.901340008 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.901351929 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.901392937 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.901840925 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.901880980 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.904253006 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.904263020 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.904278994 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.904289007 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.905497074 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.905505896 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.905555010 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.905564070 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.905627012 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.905637026 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.905675888 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.905736923 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.905792952 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.905874014 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.905883074 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.905890942 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.905940056 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.905949116 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.905957937 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.905967951 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.905987024 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.905996084 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.906044006 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.906054020 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.906061888 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.906066895 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.906085968 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.906105042 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.906276941 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.906286955 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.906342983 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.906352043 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.906416893 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.906425953 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.906495094 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.906505108 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.906563997 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.906574011 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.906680107 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.906689882 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.906708002 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.906717062 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.906760931 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.906774044 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.906826019 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.906836033 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.906862974 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.926878929 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.926925898 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.926937103 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.926965952 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.927129030 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.927141905 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.927176952 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.927294016 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.927304983 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.927340031 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.927483082 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.927494049 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.927525997 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.950444937 CEST497041991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.955660105 CEST19914970484.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.955718994 CEST497041991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.971430063 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.981408119 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.981430054 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.981441021 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.981465101 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.981571913 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.981585979 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.981620073 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.981926918 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.981939077 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.981950998 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.981964111 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.981971025 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.981976986 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.981996059 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.982008934 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.982248068 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.982338905 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.982381105 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.982394934 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.982407093 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.982450962 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.982580900 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.982727051 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.982739925 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.982769012 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.982824087 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.982866049 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.983033895 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.983108997 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.983120918 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.983144999 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.983263016 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.983274937 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.983319998 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.983479977 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.983491898 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.983504057 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.983515024 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.983527899 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.983623028 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.983894110 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.983937979 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.983975887 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.983989954 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.984031916 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.984193087 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.984205008 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.984216928 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.984251976 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.984580994 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.984592915 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.984606028 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.984625101 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.984653950 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.984874010 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.984952927 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.984965086 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.984987974 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.985168934 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.985204935 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.985217094 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.985234976 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.985265970 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.985446930 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.985459089 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.985471010 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.985502005 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.985831022 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.985898018 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.985910892 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.985923052 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.986022949 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.986098051 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.986109972 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.986133099 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.986145973 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.986154079 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.986190081 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.986557007 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.986569881 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.986608982 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.986854076 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.986908913 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.986920118 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.986958027 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.987133980 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.987147093 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.987159967 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.987169981 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.987180948 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.987207890 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.990881920 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.990931034 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.990957022 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.990968943 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.991008997 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.991077900 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.991159916 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.991219044 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.991224051 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:18.991230011 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.991242886 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:18.991286993 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.000320911 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.017756939 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.017771006 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.017802954 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.017813921 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.017853975 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.017880917 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.017937899 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.017980099 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.018038988 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.018050909 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.018088102 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.018163919 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.018186092 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.018228054 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.018385887 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.018398046 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.018444061 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.018548965 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.018562078 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.018601894 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.018784046 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.018795013 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.018809080 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.018821001 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.018832922 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.018841982 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.018871069 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.019141912 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.019153118 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.019165039 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.019188881 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.019208908 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.047022104 CEST4970580192.168.2.7178.237.33.50
                                                                          Oct 6, 2024 22:00:19.051927090 CEST8049705178.237.33.50192.168.2.7
                                                                          Oct 6, 2024 22:00:19.051990986 CEST4970580192.168.2.7178.237.33.50
                                                                          Oct 6, 2024 22:00:19.052169085 CEST4970580192.168.2.7178.237.33.50
                                                                          Oct 6, 2024 22:00:19.056963921 CEST8049705178.237.33.50192.168.2.7
                                                                          Oct 6, 2024 22:00:19.072002888 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.072065115 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.072074890 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.072117090 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.072220087 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.072232008 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.072242975 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.072264910 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.072304010 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.072460890 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.072554111 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.072597980 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.072680950 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.072691917 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.072701931 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.072711945 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.072750092 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.072784901 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.073014975 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.073132992 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.073143959 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.073154926 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.073175907 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.073189974 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.073487997 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.073498964 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.073510885 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.073523045 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.073534966 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.073540926 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.073563099 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.073904037 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.073915958 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.073926926 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.073940992 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.073949099 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.073966980 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.074198961 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.074213028 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.074237108 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.074296951 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.074309111 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.074318886 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.074331045 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.074341059 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.074345112 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.074354887 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.074356079 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.074395895 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.075197935 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.075211048 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.075221062 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.075232983 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.075248957 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.075258970 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.075263023 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.075275898 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.075289011 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.075299025 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.075300932 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.075314999 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.075323105 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.075340986 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.076076984 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.076091051 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.076101065 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.076113939 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.076119900 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.076124907 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.076132059 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.076141119 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.076152086 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.076164007 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.076172113 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.076178074 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.076203108 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.076239109 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.076952934 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.076992035 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.077003002 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.077014923 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.077027082 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.077032089 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.077039957 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.077054024 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.077066898 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.077073097 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.077084064 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.077094078 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.077096939 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.077110052 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.077110052 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.077125072 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.077142000 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.077168941 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.077756882 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.077769995 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.077816963 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.077883959 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.077896118 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.077939987 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.078027964 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.078039885 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.078051090 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.078078985 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.078246117 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.078257084 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.078291893 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.078356981 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.078368902 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.078378916 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.078392982 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.078407049 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.078406096 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.078421116 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.078428984 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.078433990 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.078445911 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.078475952 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.078912973 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.078922987 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.078933001 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.078963041 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.081450939 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.081500053 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.081509113 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.081518888 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.081556082 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.081585884 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.081681967 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.081691980 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.081717014 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.081825972 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.081836939 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.081861019 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.108303070 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.108354092 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.108360052 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.108371973 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.108422995 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.108458042 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.108470917 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.108510971 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.108603954 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.108684063 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.108695030 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.108742952 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.108824968 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.108866930 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.108876944 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.108889103 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.108901024 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.108936071 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.109196901 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.109209061 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.109226942 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.109236002 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.109266996 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.109467983 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.109481096 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.109493017 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.109503984 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.109513998 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.109517097 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.109538078 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.109781981 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.109795094 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.109816074 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.158899069 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.162802935 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.162872076 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.162916899 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.162919998 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.162991047 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.163003922 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.163028002 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.163146973 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.163158894 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.163171053 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.163183928 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.163191080 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.163211107 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.163496971 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.163508892 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.163520098 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.163533926 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.163537979 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.163562059 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.163778067 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.163786888 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.163815975 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.164007902 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.164020061 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.164031029 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.164042950 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.164048910 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.164057016 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.164069891 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.164073944 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.164083004 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.164107084 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.164145947 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.164453983 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.164465904 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.164482117 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.164499998 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.164510965 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.164515018 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.164522886 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.164534092 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.164535046 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.164547920 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.164561033 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.164572001 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.164583921 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.165194035 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.165205002 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.165215015 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.165226936 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.165237904 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.165240049 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.165251017 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.165258884 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.165262938 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.165281057 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.165291071 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.165292978 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.165304899 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.165340900 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.165781975 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.165793896 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.165805101 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.165816069 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.165827990 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.165838957 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.165839911 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.165851116 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.165853024 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.165864944 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.165875912 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.165878057 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.165889978 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.165899992 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.165939093 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.166475058 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.166486979 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.166496992 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.166508913 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.166522026 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.166522026 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.166533947 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.166546106 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.166546106 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.166557074 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.166568995 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.166579962 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.166585922 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.166591883 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.166598082 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.166604042 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.166615009 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.166624069 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.166627884 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.166640997 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.166650057 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.166677952 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.167435884 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.167447090 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.167457104 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.167468071 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.167479038 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.167481899 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.167490959 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.167491913 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.167504072 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.167515993 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.167516947 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.167530060 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.167541027 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.167541027 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.167552948 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.167566061 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.167577028 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.167577982 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.167588949 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.167610884 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.167649984 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.168231010 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.168242931 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.168253899 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.168266058 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.168272972 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.168277979 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.168299913 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.168322086 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.172259092 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.172308922 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.172321081 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.172360897 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.172435045 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.172486067 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.172502041 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.172513008 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.172523975 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.172533035 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.172544956 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.172569990 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.199089050 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.199110985 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.199122906 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.199152946 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.199256897 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.199269056 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.199314117 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.199398041 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.199409962 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.199446917 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.199584961 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.199596882 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.199634075 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.199743032 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.199754000 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.199767113 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.199775934 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.199836969 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.200026989 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.200040102 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.200051069 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.200062037 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.200072050 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.200077057 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.200086117 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.200095892 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.200113058 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.200126886 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.200413942 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.200426102 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.200436115 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.200447083 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.200453997 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.200476885 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.253397942 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.253444910 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.253457069 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.253506899 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.253565073 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.253578901 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.253592968 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.253618002 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.253634930 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.253834009 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.253846884 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.253858089 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.253871918 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.253887892 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.253911972 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.254117012 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.254277945 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.254291058 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.254302979 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.254314899 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.254327059 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.254337072 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.254339933 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.254355907 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.254362106 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.254383087 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.254407883 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.254751921 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.254765034 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.254776955 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.254801035 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.255007982 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.255021095 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.255043030 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.255048990 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.255055904 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.255069971 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.255081892 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.255086899 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.255095959 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.255108118 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.255117893 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.255119085 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.255131960 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.255132914 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.255146027 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:19.255175114 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:19.255181074 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:20.538325071 CEST8049705178.237.33.50192.168.2.7
                                                                          Oct 6, 2024 22:00:20.538728952 CEST8049705178.237.33.50192.168.2.7
                                                                          Oct 6, 2024 22:00:20.538733006 CEST4970580192.168.2.7178.237.33.50
                                                                          Oct 6, 2024 22:00:20.538815975 CEST4970580192.168.2.7178.237.33.50
                                                                          Oct 6, 2024 22:00:20.538933039 CEST8049705178.237.33.50192.168.2.7
                                                                          Oct 6, 2024 22:00:20.539251089 CEST8049705178.237.33.50192.168.2.7
                                                                          Oct 6, 2024 22:00:20.539278984 CEST4970580192.168.2.7178.237.33.50
                                                                          Oct 6, 2024 22:00:20.539470911 CEST4970580192.168.2.7178.237.33.50
                                                                          Oct 6, 2024 22:00:20.552807093 CEST497011991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:20.557616949 CEST19914970184.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:20.678286076 CEST8049705178.237.33.50192.168.2.7
                                                                          Oct 6, 2024 22:00:20.678370953 CEST4970580192.168.2.7178.237.33.50
                                                                          Oct 6, 2024 22:00:21.745574951 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:21.750596046 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:21.750621080 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:21.750639915 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:21.750653982 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:21.750658035 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:21.750693083 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:21.750735044 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:21.750745058 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:21.750853062 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:21.750861883 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:21.750881910 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:21.750891924 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:21.755441904 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:21.755667925 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:21.755678892 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:21.755743980 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:21.755754948 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:21.755851030 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:21.755948067 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:21.977454901 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:21.978496075 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:22.074003935 CEST497021991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:22.078836918 CEST19914970284.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:36.032808065 CEST19914970184.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:00:36.034559965 CEST497011991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:00:36.039297104 CEST19914970184.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:01:05.936491013 CEST19914970184.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:01:05.938148975 CEST497011991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:01:05.943052053 CEST19914970184.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:01:35.981822014 CEST19914970184.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:01:35.983398914 CEST497011991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:01:35.988404036 CEST19914970184.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:02:06.004899025 CEST19914970184.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:02:06.008888006 CEST497011991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:02:06.013715982 CEST19914970184.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:02:09.035212994 CEST4970580192.168.2.7178.237.33.50
                                                                          Oct 6, 2024 22:02:09.503732920 CEST4970580192.168.2.7178.237.33.50
                                                                          Oct 6, 2024 22:02:10.113467932 CEST4970580192.168.2.7178.237.33.50
                                                                          Oct 6, 2024 22:02:11.316253901 CEST4970580192.168.2.7178.237.33.50
                                                                          Oct 6, 2024 22:02:13.816267967 CEST4970580192.168.2.7178.237.33.50
                                                                          Oct 6, 2024 22:02:18.628828049 CEST4970580192.168.2.7178.237.33.50
                                                                          Oct 6, 2024 22:02:28.425831079 CEST4970580192.168.2.7178.237.33.50
                                                                          Oct 6, 2024 22:02:36.029795885 CEST19914970184.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:02:36.034732103 CEST497011991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:02:36.039630890 CEST19914970184.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:03:06.052349091 CEST19914970184.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:03:06.053577900 CEST497011991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:03:06.058377981 CEST19914970184.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:03:36.086558104 CEST19914970184.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:03:36.088485003 CEST497011991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:03:36.093368053 CEST19914970184.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:04:06.115277052 CEST19914970184.32.44.139192.168.2.7
                                                                          Oct 6, 2024 22:04:06.117257118 CEST497011991192.168.2.784.32.44.139
                                                                          Oct 6, 2024 22:04:06.122174025 CEST19914970184.32.44.139192.168.2.7
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Oct 6, 2024 22:00:16.130901098 CEST5826453192.168.2.71.1.1.1
                                                                          Oct 6, 2024 22:00:16.247842073 CEST53582641.1.1.1192.168.2.7
                                                                          Oct 6, 2024 22:00:19.036437035 CEST4916953192.168.2.71.1.1.1
                                                                          Oct 6, 2024 22:00:19.043441057 CEST53491691.1.1.1192.168.2.7
                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                          Oct 6, 2024 22:00:16.130901098 CEST192.168.2.71.1.1.10xef95Standard query (0)cavps7.duckdns.orgA (IP address)IN (0x0001)false
                                                                          Oct 6, 2024 22:00:19.036437035 CEST192.168.2.71.1.1.10x6be4Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                          Oct 6, 2024 22:00:16.247842073 CEST1.1.1.1192.168.2.70xef95No error (0)cavps7.duckdns.org84.32.44.139A (IP address)IN (0x0001)false
                                                                          Oct 6, 2024 22:00:19.043441057 CEST1.1.1.1192.168.2.70x6be4No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                          • geoplugin.net
                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          0192.168.2.749705178.237.33.50807172C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Oct 6, 2024 22:00:19.052169085 CEST71OUTGET /json.gp HTTP/1.1
                                                                          Host: geoplugin.net
                                                                          Cache-Control: no-cache
                                                                          Oct 6, 2024 22:00:20.538325071 CEST1170INHTTP/1.1 200 OK
                                                                          date: Sun, 06 Oct 2024 20:00:19 GMT
                                                                          server: Apache
                                                                          content-length: 962
                                                                          content-type: application/json; charset=utf-8
                                                                          cache-control: public, max-age=300
                                                                          access-control-allow-origin: *
                                                                          Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                                                                          Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}
                                                                          Oct 6, 2024 22:00:20.538728952 CEST1170INHTTP/1.1 200 OK
                                                                          date: Sun, 06 Oct 2024 20:00:19 GMT
                                                                          server: Apache
                                                                          content-length: 962
                                                                          content-type: application/json; charset=utf-8
                                                                          cache-control: public, max-age=300
                                                                          access-control-allow-origin: *
                                                                          Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                                                                          Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}
                                                                          Oct 6, 2024 22:00:20.538933039 CEST1170INHTTP/1.1 200 OK
                                                                          date: Sun, 06 Oct 2024 20:00:19 GMT
                                                                          server: Apache
                                                                          content-length: 962
                                                                          content-type: application/json; charset=utf-8
                                                                          cache-control: public, max-age=300
                                                                          access-control-allow-origin: *
                                                                          Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                                                                          Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}
                                                                          Oct 6, 2024 22:00:20.539251089 CEST1170INHTTP/1.1 200 OK
                                                                          date: Sun, 06 Oct 2024 20:00:19 GMT
                                                                          server: Apache
                                                                          content-length: 962
                                                                          content-type: application/json; charset=utf-8
                                                                          cache-control: public, max-age=300
                                                                          access-control-allow-origin: *
                                                                          Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                                                                          Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                          Click to jump to process

                                                                          Click to jump to process

                                                                          Click to dive into process behavior distribution

                                                                          Click to jump to process

                                                                          Target ID:6
                                                                          Start time:16:00:15
                                                                          Start date:06/10/2024
                                                                          Path:C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe"
                                                                          Imagebase:0x400000
                                                                          File size:494'592 bytes
                                                                          MD5 hash:E9057285AAFB6978445C07029FDC5898
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000006.00000000.1273413093.0000000000459000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000006.00000000.1273413093.0000000000459000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                          • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000006.00000000.1273413093.0000000000459000.00000002.00000001.01000000.00000004.sdmp, Author: unknown
                                                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                          • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmp, Author: unknown
                                                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000006.00000002.3736983061.00000000004BE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                          Reputation:low
                                                                          Has exited:false

                                                                          Target ID:9
                                                                          Start time:16:00:18
                                                                          Start date:06/10/2024
                                                                          Path:C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\xttxrevmuropxyhmme"
                                                                          Imagebase:0x400000
                                                                          File size:494'592 bytes
                                                                          MD5 hash:E9057285AAFB6978445C07029FDC5898
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000000.1305912992.0000000000459000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000009.00000000.1305912992.0000000000459000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                          • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000009.00000000.1305912992.0000000000459000.00000002.00000001.01000000.00000004.sdmp, Author: unknown
                                                                          Reputation:low
                                                                          Has exited:true

                                                                          Target ID:10
                                                                          Start time:16:00:18
                                                                          Start date:06/10/2024
                                                                          Path:C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\hnyqswgoizgciedqvprkl"
                                                                          Imagebase:0x400000
                                                                          File size:494'592 bytes
                                                                          MD5 hash:E9057285AAFB6978445C07029FDC5898
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000000.1306197099.0000000000459000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000A.00000000.1306197099.0000000000459000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                          • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000A.00000000.1306197099.0000000000459000.00000002.00000001.01000000.00000004.sdmp, Author: unknown
                                                                          Reputation:low
                                                                          Has exited:true

                                                                          Target ID:11
                                                                          Start time:16:00:18
                                                                          Start date:06/10/2024
                                                                          Path:C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe /stext "C:\Users\user\AppData\Local\Temp\jpebsprhwhyhkkrunalmokuw"
                                                                          Imagebase:0x400000
                                                                          File size:494'592 bytes
                                                                          MD5 hash:E9057285AAFB6978445C07029FDC5898
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000B.00000000.1306494613.0000000000459000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000B.00000000.1306494613.0000000000459000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                          • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000B.00000000.1306494613.0000000000459000.00000002.00000001.01000000.00000004.sdmp, Author: unknown
                                                                          Reputation:low
                                                                          Has exited:true

                                                                          Reset < >

                                                                            Execution Graph

                                                                            Execution Coverage:5.6%
                                                                            Dynamic/Decrypted Code Coverage:4%
                                                                            Signature Coverage:10%
                                                                            Total number of Nodes:1582
                                                                            Total number of Limit Nodes:61
                                                                            execution_graph 53000 4165a0 53011 401e65 53000->53011 53002 4165b0 53016 4020f6 53002->53016 53005 401e65 28 API calls 53006 4165c6 53005->53006 53007 4020f6 28 API calls 53006->53007 53008 4165d1 53007->53008 53022 41292a 53008->53022 53012 401e6d 53011->53012 53013 401e75 53012->53013 53041 402158 28 API calls 53012->53041 53013->53002 53015 401e8c 53017 40210c 53016->53017 53042 4023ce 53017->53042 53019 402126 53046 402569 53019->53046 53021 402134 53021->53005 53094 40482d 53022->53094 53024 41293e 53101 4048c8 connect 53024->53101 53028 41295f 53166 402f10 53028->53166 53037 401fd8 11 API calls 53038 412991 53037->53038 53039 401fd8 11 API calls 53038->53039 53040 412999 53039->53040 53041->53015 53043 402428 53042->53043 53044 4023d8 53042->53044 53043->53019 53044->53043 53056 4027a7 53044->53056 53067 402888 53046->53067 53048 40257d 53049 402592 53048->53049 53050 4025a7 53048->53050 53072 402a34 22 API calls 53049->53072 53074 4028e8 53050->53074 53053 40259b 53073 4029da 22 API calls 53053->53073 53055 4025a5 53055->53021 53057 402e21 53056->53057 53060 4016b4 53057->53060 53059 402e30 53059->53043 53061 4016c6 53060->53061 53062 4016cb 53060->53062 53066 43bd19 11 API calls _abort 53061->53066 53062->53061 53063 4016f3 53062->53063 53063->53059 53065 43bd18 53066->53065 53069 402890 53067->53069 53068 402898 53068->53048 53069->53068 53085 402ca3 22 API calls 53069->53085 53072->53053 53073->53055 53075 4028f1 53074->53075 53076 402953 53075->53076 53077 4028fb 53075->53077 53092 4028a4 22 API calls 53076->53092 53080 402904 53077->53080 53081 402917 53077->53081 53086 402cae 53080->53086 53083 402915 53081->53083 53084 4023ce 11 API calls 53081->53084 53083->53055 53084->53083 53087 402cb8 __EH_prolog 53086->53087 53093 402e54 22 API calls 53087->53093 53089 4023ce 11 API calls 53091 402d92 53089->53091 53090 402d24 53090->53089 53091->53083 53093->53090 53095 404846 socket 53094->53095 53096 404839 53094->53096 53098 404860 CreateEventW 53095->53098 53099 404842 53095->53099 53207 40489e WSAStartup 53096->53207 53098->53024 53099->53024 53100 40483e 53100->53095 53100->53099 53102 404a1b 53101->53102 53103 4048ee 53101->53103 53104 404a21 WSAGetLastError 53102->53104 53105 40497e 53102->53105 53103->53105 53107 404923 53103->53107 53208 40531e 53103->53208 53104->53105 53106 404a31 53104->53106 53161 402f31 53105->53161 53109 404932 53106->53109 53110 404a36 53106->53110 53243 420c60 27 API calls 53107->53243 53118 402093 28 API calls 53109->53118 53248 41cae1 30 API calls 53110->53248 53112 40490f 53213 402093 53112->53213 53114 40492b 53114->53109 53117 404941 53114->53117 53116 404a40 53249 4052fd 28 API calls 53116->53249 53127 404950 53117->53127 53128 404987 53117->53128 53119 404a80 53118->53119 53122 402093 28 API calls 53119->53122 53125 404a8f 53122->53125 53129 41b4ef 80 API calls 53125->53129 53132 402093 28 API calls 53127->53132 53245 421a40 54 API calls 53128->53245 53129->53105 53135 40495f 53132->53135 53134 40498f 53138 4049c4 53134->53138 53139 404994 53134->53139 53136 402093 28 API calls 53135->53136 53140 40496e 53136->53140 53247 420e06 28 API calls 53138->53247 53143 402093 28 API calls 53139->53143 53144 41b4ef 80 API calls 53140->53144 53146 4049a3 53143->53146 53147 404973 53144->53147 53145 4049cc 53148 4049f9 CreateEventW CreateEventW 53145->53148 53150 402093 28 API calls 53145->53150 53149 402093 28 API calls 53146->53149 53244 41e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 53147->53244 53148->53105 53151 4049b2 53149->53151 53153 4049e2 53150->53153 53154 41b4ef 80 API calls 53151->53154 53156 402093 28 API calls 53153->53156 53155 4049b7 53154->53155 53246 4210b2 52 API calls 53155->53246 53158 4049f1 53156->53158 53159 41b4ef 80 API calls 53158->53159 53160 4049f6 53159->53160 53160->53148 53162 4020df 11 API calls 53161->53162 53163 402f3d 53162->53163 53164 4032a0 28 API calls 53163->53164 53165 402f59 53164->53165 53165->53028 53311 401fb0 53166->53311 53168 402f1e 53169 402055 11 API calls 53168->53169 53170 402f2d 53169->53170 53171 404aa1 53170->53171 53172 404ab4 53171->53172 53314 40520c 53172->53314 53174 404ac9 _Yarn 53175 404b40 WaitForSingleObject 53174->53175 53176 404b20 53174->53176 53177 404b56 53175->53177 53178 404b32 send 53176->53178 53320 42103a 54 API calls 53177->53320 53179 404b7b 53178->53179 53182 401fd8 11 API calls 53179->53182 53181 404b69 SetEvent 53181->53179 53183 404b83 53182->53183 53184 401fd8 11 API calls 53183->53184 53185 404b8b 53184->53185 53186 401fd8 53185->53186 53187 4023ce 11 API calls 53186->53187 53188 401fe1 53187->53188 53189 404c10 53188->53189 53190 4020df 11 API calls 53189->53190 53191 404c27 53190->53191 53192 4020df 11 API calls 53191->53192 53194 404c30 53192->53194 53198 404ca1 53194->53198 53200 401fd8 11 API calls 53194->53200 53338 43bd51 53194->53338 53345 404b96 53194->53345 53351 4020b7 53194->53351 53357 401fe2 53194->53357 53366 404cc3 53194->53366 53379 404e26 WaitForSingleObject 53198->53379 53200->53194 53202 401fd8 11 API calls 53203 404cb1 53202->53203 53204 401fd8 11 API calls 53203->53204 53205 404cba 53204->53205 53205->53037 53207->53100 53250 4020df 53208->53250 53210 40532a 53254 4032a0 53210->53254 53212 405346 53212->53112 53214 40209b 53213->53214 53215 4023ce 11 API calls 53214->53215 53216 4020a6 53215->53216 53258 4024ed 53216->53258 53219 41b4ef 53220 41b5a0 53219->53220 53221 41b505 GetLocalTime 53219->53221 53223 401fd8 11 API calls 53220->53223 53222 40531e 28 API calls 53221->53222 53224 41b547 53222->53224 53225 41b5a8 53223->53225 53269 406383 53224->53269 53227 401fd8 11 API calls 53225->53227 53229 41b5b0 53227->53229 53229->53107 53230 402f10 28 API calls 53231 41b55f 53230->53231 53232 406383 28 API calls 53231->53232 53233 41b56b 53232->53233 53274 407200 77 API calls 53233->53274 53235 41b579 53236 401fd8 11 API calls 53235->53236 53237 41b585 53236->53237 53238 401fd8 11 API calls 53237->53238 53239 41b58e 53238->53239 53240 401fd8 11 API calls 53239->53240 53241 41b597 53240->53241 53242 401fd8 11 API calls 53241->53242 53242->53220 53243->53114 53244->53105 53245->53134 53246->53147 53247->53145 53248->53116 53251 4020e7 53250->53251 53252 4023ce 11 API calls 53251->53252 53253 4020f2 53252->53253 53253->53210 53255 4032aa 53254->53255 53256 4028e8 28 API calls 53255->53256 53257 4032c9 53255->53257 53256->53257 53257->53212 53259 4024f9 53258->53259 53262 40250a 53259->53262 53261 4020b1 53261->53219 53263 40251a 53262->53263 53264 402520 53263->53264 53265 402535 53263->53265 53267 402569 28 API calls 53264->53267 53266 4028e8 28 API calls 53265->53266 53268 402533 53266->53268 53267->53268 53268->53261 53275 4051ef 53269->53275 53271 406391 53279 402055 53271->53279 53274->53235 53276 4051fb 53275->53276 53285 405274 53276->53285 53278 405208 53278->53271 53280 402061 53279->53280 53281 4023ce 11 API calls 53280->53281 53282 40207b 53281->53282 53307 40267a 53282->53307 53286 405282 53285->53286 53287 405288 53286->53287 53288 40529e 53286->53288 53296 4025f0 53287->53296 53290 4052f5 53288->53290 53291 4052b6 53288->53291 53305 4028a4 22 API calls 53290->53305 53292 40529c 53291->53292 53295 4028e8 28 API calls 53291->53295 53292->53278 53295->53292 53297 402888 22 API calls 53296->53297 53298 402602 53297->53298 53299 402672 53298->53299 53300 402629 53298->53300 53306 4028a4 22 API calls 53299->53306 53302 4028e8 28 API calls 53300->53302 53304 40263b 53300->53304 53302->53304 53304->53292 53308 40268b 53307->53308 53309 4023ce 11 API calls 53308->53309 53310 40208d 53309->53310 53310->53230 53312 4025f0 28 API calls 53311->53312 53313 401fbd 53312->53313 53313->53168 53315 405214 53314->53315 53316 4023ce 11 API calls 53315->53316 53317 40521f 53316->53317 53321 405234 53317->53321 53319 40522e 53319->53174 53320->53181 53322 405240 53321->53322 53323 40526e 53321->53323 53324 4028e8 28 API calls 53322->53324 53337 4028a4 22 API calls 53323->53337 53327 40524a 53324->53327 53327->53319 53344 446137 ___crtLCMapStringA 53338->53344 53339 446175 53393 4405dd 20 API calls _abort 53339->53393 53341 446160 RtlAllocateHeap 53342 446173 53341->53342 53341->53344 53342->53194 53344->53339 53344->53341 53392 442f80 7 API calls 2 library calls 53344->53392 53346 404ba0 WaitForSingleObject 53345->53346 53347 404bcd recv 53345->53347 53394 421076 54 API calls 53346->53394 53348 404be0 53347->53348 53348->53194 53350 404bbc SetEvent 53350->53348 53352 4020bf 53351->53352 53353 4023ce 11 API calls 53352->53353 53354 4020ca 53353->53354 53355 40250a 28 API calls 53354->53355 53356 4020d9 53355->53356 53356->53194 53358 401ff1 53357->53358 53359 402039 53357->53359 53360 4023ce 11 API calls 53358->53360 53359->53194 53361 401ffa 53360->53361 53362 40203c 53361->53362 53363 402015 53361->53363 53364 40267a 11 API calls 53362->53364 53395 403098 28 API calls 53363->53395 53364->53359 53367 4020df 11 API calls 53366->53367 53377 404cde 53367->53377 53368 404e13 53369 401fd8 11 API calls 53368->53369 53370 404e1c 53369->53370 53370->53194 53371 4041a2 28 API calls 53371->53377 53372 401fe2 28 API calls 53372->53377 53373 401fd8 11 API calls 53373->53377 53375 4020f6 28 API calls 53375->53377 53377->53368 53377->53371 53377->53372 53377->53373 53377->53375 53396 41299f 53377->53396 53440 401fc0 53377->53440 53380 404e40 SetEvent CloseHandle 53379->53380 53381 404e57 closesocket 53379->53381 53382 404ca8 53380->53382 53383 404e64 53381->53383 53382->53202 53384 404e7a 53383->53384 54013 4050e4 84 API calls 53383->54013 53386 404e8c WaitForSingleObject 53384->53386 53387 404ece SetEvent CloseHandle 53384->53387 54014 41e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 53386->54014 53387->53382 53389 404e9b SetEvent WaitForSingleObject 54015 41e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 53389->54015 53391 404eb3 SetEvent CloseHandle CloseHandle 53391->53387 53392->53344 53393->53342 53394->53350 53395->53359 53397 4129b1 53396->53397 53444 4041a2 53397->53444 53400 4020f6 28 API calls 53401 4129d3 53400->53401 53402 4020f6 28 API calls 53401->53402 53403 4129e2 53402->53403 53447 41be1b 53403->53447 53406 412a93 53616 401e8d 53406->53616 53408 401e65 28 API calls 53410 412a02 53408->53410 53412 4020f6 28 API calls 53410->53412 53411 401fd8 11 API calls 53413 412aa5 53411->53413 53414 412a0d 53412->53414 53415 401fd8 11 API calls 53413->53415 53416 401e65 28 API calls 53414->53416 53417 412aad 53415->53417 53418 412a18 53416->53418 53417->53377 53419 4020f6 28 API calls 53418->53419 53420 412a23 53419->53420 53421 401e65 28 API calls 53420->53421 53422 412a2e 53421->53422 53423 4020f6 28 API calls 53422->53423 53424 412a39 53423->53424 53425 401e65 28 API calls 53424->53425 53426 412a44 53425->53426 53427 4020f6 28 API calls 53426->53427 53428 412a4f 53427->53428 53429 401e65 28 API calls 53428->53429 53430 412a5a 53429->53430 53431 4020f6 28 API calls 53430->53431 53432 412a65 53431->53432 53433 401e65 28 API calls 53432->53433 53434 412a73 53433->53434 53435 4020f6 28 API calls 53434->53435 53436 412a7e 53435->53436 53469 412ab4 GetModuleFileNameW 53436->53469 53439 404e26 99 API calls 53439->53406 53441 401fd2 CreateEventA CreateThread WaitForSingleObject CloseHandle 53440->53441 53442 401fc9 53440->53442 53441->53377 53872 415aea 53441->53872 53871 4025e0 28 API calls 53442->53871 53622 40423a 53444->53622 53448 4020df 11 API calls 53447->53448 53449 41be2e 53448->53449 53453 41bea0 53449->53453 53456 4041a2 28 API calls 53449->53456 53461 401fe2 28 API calls 53449->53461 53464 401fd8 11 API calls 53449->53464 53468 41be9e 53449->53468 53628 41ce34 53449->53628 53450 401fd8 11 API calls 53451 41bed0 53450->53451 53452 401fd8 11 API calls 53451->53452 53454 41bed8 53452->53454 53455 4041a2 28 API calls 53453->53455 53457 401fd8 11 API calls 53454->53457 53458 41beac 53455->53458 53456->53449 53459 4129eb 53457->53459 53460 401fe2 28 API calls 53458->53460 53459->53406 53459->53408 53462 41beb5 53460->53462 53461->53449 53463 401fd8 11 API calls 53462->53463 53465 41bebd 53463->53465 53464->53449 53467 41ce34 28 API calls 53465->53467 53467->53468 53468->53450 53470 4020df 11 API calls 53469->53470 53471 412adf 53470->53471 53472 4020df 11 API calls 53471->53472 53473 412aeb 53472->53473 53474 4020df 11 API calls 53473->53474 53496 412af7 53474->53496 53475 401fd8 11 API calls 53475->53496 53476 41b978 43 API calls 53476->53496 53477 40d9e8 32 API calls 53477->53496 53478 40431d 28 API calls 53478->53496 53479 403014 28 API calls 53479->53496 53480 412c1d Sleep 53480->53496 53481 40417e 28 API calls 53481->53496 53482 418568 31 API calls 53482->53496 53483 412cbf Sleep 53483->53496 53484 4042fc 79 API calls 53484->53496 53485 401f09 11 API calls 53485->53496 53486 412d61 Sleep 53486->53496 53487 412dc4 DeleteFileW 53487->53496 53488 41c485 32 API calls 53488->53496 53489 412dfb DeleteFileW 53489->53496 53490 412e4d Sleep 53490->53496 53491 412e37 DeleteFileW 53491->53496 53492 412ec6 53493 401f09 11 API calls 53492->53493 53494 412ed2 53493->53494 53495 401f09 11 API calls 53494->53495 53497 412ede 53495->53497 53496->53475 53496->53476 53496->53477 53496->53478 53496->53479 53496->53480 53496->53481 53496->53482 53496->53483 53496->53484 53496->53485 53496->53486 53496->53487 53496->53488 53496->53489 53496->53490 53496->53491 53496->53492 53500 412e92 Sleep 53496->53500 53498 401f09 11 API calls 53497->53498 53499 412eea 53498->53499 53664 40b904 53499->53664 53682 401f09 53500->53682 53503 412efd 53505 4020f6 28 API calls 53503->53505 53504 401f09 11 API calls 53507 412ea2 53504->53507 53506 412f1d 53505->53506 53670 41322d 53506->53670 53507->53496 53507->53504 53508 412ec4 53507->53508 53508->53499 53511 401f09 11 API calls 53512 412f34 53511->53512 53513 412f54 53512->53513 53514 4130a8 53512->53514 53685 41bd1e 53513->53685 53515 41bd1e 28 API calls 53514->53515 53517 4130b1 53515->53517 53519 402f31 28 API calls 53517->53519 53521 4130e8 53519->53521 53523 402f10 28 API calls 53521->53523 53525 4130f7 53523->53525 53524 402f31 28 API calls 53526 412faa 53524->53526 53527 402f10 28 API calls 53525->53527 53528 402f10 28 API calls 53526->53528 53529 413103 53527->53529 53530 412fb9 53528->53530 53531 402f10 28 API calls 53529->53531 53532 402f10 28 API calls 53530->53532 53533 413112 53531->53533 53534 412fc8 53532->53534 53535 402f10 28 API calls 53533->53535 53536 402f10 28 API calls 53534->53536 53538 413121 53535->53538 53537 412fd7 53536->53537 53540 402f10 28 API calls 53537->53540 53539 402f10 28 API calls 53538->53539 53541 413130 53539->53541 53542 412fe6 53540->53542 53543 402f10 28 API calls 53541->53543 53544 402f10 28 API calls 53542->53544 53545 41313f 53543->53545 53546 412ff2 53544->53546 53547 402ea1 28 API calls 53545->53547 53548 402f10 28 API calls 53546->53548 53549 413149 53547->53549 53550 412ffe 53548->53550 53551 404aa1 61 API calls 53549->53551 53694 402ea1 53550->53694 53553 413156 53551->53553 53555 401fd8 11 API calls 53553->53555 53557 413162 53555->53557 53556 402f10 28 API calls 53558 413019 53556->53558 53559 401fd8 11 API calls 53557->53559 53560 402ea1 28 API calls 53558->53560 53561 41316e 53559->53561 53562 413023 53560->53562 53563 401fd8 11 API calls 53561->53563 53564 404aa1 61 API calls 53562->53564 53565 41317a 53563->53565 53566 413030 53564->53566 53567 401fd8 11 API calls 53565->53567 53568 401fd8 11 API calls 53566->53568 53570 413186 53567->53570 53569 413039 53568->53569 53572 401fd8 11 API calls 53569->53572 53571 401fd8 11 API calls 53570->53571 53573 41318f 53571->53573 53574 413042 53572->53574 53575 401fd8 11 API calls 53573->53575 53576 401fd8 11 API calls 53574->53576 53577 413198 53575->53577 53578 41304b 53576->53578 53579 401fd8 11 API calls 53577->53579 53580 401fd8 11 API calls 53578->53580 53581 41309c 53579->53581 53582 413054 53580->53582 53584 401fd8 11 API calls 53581->53584 53583 401fd8 11 API calls 53582->53583 53585 413060 53583->53585 53586 4131aa 53584->53586 53587 401fd8 11 API calls 53585->53587 53588 401f09 11 API calls 53586->53588 53589 41306c 53587->53589 53590 4131b6 53588->53590 53591 401fd8 11 API calls 53589->53591 53592 401fd8 11 API calls 53590->53592 53593 413078 53591->53593 53594 4131c2 53592->53594 53595 401fd8 11 API calls 53593->53595 53596 401fd8 11 API calls 53594->53596 53597 413084 53595->53597 53598 4131ce 53596->53598 53599 401fd8 11 API calls 53597->53599 53601 401fd8 11 API calls 53598->53601 53600 413090 53599->53600 53603 401fd8 11 API calls 53600->53603 53602 4131da 53601->53602 53604 401fd8 11 API calls 53602->53604 53603->53581 53605 4131e6 53604->53605 53606 401fd8 11 API calls 53605->53606 53607 4131f2 53606->53607 53608 401fd8 11 API calls 53607->53608 53609 4131fe 53608->53609 53610 401fd8 11 API calls 53609->53610 53611 41320a 53610->53611 53612 401fd8 11 API calls 53611->53612 53613 413216 53612->53613 53614 401fd8 11 API calls 53613->53614 53615 412a83 53614->53615 53615->53439 53617 402163 53616->53617 53621 40219f 53617->53621 53869 402730 11 API calls 53617->53869 53619 402184 53870 402712 11 API calls std::_Deallocate 53619->53870 53621->53411 53623 404243 53622->53623 53624 4023ce 11 API calls 53623->53624 53625 40424e 53624->53625 53626 402569 28 API calls 53625->53626 53627 4041b5 53626->53627 53627->53400 53629 41ce41 53628->53629 53630 41cea0 53629->53630 53634 41ce51 53629->53634 53631 41ceba 53630->53631 53632 41cfe0 28 API calls 53630->53632 53648 41d146 28 API calls 53631->53648 53632->53631 53635 41ce89 53634->53635 53639 41cfe0 53634->53639 53647 41d146 28 API calls 53635->53647 53636 41ce9c 53636->53449 53641 41cfe8 53639->53641 53640 41d01a 53640->53635 53641->53640 53642 41d01e 53641->53642 53645 41d002 53641->53645 53659 402725 22 API calls 53642->53659 53649 41d051 53645->53649 53647->53636 53648->53636 53650 41d05b __EH_prolog 53649->53650 53660 402717 22 API calls 53650->53660 53652 41d06e 53661 41d15d 11 API calls 53652->53661 53654 41d094 53655 41d0cc 53654->53655 53662 402730 11 API calls 53654->53662 53655->53640 53657 41d0b3 53663 402712 11 API calls std::_Deallocate 53657->53663 53660->53652 53661->53654 53662->53657 53663->53655 53665 40b90c 53664->53665 53703 402252 53665->53703 53667 40b917 53707 40b92c 53667->53707 53669 40b926 53669->53503 53671 41326b 53670->53671 53673 41323c 53670->53673 53672 41327a 53671->53672 53729 10001c5b 53671->53729 53737 40417e 53672->53737 53733 411cf2 53673->53733 53678 401fd8 11 API calls 53680 412f28 53678->53680 53680->53511 53683 402252 11 API calls 53682->53683 53684 401f12 53683->53684 53684->53507 53686 41bd2b 53685->53686 53687 4020b7 28 API calls 53686->53687 53688 412f60 53687->53688 53689 41bb8e 53688->53689 53859 441e81 53689->53859 53692 402093 28 API calls 53693 412f7a 53692->53693 53693->53524 53695 402eb0 53694->53695 53696 402ef2 53695->53696 53701 402ee7 53695->53701 53697 401fb0 28 API calls 53696->53697 53698 402ef0 53697->53698 53699 402055 11 API calls 53698->53699 53700 402f09 53699->53700 53700->53556 53868 403365 28 API calls 53701->53868 53704 4022ac 53703->53704 53705 40225c 53703->53705 53704->53667 53705->53704 53714 402779 11 API calls std::_Deallocate 53705->53714 53708 40b966 53707->53708 53709 40b938 53707->53709 53726 4028a4 22 API calls 53708->53726 53715 4027e6 53709->53715 53713 40b942 53713->53669 53714->53704 53716 4027ef 53715->53716 53717 402851 53716->53717 53718 4027f9 53716->53718 53728 4028a4 22 API calls 53717->53728 53721 402802 53718->53721 53723 402815 53718->53723 53727 402aea 28 API calls __EH_prolog 53721->53727 53724 402813 53723->53724 53725 402252 11 API calls 53723->53725 53724->53713 53725->53724 53727->53724 53730 10001c6b ___scrt_fastfail 53729->53730 53743 100012ee 53730->53743 53732 10001c87 53732->53672 53785 411cfe 53733->53785 53736 411f67 22 API calls _Yarn 53736->53671 53738 404186 53737->53738 53739 402252 11 API calls 53738->53739 53740 404191 53739->53740 53838 4041bc 53740->53838 53744 10001324 ___scrt_fastfail 53743->53744 53745 100013b7 GetEnvironmentVariableW 53744->53745 53769 100010f1 53745->53769 53748 100010f1 57 API calls 53749 10001465 53748->53749 53750 100010f1 57 API calls 53749->53750 53751 10001479 53750->53751 53752 100010f1 57 API calls 53751->53752 53753 1000148d 53752->53753 53754 100010f1 57 API calls 53753->53754 53755 100014a1 53754->53755 53756 100010f1 57 API calls 53755->53756 53757 100014b5 lstrlenW 53756->53757 53758 100014d9 lstrlenW 53757->53758 53768 100014d2 53757->53768 53759 100010f1 57 API calls 53758->53759 53760 10001501 lstrlenW lstrcatW 53759->53760 53761 100010f1 57 API calls 53760->53761 53762 10001539 lstrlenW lstrcatW 53761->53762 53763 100010f1 57 API calls 53762->53763 53764 1000156b lstrlenW lstrcatW 53763->53764 53765 100010f1 57 API calls 53764->53765 53766 1000159d lstrlenW lstrcatW 53765->53766 53767 100010f1 57 API calls 53766->53767 53767->53768 53768->53732 53770 10001118 ___scrt_fastfail 53769->53770 53771 10001129 lstrlenW 53770->53771 53782 10002c40 53771->53782 53773 10001148 lstrcatW lstrlenW 53774 10001177 lstrlenW FindFirstFileW 53773->53774 53775 10001168 lstrlenW 53773->53775 53776 100011a0 53774->53776 53777 100011e1 53774->53777 53775->53774 53778 100011c7 FindNextFileW 53776->53778 53779 100011aa 53776->53779 53777->53748 53778->53776 53781 100011da FindClose 53778->53781 53779->53778 53784 10001000 57 API calls ___scrt_fastfail 53779->53784 53781->53777 53783 10002c57 53782->53783 53783->53773 53783->53783 53784->53779 53818 41179c 53785->53818 53787 411d1c 53788 411d32 SetLastError 53787->53788 53789 41179c SetLastError 53787->53789 53796 411cfa 53787->53796 53788->53796 53790 411d4f 53789->53790 53790->53788 53792 411d71 GetNativeSystemInfo 53790->53792 53790->53796 53793 411db7 53792->53793 53805 411dc4 SetLastError 53793->53805 53821 411ca3 VirtualAlloc 53793->53821 53796->53736 53797 411de7 53798 411e0c GetProcessHeap HeapAlloc 53797->53798 53831 411ca3 VirtualAlloc 53797->53831 53800 411e23 53798->53800 53801 411e35 53798->53801 53832 411cba VirtualFree 53800->53832 53803 41179c SetLastError 53801->53803 53806 411e7e 53803->53806 53804 411dff 53804->53798 53804->53805 53805->53796 53807 411f30 53806->53807 53822 411ca3 VirtualAlloc 53806->53822 53833 412077 GetProcessHeap HeapFree 53807->53833 53810 411e97 _Yarn 53823 4117af SetLastError _Yarn ___scrt_get_show_window_mode 53810->53823 53812 411ec3 53812->53807 53824 411b5f 26 API calls 53812->53824 53814 411ef0 53814->53807 53825 41194f 53814->53825 53816 411efb 53816->53796 53816->53807 53817 411f25 SetLastError 53816->53817 53817->53807 53819 4117a0 SetLastError 53818->53819 53820 4117ab 53818->53820 53819->53787 53820->53787 53821->53797 53822->53810 53823->53812 53824->53814 53829 411975 53825->53829 53826 411a5e 53827 4118b2 VirtualProtect 53826->53827 53828 411a70 53827->53828 53828->53816 53829->53826 53829->53828 53834 4118b2 53829->53834 53831->53804 53832->53805 53833->53796 53835 4118c3 53834->53835 53837 4118bb 53834->53837 53836 411936 VirtualProtect 53835->53836 53835->53837 53836->53837 53837->53829 53839 4041c8 53838->53839 53842 4041d9 53839->53842 53841 40419c 53841->53678 53843 4041e9 53842->53843 53844 404206 53843->53844 53845 4041ef 53843->53845 53846 4027e6 28 API calls 53844->53846 53849 404267 53845->53849 53848 404204 53846->53848 53848->53841 53850 402888 22 API calls 53849->53850 53851 40427b 53850->53851 53852 404290 53851->53852 53853 4042a5 53851->53853 53854 4042df 22 API calls 53852->53854 53855 4027e6 28 API calls 53853->53855 53856 404299 53854->53856 53858 4042a3 53855->53858 53857 402c48 22 API calls 53856->53857 53857->53858 53858->53848 53860 441e8d 53859->53860 53863 441c7d 53860->53863 53862 41bbb2 53862->53692 53864 441c94 53863->53864 53865 441ccb _abort 53864->53865 53867 4405dd 20 API calls _abort 53864->53867 53865->53862 53867->53865 53868->53698 53869->53619 53870->53621 53871->53441 53873 4020f6 28 API calls 53872->53873 53874 415b0c SetEvent 53873->53874 53875 415b21 53874->53875 53876 4041a2 28 API calls 53875->53876 53877 415b3b 53876->53877 53878 4020f6 28 API calls 53877->53878 53879 415b4b 53878->53879 53880 4020f6 28 API calls 53879->53880 53881 415b5d 53880->53881 53882 41be1b 28 API calls 53881->53882 53883 415b66 53882->53883 53885 415b86 GetTickCount 53883->53885 53886 415ce5 53883->53886 53948 415cd6 53883->53948 53884 401e8d 11 API calls 53887 417092 53884->53887 53888 41bb8e 28 API calls 53885->53888 53886->53948 53949 415cf9 53886->53949 53889 401fd8 11 API calls 53887->53889 53890 415b97 53888->53890 53892 41709e 53889->53892 53951 41bae6 GetLastInputInfo GetTickCount 53890->53951 53894 401fd8 11 API calls 53892->53894 53896 4170aa 53894->53896 53895 415ba3 53897 41bb8e 28 API calls 53895->53897 53898 415bae 53897->53898 53952 41ba96 53898->53952 53901 41bd1e 28 API calls 53902 415bca 53901->53902 53903 401e65 28 API calls 53902->53903 53904 415bd8 53903->53904 53905 402f31 28 API calls 53904->53905 53906 415be6 53905->53906 53907 402ea1 28 API calls 53906->53907 53908 415bf5 53907->53908 53909 402f10 28 API calls 53908->53909 53910 415c04 53909->53910 53911 402ea1 28 API calls 53910->53911 53912 415c13 53911->53912 53913 402f10 28 API calls 53912->53913 53914 415c1f 53913->53914 53915 402ea1 28 API calls 53914->53915 53916 415c29 53915->53916 53917 404aa1 61 API calls 53916->53917 53918 415c38 53917->53918 53919 401fd8 11 API calls 53918->53919 53920 415c41 53919->53920 53921 401fd8 11 API calls 53920->53921 53922 415c4d 53921->53922 53923 401fd8 11 API calls 53922->53923 53924 415c59 53923->53924 53925 401fd8 11 API calls 53924->53925 53926 415c65 53925->53926 53927 401fd8 11 API calls 53926->53927 53928 415c71 53927->53928 53929 401fd8 11 API calls 53928->53929 53930 415c7d 53929->53930 53931 401f09 11 API calls 53930->53931 53932 415c86 53931->53932 53933 401fd8 11 API calls 53932->53933 53934 415c8f 53933->53934 53935 401fd8 11 API calls 53934->53935 53936 415c98 53935->53936 53937 401e65 28 API calls 53936->53937 53938 415ca3 53937->53938 53957 43baac 53938->53957 53941 415cb5 53944 415cc3 53941->53944 53945 415cce 53941->53945 53942 415cdb 53943 401e65 28 API calls 53942->53943 53943->53886 53961 404ff4 82 API calls 53944->53961 53962 404f51 53945->53962 53948->53884 53977 4050e4 84 API calls 53949->53977 53950 415cc9 53950->53948 53951->53895 53978 436e90 53952->53978 53955 40417e 28 API calls 53956 415bbc 53955->53956 53956->53901 53958 43bac5 _strftime 53957->53958 53980 43ae03 53958->53980 53960 415cb0 53960->53941 53960->53942 53961->53950 53963 404fea 53962->53963 53964 404f65 53962->53964 53963->53948 53965 404f6e 53964->53965 53966 404fc0 CreateEventA CreateThread 53964->53966 53967 404f7d GetLocalTime 53964->53967 53965->53966 53966->53963 54009 405150 53966->54009 53968 41bb8e 28 API calls 53967->53968 53969 404f91 53968->53969 54008 4052fd 28 API calls 53969->54008 53977->53950 53979 41bab5 GetForegroundWindow GetWindowTextW 53978->53979 53979->53955 53996 43ba0a 53980->53996 53982 43ae50 54002 43a7b7 36 API calls 3 library calls 53982->54002 53983 43ae15 53983->53982 53984 43ae2a 53983->53984 53995 43ae2f _abort 53983->53995 54001 4405dd 20 API calls _abort 53984->54001 53988 43ae5c 53989 43ae8b 53988->53989 54003 43ba4f 40 API calls __Tolower 53988->54003 53992 43aef7 53989->53992 54004 43b9b6 20 API calls 2 library calls 53989->54004 54005 43b9b6 20 API calls 2 library calls 53992->54005 53993 43afbe _strftime 53993->53995 54006 4405dd 20 API calls _abort 53993->54006 53995->53960 53997 43ba22 53996->53997 53998 43ba0f 53996->53998 53997->53983 54007 4405dd 20 API calls _abort 53998->54007 54000 43ba14 _abort 54000->53983 54001->53995 54002->53988 54003->53988 54004->53992 54005->53993 54006->53995 54007->54000 54012 40515c 102 API calls 54009->54012 54011 405159 54012->54011 54013->53384 54014->53389 54015->53391 54016 434887 54017 434893 ___scrt_is_nonwritable_in_current_image 54016->54017 54043 434596 54017->54043 54019 43489a 54021 4348c3 54019->54021 54341 4349f9 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 54019->54341 54024 434902 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 54021->54024 54342 444251 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 54021->54342 54023 4348dc 54026 4348e2 ___scrt_is_nonwritable_in_current_image 54023->54026 54343 4441f5 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 54023->54343 54027 434962 54024->54027 54344 4433e7 36 API calls 3 library calls 54024->54344 54054 434b14 54027->54054 54044 43459f 54043->54044 54349 434c52 IsProcessorFeaturePresent 54044->54349 54046 4345ab 54350 438f31 10 API calls 4 library calls 54046->54350 54048 4345b0 54053 4345b4 54048->54053 54351 4440bf IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 54048->54351 54050 4345bd 54051 4345cb 54050->54051 54352 438f5a 8 API calls 3 library calls 54050->54352 54051->54019 54053->54019 54055 436e90 ___scrt_get_show_window_mode 54054->54055 54056 434b27 GetStartupInfoW 54055->54056 54057 434968 54056->54057 54058 4441a2 54057->54058 54353 44f059 54058->54353 54060 4441ab 54061 434971 54060->54061 54357 446815 36 API calls 54060->54357 54063 40e9c5 54061->54063 54359 41cb50 LoadLibraryA GetProcAddress 54063->54359 54065 40e9e1 GetModuleFileNameW 54364 40f3c3 54065->54364 54067 40e9fd 54068 4020f6 28 API calls 54067->54068 54069 40ea0c 54068->54069 54070 4020f6 28 API calls 54069->54070 54071 40ea1b 54070->54071 54072 41be1b 28 API calls 54071->54072 54073 40ea24 54072->54073 54379 40fb17 54073->54379 54075 40ea2d 54076 401e8d 11 API calls 54075->54076 54077 40ea36 54076->54077 54078 40ea93 54077->54078 54079 40ea49 54077->54079 54080 401e65 28 API calls 54078->54080 54574 40fbb3 118 API calls 54079->54574 54082 40eaa3 54080->54082 54086 401e65 28 API calls 54082->54086 54083 40ea5b 54084 401e65 28 API calls 54083->54084 54085 40ea67 54084->54085 54575 410f37 36 API calls __EH_prolog 54085->54575 54087 40eac2 54086->54087 54089 40531e 28 API calls 54087->54089 54091 40ead1 54089->54091 54090 40ea79 54576 40fb64 78 API calls 54090->54576 54092 406383 28 API calls 54091->54092 54094 40eadd 54092->54094 54096 401fe2 28 API calls 54094->54096 54095 40ea82 54577 40f3b0 71 API calls 54095->54577 54098 40eae9 54096->54098 54099 401fd8 11 API calls 54098->54099 54100 40eaf2 54099->54100 54102 401fd8 11 API calls 54100->54102 54104 40eafb 54102->54104 54105 401e65 28 API calls 54104->54105 54106 40eb04 54105->54106 54107 401fc0 28 API calls 54106->54107 54108 40eb0f 54107->54108 54109 401e65 28 API calls 54108->54109 54110 40eb28 54109->54110 54111 401e65 28 API calls 54110->54111 54112 40eb43 54111->54112 54113 40ebae 54112->54113 54578 406c1e 54112->54578 54114 401e65 28 API calls 54113->54114 54120 40ebbb 54114->54120 54116 40eb70 54117 401fe2 28 API calls 54116->54117 54118 40eb7c 54117->54118 54121 401fd8 11 API calls 54118->54121 54119 40ec02 54383 40d069 54119->54383 54120->54119 54126 413549 3 API calls 54120->54126 54123 40eb85 54121->54123 54583 413549 RegOpenKeyExA 54123->54583 54132 40ebe6 54126->54132 54130 40f34f 54676 4139a9 30 API calls 54130->54676 54132->54119 54586 4139a9 30 API calls 54132->54586 54140 40f365 54677 412475 65 API calls ___scrt_get_show_window_mode 54140->54677 54341->54019 54342->54023 54343->54024 54344->54027 54349->54046 54350->54048 54351->54050 54352->54053 54354 44f06b 54353->54354 54355 44f062 54353->54355 54354->54060 54358 44ef58 49 API calls 5 library calls 54355->54358 54357->54060 54358->54354 54360 41cb8f LoadLibraryA GetProcAddress 54359->54360 54361 41cb7f GetModuleHandleA GetProcAddress 54359->54361 54362 41cbb8 44 API calls 54360->54362 54363 41cba8 LoadLibraryA GetProcAddress 54360->54363 54361->54360 54362->54065 54363->54362 54678 41b4a8 FindResourceA 54364->54678 54367 43bd51 _Yarn 21 API calls 54368 40f3ed _Yarn 54367->54368 54369 4020b7 28 API calls 54368->54369 54370 40f408 54369->54370 54371 401fe2 28 API calls 54370->54371 54372 40f413 54371->54372 54373 401fd8 11 API calls 54372->54373 54374 40f41c 54373->54374 54375 43bd51 _Yarn 21 API calls 54374->54375 54376 40f42d _Yarn 54375->54376 54681 406dd8 54376->54681 54378 40f460 54378->54067 54380 40fb23 54379->54380 54382 40fb2a 54379->54382 54684 402163 11 API calls 54380->54684 54382->54075 54685 401fab 54383->54685 54574->54083 54575->54090 54576->54095 54579 4020df 11 API calls 54578->54579 54580 406c2a 54579->54580 54581 4032a0 28 API calls 54580->54581 54582 406c47 54581->54582 54582->54116 54584 40eba4 54583->54584 54585 413573 RegQueryValueExA RegCloseKey 54583->54585 54584->54113 54584->54130 54585->54584 54586->54119 54676->54140 54679 41b4c5 LoadResource LockResource SizeofResource 54678->54679 54680 40f3de 54678->54680 54679->54680 54680->54367 54682 4020b7 28 API calls 54681->54682 54683 406dec 54682->54683 54683->54378 54684->54382 55004 4269e6 55005 4269fb 55004->55005 55010 426a8d 55004->55010 55006 426a48 55005->55006 55007 426b44 55005->55007 55008 426abd 55005->55008 55009 426b1d 55005->55009 55005->55010 55014 426af2 55005->55014 55017 426a7d 55005->55017 55032 424edd 49 API calls _Yarn 55005->55032 55006->55010 55006->55017 55033 41fb6c 52 API calls 55006->55033 55007->55010 55037 426155 28 API calls 55007->55037 55008->55010 55008->55014 55035 41fb6c 52 API calls 55008->55035 55009->55007 55009->55010 55020 425ae1 55009->55020 55014->55009 55036 4256f0 21 API calls 55014->55036 55017->55008 55017->55010 55034 424edd 49 API calls _Yarn 55017->55034 55023 425b00 ___scrt_get_show_window_mode 55020->55023 55021 425b0f 55022 425b34 55021->55022 55031 425b14 55021->55031 55039 4205d8 46 API calls 55021->55039 55022->55007 55023->55021 55023->55022 55038 41ebbb 21 API calls 55023->55038 55027 425b1d 55027->55022 55046 424d05 21 API calls 2 library calls 55027->55046 55029 425bb7 55029->55022 55040 432ec4 55029->55040 55031->55022 55031->55027 55045 41da5f 49 API calls 55031->55045 55032->55006 55033->55006 55034->55008 55035->55008 55036->55009 55037->55010 55038->55021 55039->55029 55041 432ed2 55040->55041 55042 432ece 55040->55042 55043 43bd51 _Yarn 21 API calls 55041->55043 55042->55031 55044 432ed7 55043->55044 55044->55031 55045->55027 55046->55022 55047 415d06 55062 41b380 55047->55062 55049 415d0f 55050 4020f6 28 API calls 55049->55050 55051 415d1e 55050->55051 55052 404aa1 61 API calls 55051->55052 55053 415d2a 55052->55053 55054 417089 55053->55054 55055 401fd8 11 API calls 55053->55055 55056 401e8d 11 API calls 55054->55056 55055->55054 55057 417092 55056->55057 55058 401fd8 11 API calls 55057->55058 55059 41709e 55058->55059 55060 401fd8 11 API calls 55059->55060 55061 4170aa 55060->55061 55063 4020df 11 API calls 55062->55063 55064 41b38e 55063->55064 55065 43bd51 _Yarn 21 API calls 55064->55065 55066 41b39e InternetOpenW InternetOpenUrlW 55065->55066 55067 41b3c5 InternetReadFile 55066->55067 55068 41b3e8 55067->55068 55068->55067 55069 41b415 InternetCloseHandle InternetCloseHandle 55068->55069 55070 4020b7 28 API calls 55068->55070 55072 401fd8 11 API calls 55068->55072 55071 41b427 55069->55071 55070->55068 55071->55049 55072->55068 55073 1000c7a7 55074 1000c7be 55073->55074 55079 1000c82c 55073->55079 55074->55079 55085 1000c7e6 GetModuleHandleA 55074->55085 55075 1000c872 55076 1000c835 GetModuleHandleA 55080 1000c83f 55076->55080 55079->55075 55079->55076 55079->55080 55080->55079 55081 1000c85f GetProcAddress 55080->55081 55081->55079 55086 1000c7ef 55085->55086 55092 1000c82c 55085->55092 55097 1000c803 GetProcAddress 55086->55097 55088 1000c872 55089 1000c835 GetModuleHandleA 55095 1000c83f 55089->55095 55092->55088 55092->55089 55092->55095 55095->55092 55096 1000c85f GetProcAddress 55095->55096 55096->55092 55098 1000c82c 55097->55098 55099 1000c80d VirtualProtect 55097->55099 55101 1000c872 55098->55101 55102 1000c835 GetModuleHandleA 55098->55102 55099->55098 55100 1000c81c VirtualProtect 55099->55100 55100->55098 55104 1000c83f 55102->55104 55103 1000c85f GetProcAddress 55103->55104 55104->55098 55104->55103 55105 426c4b 55110 426cc8 send 55105->55110 55111 416f0d 55136 4063be 55111->55136 55114 401e65 28 API calls 55115 416f21 55114->55115 55116 401e65 28 API calls 55115->55116 55117 416f2e 55116->55117 55118 402f31 28 API calls 55117->55118 55119 416f39 55118->55119 55120 402f10 28 API calls 55119->55120 55121 416f45 55120->55121 55289 406866 55121->55289 55137 4020df 11 API calls 55136->55137 55138 4063d6 55137->55138 55139 4020df 11 API calls 55138->55139 55140 4063e2 55139->55140 55141 4020df 11 API calls 55140->55141 55142 4063ee 55141->55142 55143 4020df 11 API calls 55142->55143 55144 4063fa 55143->55144 55145 4020df 11 API calls 55144->55145 55146 406403 55145->55146 55147 4020df 11 API calls 55146->55147 55148 40640f 55147->55148 55149 4020df 11 API calls 55148->55149 55150 40641b 55149->55150 55151 4020df 11 API calls 55150->55151 55152 406424 55151->55152 55306 40c34d 55152->55306 55166 406472 55442 41c485 CreateFileW 55166->55442 55168 40648c 55169 41c485 32 API calls 55168->55169 55170 4064a6 55169->55170 55171 406546 55170->55171 55172 401e65 28 API calls 55170->55172 55177 41c485 32 API calls 55170->55177 55181 406c1e 28 API calls 55170->55181 55192 401fe2 28 API calls 55170->55192 55195 401fd8 11 API calls 55170->55195 55487 4132a4 40 API calls 55170->55487 55173 4065a2 55171->55173 55175 401e65 28 API calls 55171->55175 55182 41c485 32 API calls 55171->55182 55185 406c1e 28 API calls 55171->55185 55191 401fd8 11 API calls 55171->55191 55172->55170 55450 4068e8 55173->55450 55175->55171 55177->55170 55180 401fe2 28 API calls 55183 4065ca 55180->55183 55181->55170 55182->55171 55184 401fd8 11 API calls 55183->55184 55186 4065d3 55184->55186 55185->55171 55188 401fd8 11 API calls 55186->55188 55189 4065dc 55188->55189 55190 4068e8 32 API calls 55189->55190 55193 4065ec 55190->55193 55191->55171 55192->55170 55194 406991 31 API calls 55193->55194 55196 4065f7 55194->55196 55195->55170 55197 401fe2 28 API calls 55196->55197 55198 406604 55197->55198 55199 401fd8 11 API calls 55198->55199 55200 40660d 55199->55200 55201 401fd8 11 API calls 55200->55201 55202 406616 55201->55202 55203 4068e8 32 API calls 55202->55203 55204 406626 55203->55204 55205 406991 31 API calls 55204->55205 55206 406631 55205->55206 55207 401fe2 28 API calls 55206->55207 55208 40663b 55207->55208 55209 401fd8 11 API calls 55208->55209 55210 406644 55209->55210 55211 401fd8 11 API calls 55210->55211 55212 40664d 55211->55212 55213 402f31 28 API calls 55212->55213 55214 406698 55213->55214 55215 402f10 28 API calls 55214->55215 55216 4066a7 55215->55216 55217 402f10 28 API calls 55216->55217 55218 4066b6 55217->55218 55219 402f10 28 API calls 55218->55219 55220 4066c5 55219->55220 55221 402f10 28 API calls 55220->55221 55222 4066d4 55221->55222 55223 402f10 28 API calls 55222->55223 55224 4066e3 55223->55224 55225 402f10 28 API calls 55224->55225 55226 4066f2 55225->55226 55227 402f10 28 API calls 55226->55227 55228 406701 55227->55228 55229 402f10 28 API calls 55228->55229 55230 406710 55229->55230 55231 402f10 28 API calls 55230->55231 55232 40671c 55231->55232 55233 402f10 28 API calls 55232->55233 55234 406728 55233->55234 55235 402f10 28 API calls 55234->55235 55236 406732 55235->55236 55237 401fd8 11 API calls 55236->55237 55238 40673c 55237->55238 55239 401fd8 11 API calls 55238->55239 55240 406745 55239->55240 55241 401fd8 11 API calls 55240->55241 55242 406751 55241->55242 55243 401fd8 11 API calls 55242->55243 55244 40675d 55243->55244 55245 401fd8 11 API calls 55244->55245 55246 406769 55245->55246 55247 401fd8 11 API calls 55246->55247 55248 406775 55247->55248 55249 401fd8 11 API calls 55248->55249 55250 406781 55249->55250 55251 401fd8 11 API calls 55250->55251 55252 40678d 55251->55252 55253 401fd8 11 API calls 55252->55253 55254 406799 55253->55254 55255 401fd8 11 API calls 55254->55255 55256 4067a5 55255->55256 55257 401fd8 11 API calls 55256->55257 55258 4067b1 55257->55258 55259 401f09 11 API calls 55258->55259 55260 4067bd 55259->55260 55261 401f09 11 API calls 55260->55261 55262 4067c9 55261->55262 55263 401f09 11 API calls 55262->55263 55264 4067d5 55263->55264 55265 401f09 11 API calls 55264->55265 55266 4067e1 55265->55266 55481 406adc 55266->55481 55269 406adc 11 API calls 55270 4067f3 55269->55270 55271 401f09 11 API calls 55270->55271 55272 4067ff 55271->55272 55273 401fd8 11 API calls 55272->55273 55274 406808 55273->55274 55275 401fd8 11 API calls 55274->55275 55276 406814 55275->55276 55277 401fd8 11 API calls 55276->55277 55278 406820 55277->55278 55279 401fd8 11 API calls 55278->55279 55280 406829 55279->55280 55281 401fd8 11 API calls 55280->55281 55282 406835 55281->55282 55283 401fd8 11 API calls 55282->55283 55284 406841 55283->55284 55285 401fd8 11 API calls 55284->55285 55286 40684d 55285->55286 55287 401fd8 11 API calls 55286->55287 55288 406859 55287->55288 55288->55114 55569 4046f7 55289->55569 55292 4048c8 97 API calls 55293 40688f 55292->55293 55294 402f31 28 API calls 55293->55294 55295 4068a4 55294->55295 55296 402f10 28 API calls 55295->55296 55297 4068ae 55296->55297 55298 404aa1 61 API calls 55297->55298 55299 4068bf 55298->55299 55300 401fd8 11 API calls 55299->55300 55301 4068c9 55300->55301 55302 404e26 99 API calls 55301->55302 55303 4068d4 55302->55303 55576 404ee2 99 API calls 55303->55576 55307 40c364 55306->55307 55308 40417e 28 API calls 55307->55308 55309 40c36e 55308->55309 55310 40915b 28 API calls 55309->55310 55311 40c392 55310->55311 55312 40c39a FindFirstFileW 55311->55312 55313 401f09 11 API calls 55312->55313 55314 40c3ab 55313->55314 55315 40c3b0 55314->55315 55316 40c3c1 55314->55316 55317 40417e 28 API calls 55315->55317 55318 4020df 11 API calls 55316->55318 55319 40c3bc 55317->55319 55333 40c3c9 55318->55333 55322 401f09 11 API calls 55319->55322 55320 40c466 FindNextFileW 55321 40c47c FindClose 55320->55321 55320->55333 55323 40417e 28 API calls 55321->55323 55324 406430 55322->55324 55325 40c48f 55323->55325 55338 40c5ec 55324->55338 55326 401fd8 11 API calls 55325->55326 55326->55319 55327 40417e 28 API calls 55327->55333 55328 40915b 28 API calls 55328->55333 55329 402fa5 28 API calls 55329->55333 55330 401f09 11 API calls 55330->55333 55331 40c453 PathFileExistsW 55332 40c4a7 FindClose 55331->55332 55331->55333 55335 403262 11 API calls 55332->55335 55333->55320 55333->55327 55333->55328 55333->55329 55333->55330 55333->55331 55334 401f09 11 API calls 55333->55334 55334->55320 55336 40c4b9 55335->55336 55337 401f09 11 API calls 55336->55337 55337->55325 55339 40c5fb 55338->55339 55488 40c4c3 55339->55488 55342 40915b 28 API calls 55343 40c613 55342->55343 55344 40c61c PathFileExistsW 55343->55344 55345 40c627 55344->55345 55352 40c632 55344->55352 55509 40c916 28 API calls 55345->55509 55347 40915b 28 API calls 55347->55352 55348 401f13 28 API calls 55348->55352 55351 401f09 11 API calls 55351->55352 55352->55347 55352->55348 55352->55351 55353 40c687 PathFileExistsW 55352->55353 55355 40c6a3 55352->55355 55500 41bc07 55352->55500 55506 40c9bf 55352->55506 55510 40c916 28 API calls 55352->55510 55353->55352 55356 401f09 11 API calls 55355->55356 55357 40c6ab 55356->55357 55358 401f09 11 API calls 55357->55358 55359 406439 55358->55359 55360 40c6bb 55359->55360 55361 40c6ca 55360->55361 55532 40c526 55361->55532 55364 40915b 28 API calls 55365 40c6e2 55364->55365 55366 40c6eb PathFileExistsW 55365->55366 55367 40c6f6 55366->55367 55374 40c701 55366->55374 55544 40c916 28 API calls 55367->55544 55369 40915b 28 API calls 55369->55374 55370 401f13 28 API calls 55370->55374 55371 401f09 11 API calls 55371->55374 55372 41bc07 28 API calls 55372->55374 55373 40c9bf 28 API calls 55373->55374 55374->55369 55374->55370 55374->55371 55374->55372 55374->55373 55375 40c756 PathFileExistsW 55374->55375 55377 40c772 55374->55377 55545 40c916 28 API calls 55374->55545 55375->55374 55378 401f09 11 API calls 55377->55378 55379 40c77a 55378->55379 55380 401f09 11 API calls 55379->55380 55381 406442 55380->55381 55382 40c78a 55381->55382 55546 40c589 55382->55546 55385 40915b 28 API calls 55386 40c7ab 55385->55386 55387 40c7b4 PathFileExistsW 55386->55387 55388 40c7c1 55387->55388 55389 40c7cc 55387->55389 55390 403262 11 API calls 55388->55390 55391 40417e 28 API calls 55389->55391 55392 40c7ca 55390->55392 55391->55392 55393 401f09 11 API calls 55392->55393 55394 40c7de 55393->55394 55395 401f09 11 API calls 55394->55395 55396 40644e 55395->55396 55397 40c7ed 55396->55397 55398 40c4c3 29 API calls 55397->55398 55399 40c7fe 55398->55399 55400 40915b 28 API calls 55399->55400 55401 40c80e 55400->55401 55402 40c817 PathFileExistsW 55401->55402 55403 40c824 55402->55403 55404 40c82f 55402->55404 55405 403262 11 API calls 55403->55405 55406 40417e 28 API calls 55404->55406 55407 40c82d 55405->55407 55406->55407 55408 401f09 11 API calls 55407->55408 55409 40c841 55408->55409 55410 401f09 11 API calls 55409->55410 55411 40645a 55410->55411 55412 40c850 55411->55412 55413 40c526 29 API calls 55412->55413 55414 40c861 55413->55414 55415 40915b 28 API calls 55414->55415 55416 40c871 55415->55416 55417 40c87a PathFileExistsW 55416->55417 55418 40c892 55417->55418 55419 40c887 55417->55419 55420 40417e 28 API calls 55418->55420 55421 403262 11 API calls 55419->55421 55422 40c890 55420->55422 55421->55422 55423 401f09 11 API calls 55422->55423 55424 40c8a4 55423->55424 55425 401f09 11 API calls 55424->55425 55426 406466 55425->55426 55427 40c8b3 55426->55427 55428 40c589 29 API calls 55427->55428 55429 40c8c4 55428->55429 55430 40915b 28 API calls 55429->55430 55431 40c8d4 55430->55431 55432 40c8dd PathFileExistsW 55431->55432 55433 40c8f5 55432->55433 55434 40c8ea 55432->55434 55436 40417e 28 API calls 55433->55436 55435 403262 11 API calls 55434->55435 55437 40c8f3 55435->55437 55436->55437 55438 401f09 11 API calls 55437->55438 55439 40c907 55438->55439 55440 401f09 11 API calls 55439->55440 55441 40c90f 55440->55441 55441->55166 55443 41c4af GetFileSize 55442->55443 55445 41c4ab 55442->55445 55558 40244e 55443->55558 55445->55168 55446 41c4c3 55447 41c4d5 ReadFile 55446->55447 55448 41c4e2 55447->55448 55449 41c4e4 CloseHandle 55447->55449 55448->55449 55449->55445 55451 4020df 11 API calls 55450->55451 55452 4068fc 55451->55452 55453 41c485 32 API calls 55452->55453 55454 40690d 55453->55454 55455 406911 55454->55455 55456 40691f 55454->55456 55457 402093 28 API calls 55455->55457 55458 402093 28 API calls 55456->55458 55459 40691d 55457->55459 55462 40692c 55458->55462 55460 401fd8 11 API calls 55459->55460 55461 4065b2 55460->55461 55469 406991 55461->55469 55463 40696d 55462->55463 55464 40695e 55462->55464 55465 402093 28 API calls 55463->55465 55466 4041a2 28 API calls 55464->55466 55467 40696b 55465->55467 55466->55467 55468 401fd8 11 API calls 55467->55468 55468->55459 55470 4069a1 55469->55470 55471 4069a5 55470->55471 55472 4069b6 55470->55472 55473 402093 28 API calls 55471->55473 55563 406a63 55472->55563 55474 4065bd 55473->55474 55474->55180 55476 406a2b ctype 55477 406a42 55476->55477 55478 406a4f 55476->55478 55479 4020b7 28 API calls 55477->55479 55480 402093 28 API calls 55478->55480 55479->55474 55480->55474 55482 406b34 55481->55482 55486 4067ea 55482->55486 55567 406c0c 11 API calls 55482->55567 55484 406b55 55568 402712 11 API calls std::_Deallocate 55484->55568 55486->55269 55487->55170 55489 40c4d6 55488->55489 55490 40417e 28 API calls 55489->55490 55491 40c4e0 55490->55491 55492 40c4f5 PathFileExistsW 55491->55492 55493 40c502 55492->55493 55494 40c50d 55492->55494 55495 403262 11 API calls 55493->55495 55496 40417e 28 API calls 55494->55496 55497 40c50b 55495->55497 55496->55497 55498 401f09 11 API calls 55497->55498 55499 40c51f 55498->55499 55499->55342 55501 41bc20 ___scrt_get_show_window_mode 55500->55501 55511 441eb8 55501->55511 55504 40417e 28 API calls 55505 41bc3a 55504->55505 55505->55352 55520 403969 55506->55520 55508 40c9d2 55508->55352 55509->55352 55510->55352 55512 441ec4 55511->55512 55515 441cf2 55512->55515 55514 41bc2c 55514->55504 55516 441d09 55515->55516 55518 441d4d _abort 55516->55518 55519 4405dd 20 API calls _abort 55516->55519 55518->55514 55519->55518 55521 402888 22 API calls 55520->55521 55522 40397b 55521->55522 55523 402888 22 API calls 55522->55523 55524 403989 55523->55524 55525 403bc3 55524->55525 55526 4039ca 55524->55526 55531 4028a4 22 API calls 55525->55531 55529 4027e6 28 API calls 55526->55529 55530 4039fb 55526->55530 55529->55530 55530->55508 55533 40c539 55532->55533 55534 40417e 28 API calls 55533->55534 55535 40c543 55534->55535 55536 40c558 PathFileExistsW 55535->55536 55537 40c570 55536->55537 55538 40c565 55536->55538 55539 40417e 28 API calls 55537->55539 55540 403262 11 API calls 55538->55540 55541 40c56e 55539->55541 55540->55541 55542 401f09 11 API calls 55541->55542 55543 40c582 55542->55543 55543->55364 55544->55374 55545->55374 55547 40c59c 55546->55547 55548 40417e 28 API calls 55547->55548 55549 40c5a6 55548->55549 55550 40c5bb PathFileExistsW 55549->55550 55551 40c5d3 55550->55551 55552 40c5c8 55550->55552 55554 40417e 28 API calls 55551->55554 55553 403262 11 API calls 55552->55553 55555 40c5d1 55553->55555 55554->55555 55556 401f09 11 API calls 55555->55556 55557 40c5e5 55556->55557 55557->55385 55559 402456 55558->55559 55561 402460 55559->55561 55562 402a51 28 API calls 55559->55562 55561->55446 55562->55561 55564 406a94 CryptUnprotectData 55563->55564 55565 406a78 LoadLibraryA GetProcAddress 55563->55565 55566 406aa9 55564->55566 55565->55564 55566->55476 55567->55484 55568->55486 55570 4020df 11 API calls 55569->55570 55571 404707 55570->55571 55572 4020df 11 API calls 55571->55572 55573 40471e 55572->55573 55574 404736 55573->55574 55575 40482d 3 API calls 55573->55575 55574->55292 55575->55574 55577 42f8ed 55578 42f8f8 55577->55578 55580 42f90c 55578->55580 55581 432eee 55578->55581 55582 432efd 55581->55582 55584 432ef9 55581->55584 55585 440f0d 55582->55585 55584->55580 55586 446185 55585->55586 55587 446192 55586->55587 55588 44619d 55586->55588 55598 446137 55587->55598 55590 4461a5 55588->55590 55597 4461ae ___crtLCMapStringA 55588->55597 55605 446782 55590->55605 55592 4461b3 55611 4405dd 20 API calls _abort 55592->55611 55593 4461d8 HeapReAlloc 55595 44619a 55593->55595 55593->55597 55595->55584 55597->55592 55597->55593 55612 442f80 7 API calls 2 library calls 55597->55612 55599 446175 55598->55599 55600 446145 ___crtLCMapStringA 55598->55600 55614 4405dd 20 API calls _abort 55599->55614 55600->55599 55602 446160 RtlAllocateHeap 55600->55602 55613 442f80 7 API calls 2 library calls 55600->55613 55602->55600 55603 446173 55602->55603 55603->55595 55606 44678d RtlFreeHeap 55605->55606 55610 4467b6 __dosmaperr 55605->55610 55607 4467a2 55606->55607 55606->55610 55615 4405dd 20 API calls _abort 55607->55615 55609 4467a8 GetLastError 55609->55610 55610->55595 55611->55595 55612->55597 55613->55600 55614->55603 55615->55609 55616 416411 55617 401e65 28 API calls 55616->55617 55618 416421 55617->55618 55619 4020f6 28 API calls 55618->55619 55620 41642c 55619->55620 55621 401e65 28 API calls 55620->55621 55622 416437 55621->55622 55623 4020f6 28 API calls 55622->55623 55624 416442 55623->55624 55633 40aa93 55624->55633 55634 4046f7 14 API calls 55633->55634 55635 40aaad 55634->55635 55636 40482d 3 API calls 55635->55636 55637 40aab8 55636->55637 55638 4048c8 97 API calls 55637->55638 55639 40aac4 55638->55639 55640 40ac57 55639->55640 55641 4020df 11 API calls 55639->55641 55642 402f31 28 API calls 55640->55642 55643 40aadc 55641->55643 55644 40ac70 55642->55644 55647 41c485 32 API calls 55643->55647 55645 402f10 28 API calls 55644->55645 55646 40ac7a 55645->55646 55648 404aa1 61 API calls 55646->55648 55649 40aaee 55647->55649 55650 40ac88 55648->55650 55651 40aaf6 55649->55651 55652 40ac4f 55649->55652 55653 401fd8 11 API calls 55650->55653 55656 401e65 28 API calls 55651->55656 55655 401fd8 11 API calls 55652->55655 55654 40ac90 55653->55654 55657 404e26 99 API calls 55654->55657 55655->55640 55658 40ab02 55656->55658 55659 40ac9b 55657->55659 55660 40abbd 55658->55660 55666 40ab12 55658->55666 55661 40acac 55659->55661 55705 40ac4d 55659->55705 55662 402f31 28 API calls 55660->55662 55711 40b869 DeleteFileW RemoveDirectoryW 55661->55711 55665 40abdc 55662->55665 55668 402f10 28 API calls 55665->55668 55681 406dd8 28 API calls 55666->55681 55670 40abe7 55668->55670 55671 402f10 28 API calls 55670->55671 55673 40abf2 55671->55673 55675 402f10 28 API calls 55673->55675 55677 40abfc 55675->55677 55678 404aa1 61 API calls 55677->55678 55679 40ac0a 55678->55679 55680 401fd8 11 API calls 55679->55680 55682 40ac12 55680->55682 55683 40ab53 55681->55683 55684 401fd8 11 API calls 55682->55684 55685 402f31 28 API calls 55683->55685 55686 40abb8 55684->55686 55687 40ab72 55685->55687 55689 401fd8 11 API calls 55686->55689 55688 402f10 28 API calls 55687->55688 55690 40ab7d 55688->55690 55691 40ac22 55689->55691 55692 402f10 28 API calls 55690->55692 55694 404e26 99 API calls 55691->55694 55693 40ab88 55692->55693 55695 402f10 28 API calls 55693->55695 55696 40ac2d 55694->55696 55697 40ab92 55695->55697 55699 40ac45 55696->55699 55700 40ac3e 55696->55700 55698 404aa1 61 API calls 55697->55698 55701 40aba0 55698->55701 55703 401fd8 11 API calls 55699->55703 55710 40b869 DeleteFileW RemoveDirectoryW 55700->55710 55704 401fd8 11 API calls 55701->55704 55703->55705 55706 40aba8 55704->55706 55712 404ee2 99 API calls 55705->55712 55707 401fd8 11 API calls 55706->55707 55708 40abb0 55707->55708 55709 401fd8 11 API calls 55708->55709 55709->55686 55710->55699 55711->55705 55713 43be58 55716 43be64 _swprintf ___scrt_is_nonwritable_in_current_image 55713->55716 55714 43be72 55729 4405dd 20 API calls _abort 55714->55729 55716->55714 55718 43be9c 55716->55718 55717 43be77 ___scrt_is_nonwritable_in_current_image _abort 55724 445888 EnterCriticalSection 55718->55724 55720 43bea7 55725 43bf48 55720->55725 55724->55720 55726 43bf56 55725->55726 55728 43beb2 55726->55728 55731 44976c 37 API calls 2 library calls 55726->55731 55730 43becf LeaveCriticalSection std::_Lockit::~_Lockit 55728->55730 55729->55717 55730->55717 55731->55726 55732 41dfbd 55733 41dfd2 _Yarn ___scrt_get_show_window_mode 55732->55733 55735 432ec4 21 API calls 55733->55735 55745 41e1d5 55733->55745 55738 41e182 ___scrt_get_show_window_mode 55735->55738 55736 41e1e6 55737 432ec4 21 API calls 55736->55737 55743 41e189 55736->55743 55739 41e21f ___scrt_get_show_window_mode 55737->55739 55740 432ec4 21 API calls 55738->55740 55738->55743 55739->55743 55747 43354a 55739->55747 55741 41e1af ___scrt_get_show_window_mode 55740->55741 55741->55743 55744 432ec4 21 API calls 55741->55744 55744->55745 55745->55743 55746 41db62 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_get_show_window_mode 55745->55746 55746->55736 55750 433469 55747->55750 55749 433552 55749->55743 55751 433482 55750->55751 55754 433478 55750->55754 55752 432ec4 21 API calls 55751->55752 55751->55754 55753 4334a3 55752->55753 55753->55754 55756 433837 CryptAcquireContextA 55753->55756 55754->55749 55757 433858 CryptGenRandom 55756->55757 55759 433853 55756->55759 55758 43386d CryptReleaseContext 55757->55758 55757->55759 55758->55759 55759->55754 55760 40165e 55761 401666 55760->55761 55762 401669 55760->55762 55763 4016a8 55762->55763 55766 401696 55762->55766 55764 4344ea new 22 API calls 55763->55764 55765 40169c 55764->55765 55767 4344ea new 22 API calls 55766->55767 55767->55765 55768 426bdc 55774 426cb1 recv 55768->55774

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB65
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CB6E
                                                                            • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB85
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CB88
                                                                            • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CB9A
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CB9D
                                                                            • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CBAE
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CBB1
                                                                            • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040E9E1), ref: 0041CBC3
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CBC6
                                                                            • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040E9E1), ref: 0041CBD2
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CBD5
                                                                            • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040E9E1), ref: 0041CBE6
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CBE9
                                                                            • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040E9E1), ref: 0041CBFA
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CBFD
                                                                            • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040E9E1), ref: 0041CC0E
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CC11
                                                                            • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040E9E1), ref: 0041CC22
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CC25
                                                                            • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040E9E1), ref: 0041CC36
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CC39
                                                                            • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040E9E1), ref: 0041CC4A
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CC4D
                                                                            • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040E9E1), ref: 0041CC5E
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CC61
                                                                            • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040E9E1), ref: 0041CC72
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CC75
                                                                            • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040E9E1), ref: 0041CC83
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CC86
                                                                            • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040E9E1), ref: 0041CC97
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CC9A
                                                                            • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040E9E1), ref: 0041CCA7
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CCAA
                                                                            • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040E9E1), ref: 0041CCB7
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CCBA
                                                                            • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040E9E1), ref: 0041CCCC
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CCCF
                                                                            • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040E9E1), ref: 0041CCDC
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CCDF
                                                                            • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040E9E1), ref: 0041CCF0
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CCF3
                                                                            • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040E9E1), ref: 0041CD04
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CD07
                                                                            • LoadLibraryA.KERNEL32(Rstrtmgr,RmStartSession,?,?,?,?,0040E9E1), ref: 0041CD19
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CD1C
                                                                            • LoadLibraryA.KERNEL32(Rstrtmgr,RmRegisterResources,?,?,?,?,0040E9E1), ref: 0041CD29
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CD2C
                                                                            • LoadLibraryA.KERNEL32(Rstrtmgr,RmGetList,?,?,?,?,0040E9E1), ref: 0041CD39
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CD3C
                                                                            • LoadLibraryA.KERNEL32(Rstrtmgr,RmEndSession,?,?,?,?,0040E9E1), ref: 0041CD49
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041CD4C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AddressProc$LibraryLoad$HandleModule
                                                                            • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                                                            • API String ID: 4236061018-3687161714
                                                                            • Opcode ID: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
                                                                            • Instruction ID: 43d5c3d51f8f0173c8b3474e0c84bdc355f07b7b5b23ff39ae26555794408ecb
                                                                            • Opcode Fuzzy Hash: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
                                                                            • Instruction Fuzzy Hash: 31419EA0EC035879DA107BB66DCDE3B3E5CD9857953214837B15CA7150EBBCD8408EAE

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 5 40e9c5-40ea47 call 41cb50 GetModuleFileNameW call 40f3c3 call 4020f6 * 2 call 41be1b call 40fb17 call 401e8d call 43fd00 22 40ea93-40eb5b call 401e65 call 401fab call 401e65 call 40531e call 406383 call 401fe2 call 401fd8 * 2 call 401e65 call 401fc0 call 405aa6 call 401e65 call 4051e3 call 401e65 call 4051e3 5->22 23 40ea49-40ea8e call 40fbb3 call 401e65 call 401fab call 410f37 call 40fb64 call 40f3b0 5->23 69 40eb5d-40eba8 call 406c1e call 401fe2 call 401fd8 call 401fab call 413549 22->69 70 40ebae-40ebc9 call 401e65 call 40b9bd 22->70 49 40eef2-40ef03 call 401fd8 23->49 69->70 100 40f34f-40f36a call 401fab call 4139a9 call 412475 69->100 79 40ec03-40ec0a call 40d069 70->79 80 40ebcb-40ebea call 401fab call 413549 70->80 88 40ec13-40ec1a 79->88 89 40ec0c-40ec0e 79->89 80->79 99 40ebec-40ec02 call 401fab call 4139a9 80->99 93 40ec1c 88->93 94 40ec1e-40ec2a call 41b2c3 88->94 92 40eef1 89->92 92->49 93->94 104 40ec33-40ec37 94->104 105 40ec2c-40ec2e 94->105 99->79 126 40f36f-40f3a0 call 41bc5e call 401f04 call 413a23 call 401f09 * 2 100->126 108 40ec76-40ec89 call 401e65 call 401fab 104->108 109 40ec39 call 407716 104->109 105->104 127 40ec90-40ed18 call 401e65 call 41bc5e call 401f13 call 401f09 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab 108->127 128 40ec8b call 407755 108->128 117 40ec3e-40ec40 109->117 120 40ec42-40ec47 call 407738 call 407260 117->120 121 40ec4c-40ec5f call 401e65 call 401fab 117->121 120->121 121->108 141 40ec61-40ec67 121->141 156 40f3a5-40f3af call 40dd42 call 414f2a 126->156 177 40ed80-40ed84 127->177 178 40ed1a-40ed33 call 401e65 call 401fab call 43bad6 127->178 128->127 141->108 144 40ec69-40ec6f 141->144 144->108 147 40ec71 call 407260 144->147 147->108 179 40ef06-40ef66 call 436e90 call 40247c call 401fab * 2 call 4136f8 call 409057 177->179 180 40ed8a-40ed91 177->180 178->177 203 40ed35-40ed7b call 401e65 call 401fab call 401e65 call 401fab call 40da34 call 401f13 call 401f09 178->203 234 40ef6b-40efbf call 401e65 call 401fab call 402093 call 401fab call 41376f call 401e65 call 401fab call 43baac 179->234 183 40ed93-40ee0d call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 40cdf9 180->183 184 40ee0f-40ee19 call 409057 180->184 193 40ee1e-40ee42 call 40247c call 434798 183->193 184->193 211 40ee51 193->211 212 40ee44-40ee4f call 436e90 193->212 203->177 217 40ee53-40ee9e call 401f04 call 43f809 call 40247c call 401fab call 40247c call 401fab call 413947 211->217 212->217 272 40eea3-40eec8 call 4347a1 call 401e65 call 40b9bd 217->272 286 40efc1 234->286 287 40efdc-40efde 234->287 272->234 288 40eece-40eeed call 401e65 call 41bc5e call 40f474 272->288 289 40efc3-40efda call 41cd9b CreateThread 286->289 290 40efe0-40efe2 287->290 291 40efe4 287->291 288->234 306 40eeef 288->306 294 40efea-40f0c6 call 402093 * 2 call 41b4ef call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 43baac call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab StrToIntA call 409de4 call 401e65 call 401fab 289->294 290->289 291->294 344 40f101 294->344 345 40f0c8-40f0ff call 4344ea call 401e65 call 401fab CreateThread 294->345 306->92 346 40f103-40f11b call 401e65 call 401fab 344->346 345->346 356 40f159-40f16c call 401e65 call 401fab 346->356 357 40f11d-40f154 call 4344ea call 401e65 call 401fab CreateThread 346->357 367 40f1cc-40f1df call 401e65 call 401fab 356->367 368 40f16e-40f1c7 call 401e65 call 401fab call 401e65 call 401fab call 40d9e8 call 401f13 call 401f09 CreateThread 356->368 357->356 379 40f1e1-40f215 call 401e65 call 401fab call 401e65 call 401fab call 43baac call 40c162 367->379 380 40f21a-40f23e call 41b60d call 401f13 call 401f09 367->380 368->367 379->380 400 40f240-40f241 SetProcessDEPPolicy 380->400 401 40f243-40f256 CreateThread 380->401 400->401 404 40f264-40f26b 401->404 405 40f258-40f262 CreateThread 401->405 409 40f279-40f280 404->409 410 40f26d-40f277 CreateThread 404->410 405->404 413 40f282-40f285 409->413 414 40f28e 409->414 410->409 415 40f287-40f28c 413->415 416 40f2cc-40f2df call 401fab call 4134ff 413->416 418 40f293-40f2c7 call 402093 call 4052fd call 402093 call 41b4ef call 401fd8 414->418 415->418 425 40f2e4-40f2e7 416->425 418->416 425->156 427 40f2ed-40f32d call 41bc5e call 401f04 call 41361b call 401f09 call 401f04 425->427 443 40f346-40f34b DeleteFileW 427->443 444 40f34d 443->444 445 40f32f-40f332 443->445 444->126 445->126 446 40f334-40f341 Sleep call 401f04 445->446 446->443
                                                                            APIs
                                                                              • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB65
                                                                              • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB6E
                                                                              • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB85
                                                                              • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB88
                                                                              • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CB9A
                                                                              • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB9D
                                                                              • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CBAE
                                                                              • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBB1
                                                                              • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040E9E1), ref: 0041CBC3
                                                                              • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBC6
                                                                              • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040E9E1), ref: 0041CBD2
                                                                              • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBD5
                                                                              • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040E9E1), ref: 0041CBE6
                                                                              • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBE9
                                                                              • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040E9E1), ref: 0041CBFA
                                                                              • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBFD
                                                                              • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040E9E1), ref: 0041CC0E
                                                                              • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC11
                                                                              • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040E9E1), ref: 0041CC22
                                                                              • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC25
                                                                              • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040E9E1), ref: 0041CC36
                                                                              • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC39
                                                                              • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040E9E1), ref: 0041CC4A
                                                                              • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC4D
                                                                              • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040E9E1), ref: 0041CC5E
                                                                              • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC61
                                                                              • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040E9E1), ref: 0041CC72
                                                                              • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC75
                                                                              • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040E9E1), ref: 0041CC83
                                                                            • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe,00000104), ref: 0040E9EE
                                                                              • Part of subcall function 00410F37: __EH_prolog.LIBCMT ref: 00410F3C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                                                            • String ID: 8SG$8SG$Access Level: $Administrator$C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe$Exe$Exe$Inj$PSG$Remcos Agent initialized$Rmc-43JG4A$Software\$User$dMG$del$del$exepath$licence$license_code.txt$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG
                                                                            • API String ID: 2830904901-3375843765
                                                                            • Opcode ID: c31c83540a8e287e5b92cd1d5896ae9fda81cca172018160cba793275160b061
                                                                            • Instruction ID: d4e128c763ae9979da4f7e35a5cae12564b96cb69b39ecb6445d524eb2b23fe8
                                                                            • Opcode Fuzzy Hash: c31c83540a8e287e5b92cd1d5896ae9fda81cca172018160cba793275160b061
                                                                            • Instruction Fuzzy Hash: 6332D860B043412BDA24B7729C67B6E26994F81748F50483FB9467B2E3EFBC4D45839E

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 448 4180ef-418118 449 41811c-418183 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 448->449 450 418480 449->450 451 418189-418190 449->451 453 418482-41848c 450->453 451->450 452 418196-41819d 451->452 452->450 454 4181a3-4181a5 452->454 454->450 455 4181ab-4181d8 call 436e90 * 2 454->455 455->450 460 4181de-4181e9 455->460 460->450 461 4181ef-41821f CreateProcessW 460->461 462 418225-41824d VirtualAlloc Wow64GetThreadContext 461->462 463 41847a GetLastError 461->463 464 418253-418273 ReadProcessMemory 462->464 465 418444-418478 VirtualFree GetCurrentProcess NtUnmapViewOfSection NtClose TerminateProcess 462->465 463->450 464->465 466 418279-41829b NtCreateSection 464->466 465->450 466->465 467 4182a1-4182ae 466->467 468 4182c1-4182e3 NtMapViewOfSection 467->468 469 4182b0-4182bb NtUnmapViewOfSection 467->469 470 4182e5-418322 VirtualFree NtClose TerminateProcess 468->470 471 41832d-418354 GetCurrentProcess NtMapViewOfSection 468->471 469->468 470->449 472 418328 470->472 471->465 473 41835a-41835e 471->473 472->450 474 418360-418364 473->474 475 418367-418385 call 436910 473->475 474->475 478 4183c7-4183d0 475->478 479 418387-418395 475->479 480 4183f0-4183f4 478->480 481 4183d2-4183d8 478->481 482 418397-4183ba call 436910 479->482 484 4183f6-418413 WriteProcessMemory 480->484 485 418419-418430 Wow64SetThreadContext 480->485 481->480 483 4183da-4183ed call 418503 481->483 493 4183bc-4183c3 482->493 483->480 484->465 488 418415 484->488 485->465 489 418432-41843e ResumeThread 485->489 488->485 489->465 492 418440-418442 489->492 492->453 493->478
                                                                            APIs
                                                                            • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418136
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 00418139
                                                                            • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 0041814A
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041814D
                                                                            • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 0041815E
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 00418161
                                                                            • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 00418172
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 00418175
                                                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418217
                                                                            • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041822F
                                                                            • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 00418245
                                                                            • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 0041826B
                                                                            • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 00418293
                                                                            • NtUnmapViewOfSection.NTDLL(?,?), ref: 004182BB
                                                                            • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 004182DB
                                                                            • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 004182ED
                                                                            • NtClose.NTDLL(?), ref: 004182F7
                                                                            • TerminateProcess.KERNEL32(?,00000000), ref: 00418301
                                                                            • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 00418341
                                                                            • NtMapViewOfSection.NTDLL(?,00000000), ref: 0041834C
                                                                            • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 0041840B
                                                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 00418428
                                                                            • ResumeThread.KERNEL32(?), ref: 00418435
                                                                            • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041844C
                                                                            • GetCurrentProcess.KERNEL32(?), ref: 00418457
                                                                            • NtUnmapViewOfSection.NTDLL(00000000), ref: 0041845E
                                                                            • NtClose.NTDLL(?), ref: 00418468
                                                                            • TerminateProcess.KERNEL32(?,00000000), ref: 00418472
                                                                            • GetLastError.KERNEL32 ref: 0041847A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Process$Section$AddressHandleModuleProcView$ThreadVirtual$CloseContextCreateCurrentFreeMemoryTerminateUnmapWow64$AllocErrorLastReadResumeWrite
                                                                            • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                                                            • API String ID: 3150337530-3035715614
                                                                            • Opcode ID: 89e9824b65005418a7066967bf7851544621f3057e11158cf19ce55185e759a5
                                                                            • Instruction ID: 216cb1b436b1bb1c0a39989cd20dfb1fea14fcd849b5832ba41dfff5d3f22c39
                                                                            • Opcode Fuzzy Hash: 89e9824b65005418a7066967bf7851544621f3057e11158cf19ce55185e759a5
                                                                            • Instruction Fuzzy Hash: EDA16E70604305AFDB208F64CC85BAB7BE8FF48705F04482EF595D6291EB78D844CB1A

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C39B
                                                                            • FindNextFileW.KERNELBASE(00000000,?), ref: 0040C46E
                                                                            • FindClose.KERNEL32(00000000), ref: 0040C47D
                                                                            • FindClose.KERNEL32(00000000), ref: 0040C4A8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Find$CloseFile$FirstNext
                                                                            • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                            • API String ID: 1164774033-405221262
                                                                            • Opcode ID: b0dea96f5dcc6d7f3721c7a302ccd3df139dc673117ddaaac69b2fe49c926289
                                                                            • Instruction ID: 975c513e22faa42ee1994afe11ceef4a5d9ff9fa3a88a4f7cb3cdca8b35e8719
                                                                            • Opcode Fuzzy Hash: b0dea96f5dcc6d7f3721c7a302ccd3df139dc673117ddaaac69b2fe49c926289
                                                                            • Instruction Fuzzy Hash: 4131513150021AA6CB14E7A1DC9ADFE7778AF10718F10017FB105B20D2EF789A49CA4D

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1514 100010f1-10001166 call 10002c40 * 2 lstrlenW call 10002c40 lstrcatW lstrlenW 1521 10001177-1000119e lstrlenW FindFirstFileW 1514->1521 1522 10001168-10001172 lstrlenW 1514->1522 1523 100011a0-100011a8 1521->1523 1524 100011e1-100011e9 1521->1524 1522->1521 1525 100011c7-100011d8 FindNextFileW 1523->1525 1526 100011aa-100011c4 call 10001000 1523->1526 1525->1523 1528 100011da-100011db FindClose 1525->1528 1526->1525 1528->1524
                                                                            APIs
                                                                            • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                                                                            • lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001151
                                                                            • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                                                                            • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                                                                            • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                                                                            • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                                                                            • FindNextFileW.KERNELBASE(00000000,00000010), ref: 100011D0
                                                                            • FindClose.KERNEL32(00000000), ref: 100011DB
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                                            • String ID:
                                                                            • API String ID: 1083526818-0
                                                                            • Opcode ID: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                                                                            • Instruction ID: 89aa6ca17049c9a574106098fd68ded4b08ae6dd255c3979a52dcbc6bb9ed716
                                                                            • Opcode Fuzzy Hash: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                                                                            • Instruction Fuzzy Hash: D22193715043586BE714EB649C49FDF7BDCEF84394F00092AFA58D3190E770D64487A6

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B3A7
                                                                            • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B3BD
                                                                            • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B3D6
                                                                            • InternetCloseHandle.WININET(00000000), ref: 0041B41C
                                                                            • InternetCloseHandle.WININET(00000000), ref: 0041B41F
                                                                            Strings
                                                                            • http://geoplugin.net/json.gp, xrefs: 0041B3B7
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Internet$CloseHandleOpen$FileRead
                                                                            • String ID: http://geoplugin.net/json.gp
                                                                            • API String ID: 3121278467-91888290
                                                                            • Opcode ID: 715bb13e36d7f94650e38528baf69c40dba8c7692c2ea5b5f9dd98b44b5d3a7c
                                                                            • Instruction ID: bc766ab0241d3587a1949f89688fbc1c60562a782fd7f61c1deed4db1e92f461
                                                                            • Opcode Fuzzy Hash: 715bb13e36d7f94650e38528baf69c40dba8c7692c2ea5b5f9dd98b44b5d3a7c
                                                                            • Instruction Fuzzy Hash: E711EB311053126BD224AB269C49EBF7F9CEF86755F00043EF905A2292DB68DC45C6FA

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1575 411cfe-411d1e call 41179c 1578 411d20-411d22 1575->1578 1579 411d27-411d30 1575->1579 1580 411f3a-411f40 1578->1580 1581 411d32-411d3d SetLastError 1579->1581 1582 411d3f-411d51 call 41179c 1579->1582 1581->1578 1582->1578 1585 411d53-411d5e 1582->1585 1585->1581 1586 411d60-411d69 1585->1586 1586->1581 1587 411d6b-411d6f 1586->1587 1587->1581 1588 411d71-411d7b 1587->1588 1589 411d7d-411d80 1588->1589 1590 411d9f-411dc2 GetNativeSystemInfo call 41178b * 2 1588->1590 1592 411d82-411d88 1589->1592 1599 411dd4-411dee call 411ca3 1590->1599 1600 411dc4 1590->1600 1594 411d8a-411d8d 1592->1594 1595 411d8f 1592->1595 1597 411d92-411d9d 1594->1597 1595->1597 1597->1590 1597->1592 1606 411df0-411e06 call 411ca3 1599->1606 1607 411e0c-411e21 GetProcessHeap HeapAlloc 1599->1607 1601 411dc9-411dcf SetLastError 1600->1601 1603 411f37 1601->1603 1605 411f39 1603->1605 1605->1580 1606->1607 1616 411e08-411e0a 1606->1616 1609 411e23-411e33 call 411cba 1607->1609 1610 411e35-411e80 call 41179c 1607->1610 1609->1616 1617 411f30-411f32 call 412077 1610->1617 1618 411e86-411ec8 call 411ca3 call 436910 call 4117af 1610->1618 1616->1601 1617->1603 1618->1617 1626 411eca-411ed2 1618->1626 1627 411ee3-411ee6 1626->1627 1628 411ed4-411ee1 call 411ab3 1626->1628 1629 411ee9-411ef2 call 411b5f 1627->1629 1628->1629 1629->1617 1634 411ef4-411ef6 call 41194f 1629->1634 1636 411efb-411efd 1634->1636 1636->1617 1637 411eff-411f08 call 411a82 1636->1637 1637->1617 1640 411f0a-411f11 1637->1640 1641 411f13-411f19 1640->1641 1642 411f4b 1640->1642 1644 411f46-411f49 1641->1644 1645 411f1b-411f23 1641->1645 1643 411f4f-411f51 1642->1643 1643->1605 1644->1643 1647 411f41-411f44 1645->1647 1648 411f25-411f2a SetLastError 1645->1648 1647->1643 1648->1617
                                                                            APIs
                                                                              • Part of subcall function 0041179C: SetLastError.KERNEL32(0000000D,00411D1C,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 004117A2
                                                                            • SetLastError.KERNEL32(000000C1,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 00411D37
                                                                            • GetNativeSystemInfo.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 00411DA5
                                                                            • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,?), ref: 00411DC9
                                                                              • Part of subcall function 00411CA3: VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411DE7,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CB3
                                                                            • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,?), ref: 00411E10
                                                                            • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 00411E17
                                                                            • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411F2A
                                                                              • Part of subcall function 00412077: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F37,?,?,?,?,?), ref: 004120E7
                                                                              • Part of subcall function 00412077: HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 004120EE
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                                                                            • String ID:
                                                                            • API String ID: 3950776272-0
                                                                            • Opcode ID: 03879881e365d714915aafd98c27fc7559b9a312a1bd96baf04abeae924ccd8f
                                                                            • Instruction ID: a5564978de1508fcfe39aaa31f5973b4ee53e0220ffe5d2cf9b9f7f7cc9a58c7
                                                                            • Opcode Fuzzy Hash: 03879881e365d714915aafd98c27fc7559b9a312a1bd96baf04abeae924ccd8f
                                                                            • Instruction Fuzzy Hash: B661E370601201ABC7109F66C980BAB7BA5BF44744F04411BFA058B7A2E7BCE8D2CBD9
                                                                            APIs
                                                                              • Part of subcall function 00413549: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 00413569
                                                                              • Part of subcall function 00413549: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004752F0), ref: 00413587
                                                                              • Part of subcall function 00413549: RegCloseKey.KERNEL32(?), ref: 00413592
                                                                            • Sleep.KERNEL32(00000BB8), ref: 0040F85B
                                                                            • ExitProcess.KERNEL32 ref: 0040F8CA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CloseExitOpenProcessQuerySleepValue
                                                                            • String ID: 5.0.0 Pro$override$pth_unenc
                                                                            • API String ID: 2281282204-3992771774
                                                                            • Opcode ID: b2914bca8dc6d178ace8994cda5c8d39e94a06d054db7bce363045d49bf0e15a
                                                                            • Instruction ID: 07d0e0dc4205ecb16ec703249a4fc897915f305b32a2beb09604d1d6565ffe0f
                                                                            • Opcode Fuzzy Hash: b2914bca8dc6d178ace8994cda5c8d39e94a06d054db7bce363045d49bf0e15a
                                                                            • Instruction Fuzzy Hash: F821F371B0420167C604767A485B6AE35A95B80718F90403FF505676D7FF7C8E0583EF
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData), ref: 00406A82
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 00406A89
                                                                            • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00406AA3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AddressCryptDataLibraryLoadProcUnprotect
                                                                            • String ID: CryptUnprotectData$crypt32
                                                                            • API String ID: 1087783672-2380590389
                                                                            • Opcode ID: 58a6a211d8528d7034b6d4e537693813dfb36b0b7d2b88ce6c125ece2ab5d6dc
                                                                            • Instruction ID: d796ed41fc96dc9ef8d801536240fab0e9422483ab40f89d2a564a4d0f07de08
                                                                            • Opcode Fuzzy Hash: 58a6a211d8528d7034b6d4e537693813dfb36b0b7d2b88ce6c125ece2ab5d6dc
                                                                            • Instruction Fuzzy Hash: 6201B535B00216ABCB18DFAD9D449ABBBB8EB49300F14817EE95AE3341D674D9008BA4
                                                                            APIs
                                                                            • GetLocalTime.KERNEL32(00000001,00474EE0,00475598,?,?,?,?,00415CD6,?,00000001), ref: 00404F81
                                                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00474EE0,00475598,?,?,?,?,00415CD6,?,00000001), ref: 00404FCD
                                                                            • CreateThread.KERNEL32(00000000,00000000,Function_00005150,?,00000000,00000000), ref: 00404FE0
                                                                            Strings
                                                                            • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Create$EventLocalThreadTime
                                                                            • String ID: KeepAlive | Enabled | Timeout:
                                                                            • API String ID: 2532271599-1507639952
                                                                            • Opcode ID: 5b951a2add5e547329f503834dff045a25d72086c34e611da39e5eb7c2c00c38
                                                                            • Instruction ID: 982fc92e7e47f2769c776e0d9ab1702947c5453eb715a4cfed9cf45540ca89dc
                                                                            • Opcode Fuzzy Hash: 5b951a2add5e547329f503834dff045a25d72086c34e611da39e5eb7c2c00c38
                                                                            • Instruction Fuzzy Hash: A8110671904385AAC720A7778C0DEAB7FA8DBD2710F04046FF54163291DAB89445CBBA
                                                                            APIs
                                                                            • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,004334BF,00000034,?,?,004E7598), ref: 00433849
                                                                            • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00433552,00000000,?,00000000), ref: 0043385F
                                                                            • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,00433552,00000000,?,00000000,0041E251), ref: 00433871
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Crypt$Context$AcquireRandomRelease
                                                                            • String ID:
                                                                            • API String ID: 1815803762-0
                                                                            • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                                            • Instruction ID: 864202151b2ab8ebdb17250bb7e2999cce5b6c404a207f59f2405eb254ca80c1
                                                                            • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                                            • Instruction Fuzzy Hash: 83E09231308310FAFB341F25AC08F573AA5EB89B67F20093AF211E40E4D2568C018A5C
                                                                            APIs
                                                                            • GetComputerNameExW.KERNEL32(00000001,?,0000002B,004750E4), ref: 0041B62A
                                                                            • GetUserNameW.ADVAPI32(?,0040F223), ref: 0041B642
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Name$ComputerUser
                                                                            • String ID:
                                                                            • API String ID: 4229901323-0
                                                                            • Opcode ID: f2a2c4cd8e5bb8103777dc297431778ce039a9076c0b624264e24d9fc0e6d827
                                                                            • Instruction ID: 2f1a7eaa0fafc1393a04fa3680ad11d69711b7caddb5f837a5711c727b94ccef
                                                                            • Opcode Fuzzy Hash: f2a2c4cd8e5bb8103777dc297431778ce039a9076c0b624264e24d9fc0e6d827
                                                                            • Instruction Fuzzy Hash: 3B014F7190011CABCB01EBD5DC45EEDB7BCAF44309F10016AB505B61A1EFB46E88CBA8
                                                                            APIs
                                                                            • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,004154FC,00474EE0,00475A00,00474EE0,00000000,00474EE0,00000000,00474EE0,5.0.0 Pro), ref: 0040F8E5
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: InfoLocale
                                                                            • String ID:
                                                                            • API String ID: 2299586839-0
                                                                            • Opcode ID: 2888965568e38a2ba7a5abe7093904758464576a93ba76aee1c710f175ee0f35
                                                                            • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                                                                            • Opcode Fuzzy Hash: 2888965568e38a2ba7a5abe7093904758464576a93ba76aee1c710f175ee0f35
                                                                            • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 494 414f2a-414f72 call 4020df call 41b8b3 call 4020df call 401e65 call 401fab call 43baac 507 414f81-414fcd call 402093 call 401e65 call 4020f6 call 41be1b call 40489e call 401e65 call 40b9bd 494->507 508 414f74-414f7b Sleep 494->508 523 415041-4150dc call 402093 call 401e65 call 4020f6 call 41be1b call 401e65 * 2 call 406c1e call 402f10 call 401fe2 call 401fd8 * 2 call 401e65 call 405b05 507->523 524 414fcf-41503e call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 40473d 507->524 508->507 577 4150ec-4150f3 523->577 578 4150de-4150ea 523->578 524->523 579 4150f8-41518a call 405aa6 call 40531e call 406383 call 402f10 call 402093 call 41b4ef call 401fd8 * 2 call 401e65 call 401fab call 401e65 call 401fab call 414ee9 577->579 578->579 606 4151d5-4151e3 call 40482d 579->606 607 41518c-4151d0 WSAGetLastError call 41cae1 call 4052fd call 402093 call 41b4ef call 401fd8 579->607 613 415210-415225 call 404f51 call 4048c8 606->613 614 4151e5-41520b call 402093 * 2 call 41b4ef 606->614 629 415aa3-415ab5 call 404e26 call 4021fa 607->629 613->629 630 41522b-41537e call 401e65 * 2 call 40531e call 406383 call 402f10 call 406383 call 402f10 call 402093 call 41b4ef call 401fd8 * 4 call 41b7e0 call 4145bd call 40905c call 441e81 call 401e65 call 4020f6 call 40247c call 401fab * 2 call 4136f8 613->630 614->629 642 415ab7-415ad7 call 401e65 call 401fab call 43baac Sleep 629->642 643 415add-415ae5 call 401e8d 629->643 694 415380-41538d call 405aa6 630->694 695 415392-4153b9 call 401fab call 4135a6 630->695 642->643 643->523 694->695 701 4153c0-415a0a call 40417e call 40dd89 call 41bc42 call 41bd1e call 41bb8e call 401e65 GetTickCount call 41bb8e call 41bae6 call 41bb8e * 2 call 41ba96 call 41bd1e * 5 call 40f8d1 call 41bd1e call 402f31 call 402ea1 call 402f10 call 402ea1 call 402f10 * 3 call 402ea1 call 402f10 call 406383 call 402f10 call 406383 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 406383 call 402f10 * 5 call 402ea1 call 402f10 call 402ea1 call 402f10 * 7 call 402ea1 call 404aa1 call 401fd8 * 50 call 401f09 call 401fd8 * 6 call 401f09 call 404c10 695->701 702 4153bb-4153bd 695->702 947 415a0f-415a16 701->947 702->701 948 415a18-415a1f 947->948 949 415a2a-415a31 947->949 948->949 950 415a21-415a23 948->950 951 415a33-415a38 call 40b051 949->951 952 415a3d-415a6f call 405a6b call 402093 * 2 call 41b4ef 949->952 950->949 951->952 963 415a71-415a7d CreateThread 952->963 964 415a83-415a9e call 401fd8 * 2 call 401f09 952->964 963->964 964->629
                                                                            APIs
                                                                            • Sleep.KERNEL32(00000000,00000029,004752F0,004750E4,00000000), ref: 00414F7B
                                                                            • WSAGetLastError.WS2_32(00000000,00000001), ref: 0041518C
                                                                            • Sleep.KERNEL32(00000000,00000002), ref: 00415AD7
                                                                              • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Sleep$ErrorLastLocalTime
                                                                            • String ID: | $%I64u$5.0.0 Pro$8SG$C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$Exe$PSG$Rmc-43JG4A$TLS Off$TLS On $dMG$hlight$name$NG$NG$PG$PG$PG
                                                                            • API String ID: 524882891-2337120381
                                                                            • Opcode ID: b0cf9b026a970597fbb7ce4422f7b446e68d8aef5e82cbbbac9de6ca6053690a
                                                                            • Instruction ID: 324fc11d7bea0fba9c16e2c7d7b547a311b01f704130931fc4cc70caa797af2d
                                                                            • Opcode Fuzzy Hash: b0cf9b026a970597fbb7ce4422f7b446e68d8aef5e82cbbbac9de6ca6053690a
                                                                            • Instruction Fuzzy Hash: 22526B31A001155ACB18F732DD96AFE73769F90344F6041BFE40A761E2EF781E858A5D

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 971 412ab4-412afd GetModuleFileNameW call 4020df * 3 978 412aff-412b89 call 41b978 call 401fab call 40d9e8 call 401fd8 call 41b978 call 401fab call 40d9e8 call 401fd8 call 41b978 call 401fab call 40d9e8 call 401fd8 971->978 1003 412b8b-412c1b call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 418568 call 401f09 * 4 978->1003 1026 412c2b 1003->1026 1027 412c1d-412c25 Sleep 1003->1027 1028 412c2d-412cbd call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 418568 call 401f09 * 4 1026->1028 1027->1003 1027->1026 1051 412ccd 1028->1051 1052 412cbf-412cc7 Sleep 1028->1052 1053 412ccf-412d5f call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 418568 call 401f09 * 4 1051->1053 1052->1028 1052->1051 1076 412d61-412d69 Sleep 1053->1076 1077 412d6f-412d94 1053->1077 1076->1053 1076->1077 1078 412d98-412db4 call 401f04 call 41c485 1077->1078 1083 412db6-412dc5 call 401f04 DeleteFileW 1078->1083 1084 412dcb-412de7 call 401f04 call 41c485 1078->1084 1083->1084 1091 412e04 1084->1091 1092 412de9-412e02 call 401f04 DeleteFileW 1084->1092 1094 412e08-412e24 call 401f04 call 41c485 1091->1094 1092->1094 1100 412e26-412e38 call 401f04 DeleteFileW 1094->1100 1101 412e3e-412e40 1094->1101 1100->1101 1103 412e42-412e44 1101->1103 1104 412e4d-412e58 Sleep 1101->1104 1103->1104 1107 412e46-412e4b 1103->1107 1104->1078 1105 412e5e-412e70 call 406b28 1104->1105 1110 412e72-412e80 call 406b28 1105->1110 1111 412ec6-412ee5 call 401f09 * 3 1105->1111 1107->1104 1107->1105 1110->1111 1117 412e82-412e90 call 406b28 1110->1117 1122 412eea-412f23 call 40b904 call 401f04 call 4020f6 call 41322d 1111->1122 1117->1111 1123 412e92-412ebe Sleep call 401f09 * 3 1117->1123 1138 412f28-412f4e call 401f09 call 405b05 1122->1138 1123->978 1136 412ec4 1123->1136 1136->1122 1143 412f54-4130a3 call 41bd1e call 41bb8e call 402f31 call 402f10 * 6 call 402ea1 call 402f10 call 402ea1 call 404aa1 call 401fd8 * 10 1138->1143 1144 4130a8-4131a1 call 41bd1e call 402f31 call 402f10 * 6 call 402ea1 call 404aa1 call 401fd8 * 7 1138->1144 1213 4131a5-41322c call 401fd8 call 401f09 call 401fd8 * 9 1143->1213 1144->1213
                                                                            APIs
                                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412ACD
                                                                              • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,771B3530,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                                                                              • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E74), ref: 0041857E
                                                                              • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F,?,?,004040F5,00465E74), ref: 00418587
                                                                            • Sleep.KERNEL32(0000000A,00465E74), ref: 00412C1F
                                                                            • Sleep.KERNEL32(0000000A,00465E74,00465E74), ref: 00412CC1
                                                                            • Sleep.KERNEL32(0000000A,00465E74,00465E74,00465E74), ref: 00412D63
                                                                            • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412DC5
                                                                            • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412DFC
                                                                            • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412E38
                                                                            • Sleep.KERNEL32(000001F4,00465E74,00465E74,00465E74), ref: 00412E52
                                                                            • Sleep.KERNEL32(00000064), ref: 00412E94
                                                                              • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                                            • String ID: /stext "$0TG$0TG$NG$NG
                                                                            • API String ID: 1223786279-2576077980
                                                                            • Opcode ID: 1b04588a09b0242c806624439635b49035d13dfe45bb4d6f030a02fc8343e441
                                                                            • Instruction ID: 3b0169c2c8bc9f0d695cedb60fdc7b81a1931596247e975dd6f1dc47d42db627
                                                                            • Opcode Fuzzy Hash: 1b04588a09b0242c806624439635b49035d13dfe45bb4d6f030a02fc8343e441
                                                                            • Instruction Fuzzy Hash: 990255311083418AC325FB62D851AEFB3E5AFD4348F50483EF58A971E2EF785A49C65A

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 10001434
                                                                              • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                                                                              • Part of subcall function 100010F1: lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001151
                                                                              • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                                                                              • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                                                                              • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                                                                              • Part of subcall function 100010F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                                                                              • Part of subcall function 100010F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 100011D0
                                                                              • Part of subcall function 100010F1: FindClose.KERNEL32(00000000), ref: 100011DB
                                                                            • lstrlenW.KERNEL32(?), ref: 100014C5
                                                                            • lstrlenW.KERNEL32(?), ref: 100014E0
                                                                            • lstrlenW.KERNEL32(?,?), ref: 1000150F
                                                                            • lstrcatW.KERNEL32(00000000), ref: 10001521
                                                                            • lstrlenW.KERNEL32(?,?), ref: 10001547
                                                                            • lstrcatW.KERNEL32(00000000), ref: 10001553
                                                                            • lstrlenW.KERNEL32(?,?), ref: 10001579
                                                                            • lstrcatW.KERNEL32(00000000), ref: 10001585
                                                                            • lstrlenW.KERNEL32(?,?), ref: 100015AB
                                                                            • lstrcatW.KERNEL32(00000000), ref: 100015B7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                                            • String ID: )$Foxmail$ProgramFiles
                                                                            • API String ID: 672098462-2938083778
                                                                            • Opcode ID: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                                                                            • Instruction ID: 44b728d421a24f1832cbc0053e0d9d9aefaca4d51113d01ad6b93c48f87fe4b0
                                                                            • Opcode Fuzzy Hash: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                                                                            • Instruction Fuzzy Hash: 4081A475A40358A9EB30D7A0DC86FDE7379EF84740F00059AF608EB191EBB16AC5CB95

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1286 4048c8-4048e8 connect 1287 404a1b-404a1f 1286->1287 1288 4048ee-4048f1 1286->1288 1289 404a21-404a2f WSAGetLastError 1287->1289 1290 404a97 1287->1290 1291 404a17-404a19 1288->1291 1292 4048f7-4048fa 1288->1292 1289->1290 1293 404a31-404a34 1289->1293 1294 404a99-404a9e 1290->1294 1291->1294 1295 404926-404930 call 420c60 1292->1295 1296 4048fc-404923 call 40531e call 402093 call 41b4ef 1292->1296 1298 404a71-404a76 1293->1298 1299 404a36-404a6f call 41cae1 call 4052fd call 402093 call 41b4ef call 401fd8 1293->1299 1307 404941-40494e call 420e8f 1295->1307 1308 404932-40493c 1295->1308 1296->1295 1304 404a7b-404a94 call 402093 * 2 call 41b4ef 1298->1304 1299->1290 1304->1290 1321 404950-404973 call 402093 * 2 call 41b4ef 1307->1321 1322 404987-404992 call 421a40 1307->1322 1308->1304 1347 404976-404982 call 420ca0 1321->1347 1333 4049c4-4049d1 call 420e06 1322->1333 1334 404994-4049c2 call 402093 * 2 call 41b4ef call 4210b2 1322->1334 1344 4049d3-4049f6 call 402093 * 2 call 41b4ef 1333->1344 1345 4049f9-404a14 CreateEventW * 2 1333->1345 1334->1347 1344->1345 1345->1291 1347->1290
                                                                            APIs
                                                                            • connect.WS2_32(FFFFFFFF,004EC468,00000010), ref: 004048E0
                                                                            • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                                                                            • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                                                                            • WSAGetLastError.WS2_32 ref: 00404A21
                                                                              • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                                            • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                                            • API String ID: 994465650-2151626615
                                                                            • Opcode ID: 19932798ed07d1ae22d126be326c9da79f3bb29c47122c8f9a0e48a384f387e3
                                                                            • Instruction ID: c5d57dbf39bf42eeb7f1fe8451fa1a1ddda5cb55b73798f96fdafd5064c5310c
                                                                            • Opcode Fuzzy Hash: 19932798ed07d1ae22d126be326c9da79f3bb29c47122c8f9a0e48a384f387e3
                                                                            • Instruction Fuzzy Hash: 3E41E8B47406016BD61877BA8D1B53E7A15AB81304B50017FE60267AD3EB7D9C108BDF

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                                                                            • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                                                                            • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
                                                                            • closesocket.WS2_32(000000FF), ref: 00404E5A
                                                                            • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E91
                                                                            • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404EA2
                                                                            • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404EA9
                                                                            • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBA
                                                                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBF
                                                                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EC4
                                                                            • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED1
                                                                            • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED6
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                                                            • String ID:
                                                                            • API String ID: 3658366068-0
                                                                            • Opcode ID: 0463b1faaa3f7a02a97a49212c31dd980e99cbb732c39645afe60185321c9919
                                                                            • Instruction ID: 0c11cd9b042c69dc9d4dd2828563f6d61870a883144e53252efabab5b24bcc37
                                                                            • Opcode Fuzzy Hash: 0463b1faaa3f7a02a97a49212c31dd980e99cbb732c39645afe60185321c9919
                                                                            • Instruction Fuzzy Hash: BF21E871104B04AFDB216B26DC49B27BBA1FF40326F104A2EE2E211AF1CB75B851DB58

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1378 40da34-40da59 call 401f86 1381 40db83-40dc1b call 401f04 GetLongPathNameW call 40417e * 2 call 40ddd1 call 402fa5 * 2 call 401f09 * 5 1378->1381 1382 40da5f 1378->1382 1384 40da70-40da7e call 41b5b4 call 401f13 1382->1384 1385 40da91-40da96 1382->1385 1386 40db51-40db56 1382->1386 1387 40daa5-40daac call 41bfb7 1382->1387 1388 40da66-40da6b 1382->1388 1389 40db58-40db5d 1382->1389 1390 40da9b-40daa0 1382->1390 1391 40db6e 1382->1391 1392 40db5f-40db64 call 43c0cf 1382->1392 1409 40da83 1384->1409 1394 40db73-40db78 call 43c0cf 1385->1394 1386->1394 1406 40db00-40db4c call 40417e call 43c0cf call 40417e call 402fa5 call 401f13 call 401f09 * 2 1387->1406 1407 40daae-40dafe call 40417e call 43c0cf call 40417e call 402fa5 call 401f13 call 401f09 * 2 1387->1407 1388->1394 1389->1394 1390->1394 1391->1394 1402 40db69-40db6c 1392->1402 1408 40db79-40db7e call 409057 1394->1408 1402->1391 1402->1408 1406->1409 1414 40da87-40da8c call 401f09 1407->1414 1408->1381 1409->1414 1414->1381
                                                                            APIs
                                                                            • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040DB9A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: LongNamePath
                                                                            • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                                            • API String ID: 82841172-425784914
                                                                            • Opcode ID: ebf8be0cf4586a5e33205fec6061b641f55293ecedf4e36757c3aa7501bc555d
                                                                            • Instruction ID: 0cc8b9c4d8a16f3fd89327f32322cd7e2fd47b59120d3573c9b2d8a81569e3eb
                                                                            • Opcode Fuzzy Hash: ebf8be0cf4586a5e33205fec6061b641f55293ecedf4e36757c3aa7501bc555d
                                                                            • Instruction Fuzzy Hash: FB414F715082019AC215FB61DC52DAEB3F8AE90718F10053FB546A60E2FFB8AE49C65F

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1548 41b2c3-41b31a call 41bfb7 call 4135a6 call 401fe2 call 401fd8 call 406ae1 1559 41b35d-41b366 1548->1559 1560 41b31c-41b32b call 4135a6 1548->1560 1561 41b368-41b36d 1559->1561 1562 41b36f 1559->1562 1565 41b330-41b347 call 401fab StrToIntA 1560->1565 1564 41b374-41b37f call 40537d 1561->1564 1562->1564 1570 41b355-41b358 call 401fd8 1565->1570 1571 41b349-41b352 call 41cf69 1565->1571 1570->1559 1571->1570
                                                                            APIs
                                                                              • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                                                                              • Part of subcall function 0041BFB7: IsWow64Process.KERNEL32(00000000,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFCF
                                                                              • Part of subcall function 004135A6: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                                                                              • Part of subcall function 004135A6: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 004135E7
                                                                              • Part of subcall function 004135A6: RegCloseKey.KERNEL32(?), ref: 004135F2
                                                                            • StrToIntA.SHLWAPI(00000000,0046C9F8,00000000,00000000,00000000,004750E4,00000003,Exe,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0041B33C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Process$CloseCurrentOpenQueryValueWow64
                                                                            • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                                            • API String ID: 782494840-2070987746
                                                                            • Opcode ID: d33b3aadf870e2a3d5ddb7e0db64bdc32883f42ff5325d09c6e3b3a72a78e76a
                                                                            • Instruction ID: 0537cd1ef0e49ffa1b211e53375311a7de90e31f2ded896f28e78de68f6ce99c
                                                                            • Opcode Fuzzy Hash: d33b3aadf870e2a3d5ddb7e0db64bdc32883f42ff5325d09c6e3b3a72a78e76a
                                                                            • Instruction Fuzzy Hash: 42112370A4010566C704B3668C87EFF77198B95314F94013BF856A21E2FB6C599683AE

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1649 1000c7e6-1000c7ed GetModuleHandleA 1650 1000c82d 1649->1650 1651 1000c7ef-1000c7fe call 1000c803 1649->1651 1652 1000c82f-1000c833 1650->1652 1661 1000c800-1000c80b GetProcAddress 1651->1661 1662 1000c865 1651->1662 1654 1000c872 call 1000c877 1652->1654 1655 1000c835-1000c83d GetModuleHandleA 1652->1655 1658 1000c83f-1000c847 1655->1658 1658->1658 1660 1000c849-1000c84c 1658->1660 1660->1652 1663 1000c84e-1000c850 1660->1663 1661->1650 1665 1000c80d-1000c81a VirtualProtect 1661->1665 1664 1000c866-1000c86e 1662->1664 1668 1000c852-1000c854 1663->1668 1669 1000c856-1000c85e 1663->1669 1673 1000c870 1664->1673 1666 1000c82c 1665->1666 1667 1000c81c-1000c82a VirtualProtect 1665->1667 1666->1650 1667->1666 1671 1000c85f-1000c860 GetProcAddress 1668->1671 1669->1671 1671->1662 1673->1660
                                                                            APIs
                                                                            • GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                                                                            • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                                                              • Part of subcall function 1000C803: GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                                                              • Part of subcall function 1000C803: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                              • Part of subcall function 1000C803: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: AddressHandleModuleProcProtectVirtual
                                                                            • String ID:
                                                                            • API String ID: 2099061454-0
                                                                            • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                            • Instruction ID: 210348daefc771ff09e919cc38fdfa0d839c8297c2798a32150270056baeab90
                                                                            • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                            • Instruction Fuzzy Hash: 0301D22094574A38BA51D7B40C06EBA5FD8DB176E0B24D756F1408619BDDA08906C3AE
                                                                            APIs
                                                                            • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                                                              • Part of subcall function 1000C7E6: GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                                                                              • Part of subcall function 1000C7E6: GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                                                              • Part of subcall function 1000C7E6: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                              • Part of subcall function 1000C7E6: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: AddressHandleModuleProcProtectVirtual
                                                                            • String ID:
                                                                            • API String ID: 2099061454-0
                                                                            • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                            • Instruction ID: abaa11d5974e3e1b05dfd32ec0224f7ddc3d76465740e120717e363e7a178845
                                                                            • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                            • Instruction Fuzzy Hash: A921382140838A6FF711CBB44C05FA67FD8DB172E0F198696E040CB147DDA89845C3AE
                                                                            APIs
                                                                            • GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                                                            • VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                            • VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                            • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProcProtectVirtual$HandleModule
                                                                            • String ID:
                                                                            • API String ID: 2152742572-0
                                                                            • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                            • Instruction ID: 9138b94afbcae90e12a8614b592989542e7cb6e8cba5f1d72008c399686a5f74
                                                                            • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                            • Instruction Fuzzy Hash: B7F0C2619497893CFA21C7B40C45EBA5FCCCB276E0B249A56F600C718BDCA5890693FE
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CountEventTick
                                                                            • String ID: !D@$NG
                                                                            • API String ID: 180926312-2721294649
                                                                            • Opcode ID: 1968eb1d2efd0b86663e211145ce925ef5a1b6761c4c86732d3a13e12e262c30
                                                                            • Instruction ID: 1740d3d485f2be3f914829e5aa2a54ae858af1ae40273f66f7ff2800e9d96298
                                                                            • Opcode Fuzzy Hash: 1968eb1d2efd0b86663e211145ce925ef5a1b6761c4c86732d3a13e12e262c30
                                                                            • Instruction Fuzzy Hash: 7E51A1316083019AC724FB32D852AEF73A5AF94314F50493FF54A671E2EF3C5949C68A
                                                                            APIs
                                                                              • Part of subcall function 0040C4C3: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C4F6
                                                                            • PathFileExistsW.SHLWAPI(00000000), ref: 0040C61D
                                                                            • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C688
                                                                            Strings
                                                                            • User Data\Default\Network\Cookies, xrefs: 0040C603
                                                                            • User Data\Profile ?\Network\Cookies, xrefs: 0040C635
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ExistsFilePath
                                                                            • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                                            • API String ID: 1174141254-1980882731
                                                                            • Opcode ID: 045beb197231839d8bc6f16d72bec71cd2484b211ed9f2e7ef154ffc390b52c1
                                                                            • Instruction ID: e6b9b9a8142aca5ff9e4641a3ff80a721fb4b0471daa7637ae592fad8ebd6223
                                                                            • Opcode Fuzzy Hash: 045beb197231839d8bc6f16d72bec71cd2484b211ed9f2e7ef154ffc390b52c1
                                                                            • Instruction Fuzzy Hash: B421037190011996CB14F7A2DC96CEEB738EE50319F40053FB502B31D2EF789A46C698
                                                                            APIs
                                                                              • Part of subcall function 0040C526: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C559
                                                                            • PathFileExistsW.SHLWAPI(00000000), ref: 0040C6EC
                                                                            • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C757
                                                                            Strings
                                                                            • User Data\Default\Network\Cookies, xrefs: 0040C6D2
                                                                            • User Data\Profile ?\Network\Cookies, xrefs: 0040C704
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ExistsFilePath
                                                                            • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                                            • API String ID: 1174141254-1980882731
                                                                            • Opcode ID: c944302783700f6b714969e951d5d7ba8ee050447d56487f9f7d252b1c22fe1d
                                                                            • Instruction ID: 83f6a23093d6b0727a30a1d550f3d6f5bdb2bb72864fa742cd8a9fd6423befd9
                                                                            • Opcode Fuzzy Hash: c944302783700f6b714969e951d5d7ba8ee050447d56487f9f7d252b1c22fe1d
                                                                            • Instruction Fuzzy Hash: AE21D37190011AD6CB05F7A2DC96CEEB778EE50719B50013FF502B31D2EF789A46C698
                                                                            APIs
                                                                            • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041377E
                                                                            • RegSetValueExA.KERNEL32(?,004674B8,00000000,?,00000000,00000000,004752F0,?,?,0040F853,004674B8,5.0.0 Pro), ref: 004137A6
                                                                            • RegCloseKey.KERNEL32(?,?,?,0040F853,004674B8,5.0.0 Pro), ref: 004137B1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CloseCreateValue
                                                                            • String ID: pth_unenc
                                                                            • API String ID: 1818849710-4028850238
                                                                            • Opcode ID: 944061157b2f8cf5ce0fe9502f04d7932ff2a7d7d8f180209318ac9fb18fc527
                                                                            • Instruction ID: c04290829ccef693e4e8b5b7d06cdf9a2950efbbd707a4c1379ff92f90edcb59
                                                                            • Opcode Fuzzy Hash: 944061157b2f8cf5ce0fe9502f04d7932ff2a7d7d8f180209318ac9fb18fc527
                                                                            • Instruction Fuzzy Hash: B8F06272400118FBCB009FA1DD45DEA376CEF04B51F108566FD09A61A1D7359E14DB54
                                                                            APIs
                                                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F50), ref: 00404DB3
                                                                            • CreateThread.KERNEL32(00000000,00000000,?,00474EF8,00000000,00000000), ref: 00404DC7
                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000), ref: 00404DD2
                                                                            • CloseHandle.KERNEL32(00000000,?,00000000), ref: 00404DDB
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                                            • String ID:
                                                                            • API String ID: 3360349984-0
                                                                            • Opcode ID: 8cc524012fdb928a435d261356041cf3a75af8236a27626f329ac327d55d9caf
                                                                            • Instruction ID: 465453d6db43d9529954589ba2efa69a6de0eb64d520c2048147815e962fb190
                                                                            • Opcode Fuzzy Hash: 8cc524012fdb928a435d261356041cf3a75af8236a27626f329ac327d55d9caf
                                                                            • Instruction Fuzzy Hash: 3E4192B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666
                                                                            APIs
                                                                            • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                                                                            • GetFileSize.KERNEL32(00000000,00000000), ref: 0041C4B2
                                                                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041C4D7
                                                                            • CloseHandle.KERNEL32(00000000), ref: 0041C4E5
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: File$CloseCreateHandleReadSize
                                                                            • String ID:
                                                                            • API String ID: 3919263394-0
                                                                            • Opcode ID: b5e3200c466b265101f42b470097a5df982af49012dad84e5cfda8818ecad7ff
                                                                            • Instruction ID: d938e931a51b81dfe9e25773ede9364464a286a3a3b97e7b856b7b87d8bf29b3
                                                                            • Opcode Fuzzy Hash: b5e3200c466b265101f42b470097a5df982af49012dad84e5cfda8818ecad7ff
                                                                            • Instruction Fuzzy Hash: 0FF0C2B1245308BFE6101B25ACD4EBB375CEB867A9F00053EF902A22C1CA298C05913A
                                                                            APIs
                                                                            • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C4F6
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ExistsFilePath
                                                                            • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                                                            • API String ID: 1174141254-4188645398
                                                                            • Opcode ID: 8ff7c565901e449bdccdb0f98389a4479e8afa34c2ab16e92e74f6723fec0cc8
                                                                            • Instruction ID: 529cceb54bdbac8586af3e6ebd5273a77adcdcd577382419881006e182ae29c8
                                                                            • Opcode Fuzzy Hash: 8ff7c565901e449bdccdb0f98389a4479e8afa34c2ab16e92e74f6723fec0cc8
                                                                            • Instruction Fuzzy Hash: 96F05E31A00219A6C604BBF69C478BF7B3C9D50709B50017FBA01B61D3EE789945C6EE
                                                                            APIs
                                                                            • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C559
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ExistsFilePath
                                                                            • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                                                            • API String ID: 1174141254-2800177040
                                                                            • Opcode ID: 80bf71342cedf1c7c420335fca537d4dcb7c5e002a8cedfbc69ce77916fe6aa7
                                                                            • Instruction ID: 330371ab8f71d6844e3501a7b0875f3b866c8fe31c1dcac5d822fe972055fe7f
                                                                            • Opcode Fuzzy Hash: 80bf71342cedf1c7c420335fca537d4dcb7c5e002a8cedfbc69ce77916fe6aa7
                                                                            • Instruction Fuzzy Hash: ECF05E31A00219A6CA14B7B69C47CEF7B6C9D50705B10017FB602B61D2EE78994186EE
                                                                            APIs
                                                                            • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 0040C5BC
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ExistsFilePath
                                                                            • String ID: AppData$\Opera Software\Opera Stable\
                                                                            • API String ID: 1174141254-1629609700
                                                                            • Opcode ID: 1f4c14c00ca8e5665d8965d55df4d322bbb11fb6b8375188be11e318298864ca
                                                                            • Instruction ID: 49b076bb86b4c8db4da1bdedad10e463925805c403c57d636a3174f469f12df7
                                                                            • Opcode Fuzzy Hash: 1f4c14c00ca8e5665d8965d55df4d322bbb11fb6b8375188be11e318298864ca
                                                                            • Instruction Fuzzy Hash: 13F05E31A00319A6CA14B7B69C47CEF7B7C9D10709B40017BB601B61D2EE789D4586EA
                                                                            APIs
                                                                            • CreateMutexA.KERNEL32(00000000,00000001,00000000,0040EC08,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0040D078
                                                                            • GetLastError.KERNEL32 ref: 0040D083
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CreateErrorLastMutex
                                                                            • String ID: Rmc-43JG4A
                                                                            • API String ID: 1925916568-1101955572
                                                                            • Opcode ID: 801f4fab6620dad4192684c1acb97daf4a6912092659b95b34e50827bd09c0e4
                                                                            • Instruction ID: 95155ffd2f5cf2c34283977deb482d2843c3ccfb5002447f486bda260673b364
                                                                            • Opcode Fuzzy Hash: 801f4fab6620dad4192684c1acb97daf4a6912092659b95b34e50827bd09c0e4
                                                                            • Instruction Fuzzy Hash: 18D012B0604701EBD7181770ED5975839959744702F40487AB50BD99F1CBAC88908519
                                                                            APIs
                                                                            • send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                            • WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                                            • SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: EventObjectSingleWaitsend
                                                                            • String ID:
                                                                            • API String ID: 3963590051-0
                                                                            • Opcode ID: a1ff3687248209f9743c60f565233b4765f32d228741c77e03e4de178fa39ade
                                                                            • Instruction ID: 83b425c638d75041f18e819343fb0b0c123ba7f8272f9a3a5816098776915250
                                                                            • Opcode Fuzzy Hash: a1ff3687248209f9743c60f565233b4765f32d228741c77e03e4de178fa39ade
                                                                            • Instruction Fuzzy Hash: A52126B2900119BBCB04ABA1DC95DEE773CFF14314B00452BF515B21E2EE79AA15C6A4
                                                                            APIs
                                                                            • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                                                                            • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 004135E7
                                                                            • RegCloseKey.KERNEL32(?), ref: 004135F2
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CloseOpenQueryValue
                                                                            • String ID:
                                                                            • API String ID: 3677997916-0
                                                                            • Opcode ID: 8a165f7f556a11d3abfab9d86b37d0f406e8581ec1eb6973fd31e646fb445763
                                                                            • Instruction ID: 357f89d7cd1c8cc036c5e31f86fe90e90b696c4569df010e686479b524d11f87
                                                                            • Opcode Fuzzy Hash: 8a165f7f556a11d3abfab9d86b37d0f406e8581ec1eb6973fd31e646fb445763
                                                                            • Instruction Fuzzy Hash: 5A01D676900228BBCF209B91DC09DEF7FBDDB84751F000066BB09E2240DA748E45DBA4
                                                                            APIs
                                                                            • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 00413714
                                                                            • RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 0041372D
                                                                            • RegCloseKey.KERNEL32(00000000), ref: 00413738
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CloseOpenQueryValue
                                                                            • String ID:
                                                                            • API String ID: 3677997916-0
                                                                            • Opcode ID: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                                                                            • Instruction ID: 3f277cad741e4f631881634228dfc272d65c1146f3ef4f3c344e6cfa7cb73972
                                                                            • Opcode Fuzzy Hash: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                                                                            • Instruction Fuzzy Hash: 1C018BB1400229FBDF216FA1DC04DEB3F38EF05751F004065BE08621A1D6358AA5DBA4
                                                                            APIs
                                                                            • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 00413569
                                                                            • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004752F0), ref: 00413587
                                                                            • RegCloseKey.KERNEL32(?), ref: 00413592
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CloseOpenQueryValue
                                                                            • String ID:
                                                                            • API String ID: 3677997916-0
                                                                            • Opcode ID: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                                                            • Instruction ID: df0ca7b2621da3f23a966dc0a7f3323316399916f3769291e5945d4ebcba47cd
                                                                            • Opcode Fuzzy Hash: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                                                            • Instruction Fuzzy Hash: E8F01776900218FFDF109FA0DC05FEEBBBCEB04B11F1040A6BA09E6191E2359F54AB94
                                                                            APIs
                                                                            • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?,00000000,?,?,0040C19C,00466C48), ref: 00413516
                                                                            • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,0040C19C,00466C48), ref: 0041352A
                                                                            • RegCloseKey.KERNEL32(?,?,?,0040C19C,00466C48), ref: 00413535
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CloseOpenQueryValue
                                                                            • String ID:
                                                                            • API String ID: 3677997916-0
                                                                            • Opcode ID: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                                                                            • Instruction ID: ffaae2385a847085e6fb085aa4760e2a706d619ab1068a3de776aab9102a8dd7
                                                                            • Opcode Fuzzy Hash: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                                                                            • Instruction Fuzzy Hash: 46E06D32801238FB9F204FA2DC0DDEB7F6CEF06FA2B000155BD0DA2112E2258E50E6E4
                                                                            APIs
                                                                            • RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                                                                            • RegSetValueExA.KERNEL32(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                                                                            • RegCloseKey.KERNEL32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CloseCreateValue
                                                                            • String ID:
                                                                            • API String ID: 1818849710-0
                                                                            • Opcode ID: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                                                                            • Instruction ID: 04a42b38e2882b978ed87177a7d0f50f8458418d63be9de7f69fe35b215911ab
                                                                            • Opcode Fuzzy Hash: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                                                                            • Instruction Fuzzy Hash: 16E06572500318FBEF115F90DC05FEA7B6CDF04B52F1045A5BF09A6191D3358E549798
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _wcslen
                                                                            • String ID: pQG
                                                                            • API String ID: 176396367-3769108836
                                                                            • Opcode ID: fb25f413e184ec8a33c993d2a732781acce6bf2986b9e3cd202a07b74bc63df9
                                                                            • Instruction ID: e6961f6084f98a1e57a9a6385a58e5d20214d93246a99e64d0d6a4ea431d93e1
                                                                            • Opcode Fuzzy Hash: fb25f413e184ec8a33c993d2a732781acce6bf2986b9e3cd202a07b74bc63df9
                                                                            • Instruction Fuzzy Hash: 8111C3319002059BCB15EF65E8529EF7BB5EF54318B10013FF406A62E2EFB8AD05CB98
                                                                            APIs
                                                                              • Part of subcall function 0040C4C3: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C4F6
                                                                            • PathFileExistsW.SHLWAPI(00000000), ref: 0040C818
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ExistsFilePath
                                                                            • String ID: User Data\Local State
                                                                            • API String ID: 1174141254-3604364636
                                                                            • Opcode ID: ce60f02e6f7abeee40caf5d0a2d832f08db0ff6e8ffe54341049bf3d9829487b
                                                                            • Instruction ID: 4ba9aac63b26862b1c8efdd1d0126766dc1997cc7edc34995d26a8b23f1540e3
                                                                            • Opcode Fuzzy Hash: ce60f02e6f7abeee40caf5d0a2d832f08db0ff6e8ffe54341049bf3d9829487b
                                                                            • Instruction Fuzzy Hash: 62F0303191021AD6CB04FBA5DC96CEE7778AE1470AB00017BBA06B61E2FF789905C6D9
                                                                            APIs
                                                                              • Part of subcall function 0040C589: PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 0040C5BC
                                                                            • PathFileExistsW.SHLWAPI(00000000), ref: 0040C7B5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ExistsFilePath
                                                                            • String ID: Network\Cookies
                                                                            • API String ID: 1174141254-3524344919
                                                                            • Opcode ID: cc474fed6a7020a57340cd53894fd025fe3509becc1854e2f5802efec0f3ef3c
                                                                            • Instruction ID: 00bed2b57767f5c2bb1af07a2f575242ec68e4de0a62838bcb8be90dfc143fe8
                                                                            • Opcode Fuzzy Hash: cc474fed6a7020a57340cd53894fd025fe3509becc1854e2f5802efec0f3ef3c
                                                                            • Instruction Fuzzy Hash: 53F01D3191021AD6CB04FBA5DC968EEB778AD14709B00017BBA06B21D2EF78990986D9
                                                                            APIs
                                                                              • Part of subcall function 0040C526: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C559
                                                                            • PathFileExistsW.SHLWAPI(00000000), ref: 0040C87B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ExistsFilePath
                                                                            • String ID: User Data\Local State
                                                                            • API String ID: 1174141254-3604364636
                                                                            • Opcode ID: 43bb9acbb357d0a55198823479dabdaff94df33e2f943c8594347e3403e3b607
                                                                            • Instruction ID: 2cea31e15f179ef26c72c71e3a8c92f4f78f9a0b2bed1d8044b560421d8a7800
                                                                            • Opcode Fuzzy Hash: 43bb9acbb357d0a55198823479dabdaff94df33e2f943c8594347e3403e3b607
                                                                            • Instruction Fuzzy Hash: 00F0303191021AE6CB04FBA5DC46CEE7778AD1470AB00017BBA06B61D2EF789905C6DD
                                                                            APIs
                                                                              • Part of subcall function 0040C589: PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 0040C5BC
                                                                            • PathFileExistsW.SHLWAPI(00000000), ref: 0040C8DE
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ExistsFilePath
                                                                            • String ID: Local State
                                                                            • API String ID: 1174141254-22827320
                                                                            • Opcode ID: 7d1ccce9de034d23f730c86b5d7ebbd49b013cb0122993cc05c06ae0f0fff20c
                                                                            • Instruction ID: 5906eb44b52407a1e69b826cf05916b84adb9a124773a2bd44f496935e1fc446
                                                                            • Opcode Fuzzy Hash: 7d1ccce9de034d23f730c86b5d7ebbd49b013cb0122993cc05c06ae0f0fff20c
                                                                            • Instruction Fuzzy Hash: 8FF03031A1021AD6CB04F7A5DC46CEE7778AD1470AB00017BBA02B21D6EF78990AC6D9
                                                                            APIs
                                                                            • GlobalMemoryStatusEx.KERNEL32(?), ref: 0041B7CA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: GlobalMemoryStatus
                                                                            • String ID: @
                                                                            • API String ID: 1890195054-2766056989
                                                                            • Opcode ID: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                                                                            • Instruction ID: 2d2b64c70bc766df394076410504e3f9c8f669937c614d63c6700d8895b1c70c
                                                                            • Opcode Fuzzy Hash: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                                                                            • Instruction Fuzzy Hash: E6D017B58023189FC720DFA8E804A8DBBFCFB08210F00456AEC49E3700E770E8008B94
                                                                            APIs
                                                                            • _free.LIBCMT ref: 004461A6
                                                                              • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                                            • HeapReAlloc.KERNEL32(00000000,00000000,?,?,0000000F,00000000,00432F02,00000000,0000000F,0042F90C,?,?,004319B3,?,?,00000000), ref: 004461E2
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Heap$AllocAllocate_free
                                                                            • String ID:
                                                                            • API String ID: 2447670028-0
                                                                            • Opcode ID: 0c50226df9aed064d9fc72c30ff8f5201140dd52271d3dd40973ea300b8a0024
                                                                            • Instruction ID: bbbbf11ac8836aedddebace835184d628c0e8eb9448606daf7135ff7baabef38
                                                                            • Opcode Fuzzy Hash: 0c50226df9aed064d9fc72c30ff8f5201140dd52271d3dd40973ea300b8a0024
                                                                            • Instruction Fuzzy Hash: ACF0683120051566BF212A16AD01B6F375D8F83B75F17411BF91466292DE3CD911916F
                                                                            APIs
                                                                            • socket.WS2_32(00000002,00000001,00000006), ref: 00404852
                                                                            • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,0040530B,?,?,00000000,00000000,?,?,00000000,00405208,?,00000000), ref: 0040488E
                                                                              • Part of subcall function 0040489E: WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CreateEventStartupsocket
                                                                            • String ID:
                                                                            • API String ID: 1953588214-0
                                                                            • Opcode ID: afd00016faedd330142d6470bb716eda446324a36170d88fbab64c940495e811
                                                                            • Instruction ID: 7af5cc85a36d800a693892934b5c0b91abe86707509305098cc6d5fca1b6a633
                                                                            • Opcode Fuzzy Hash: afd00016faedd330142d6470bb716eda446324a36170d88fbab64c940495e811
                                                                            • Instruction Fuzzy Hash: 6E0171B1408B809ED7359F38A8456977FE0AB55304F048D6EF1DA97B91D3B5A881CB18
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 42a83028ea29ee4520479fdfd1ce509581fbe236408560bbb12e48215694f405
                                                                            • Instruction ID: 20740d68f627359004b4f50e822579efa7e6dd26000e0d34fcfb16e84f8f3500
                                                                            • Opcode Fuzzy Hash: 42a83028ea29ee4520479fdfd1ce509581fbe236408560bbb12e48215694f405
                                                                            • Instruction Fuzzy Hash: 6EF0E2706042015BDB1C8B34CD60B2A36955B84315F288F3FF01AD61E0C73EC8918A0D
                                                                            APIs
                                                                            • GetForegroundWindow.USER32 ref: 0041BAB8
                                                                            • GetWindowTextW.USER32(00000000,?,00000100), ref: 0041BACB
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Window$ForegroundText
                                                                            • String ID:
                                                                            • API String ID: 29597999-0
                                                                            • Opcode ID: 450c6a439584c513ec40919ab865562eae24f6ecae6d0f2cfa4f4b601a1705c5
                                                                            • Instruction ID: 4615795adb372a642f3ed3ff298372a60f443b3219566b47796808df054d69ed
                                                                            • Opcode Fuzzy Hash: 450c6a439584c513ec40919ab865562eae24f6ecae6d0f2cfa4f4b601a1705c5
                                                                            • Instruction Fuzzy Hash: CCE0D875A00328A7E720A7A49C4EFE5776CEB08701F0000EEBA18D71C2EAB4AD04C7E4
                                                                            APIs
                                                                            • getaddrinfo.WS2_32(00000000,00000000,00000000,00472ADC,004750E4,00000000,00415188,00000000,00000001), ref: 00414F0B
                                                                            • WSASetLastError.WS2_32(00000000), ref: 00414F10
                                                                              • Part of subcall function 00414D86: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414DD5
                                                                              • Part of subcall function 00414D86: LoadLibraryA.KERNEL32(?), ref: 00414E17
                                                                              • Part of subcall function 00414D86: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E37
                                                                              • Part of subcall function 00414D86: FreeLibrary.KERNEL32(00000000), ref: 00414E3E
                                                                              • Part of subcall function 00414D86: LoadLibraryA.KERNEL32(?), ref: 00414E76
                                                                              • Part of subcall function 00414D86: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E88
                                                                              • Part of subcall function 00414D86: FreeLibrary.KERNEL32(00000000), ref: 00414E8F
                                                                              • Part of subcall function 00414D86: GetProcAddress.KERNEL32(00000000,?), ref: 00414E9E
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
                                                                            • String ID:
                                                                            • API String ID: 1170566393-0
                                                                            • Opcode ID: 6695e73d4224f512b623112065335d5dbc2e445aee0e7ca71efd6bc9c5f08a3e
                                                                            • Instruction ID: cadd3d9b0d0923a9352550a0b766658ea18523973fceddbfefdc7c35282954d4
                                                                            • Opcode Fuzzy Hash: 6695e73d4224f512b623112065335d5dbc2e445aee0e7ca71efd6bc9c5f08a3e
                                                                            • Instruction Fuzzy Hash: 9ED017322015316BD320A769AC01AFBAA9EDBD7771B16003BFA08D3210D6949C8282E8
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c1bd85037f78227014944570c8e1386f57ec7c93b410e94521ce381e63f7069c
                                                                            • Instruction ID: 7a76c105a712203ac593d2e3a9180375903654e9edbd33c69f6c8f8a5c58a470
                                                                            • Opcode Fuzzy Hash: c1bd85037f78227014944570c8e1386f57ec7c93b410e94521ce381e63f7069c
                                                                            • Instruction Fuzzy Hash: 971123B27201019FD7149B18C890FA6B76AFF51721B59425AE202CB3B2DB30EC91C694
                                                                            APIs
                                                                            • RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AllocateHeap
                                                                            • String ID:
                                                                            • API String ID: 1279760036-0
                                                                            • Opcode ID: 091c80118a57d95ebc2facbedd4e69ebcf5b938ae1e913472e35806a21779949
                                                                            • Instruction ID: 4903450aafda00484806ba385278610c2731405ed8485190d5fd86014b6ab98c
                                                                            • Opcode Fuzzy Hash: 091c80118a57d95ebc2facbedd4e69ebcf5b938ae1e913472e35806a21779949
                                                                            • Instruction Fuzzy Hash: 92E0ED3120062577FB2226669D05B5B365D9F033A2F160127EC0AA2283DF7CCC0081EF
                                                                            APIs
                                                                            • WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Startup
                                                                            • String ID:
                                                                            • API String ID: 724789610-0
                                                                            • Opcode ID: d1a3cfe2fad2e3cb4d6962b6d8b640ceb39eb3bb27a9d976f59a5119cf7f3e63
                                                                            • Instruction ID: a24ce82555f98f109a53945ea9c337c8597cdca763f75144b39f195b4e3f482d
                                                                            • Opcode Fuzzy Hash: d1a3cfe2fad2e3cb4d6962b6d8b640ceb39eb3bb27a9d976f59a5119cf7f3e63
                                                                            • Instruction Fuzzy Hash: 0DD0C9325586088AE620AAB4AD0B8A4775C8312615F0007AA6CA5835D2E6446A19C2AA
                                                                            APIs
                                                                            • std::_Deallocate.LIBCONCRT ref: 00402E2B
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Deallocatestd::_
                                                                            • String ID:
                                                                            • API String ID: 1323251999-0
                                                                            • Opcode ID: 1728ba59e3f5797c2b26d6c1ec3f14ce13f4925b5309dcbb8e7c7e422a6d3f49
                                                                            • Instruction ID: a1ed0c2070530d0d1545540182683da5b3cb4a6c90a46b83737b9b29f97d9faa
                                                                            • Opcode Fuzzy Hash: 1728ba59e3f5797c2b26d6c1ec3f14ce13f4925b5309dcbb8e7c7e422a6d3f49
                                                                            • Instruction Fuzzy Hash: FFB092364442007ACA026640AC86F5EB762ABA4710F14C92ABA9A281E2D6B74268A647
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: send
                                                                            • String ID:
                                                                            • API String ID: 2809346765-0
                                                                            • Opcode ID: a64cf630b3b4fcbf92e6cf8d3c010959396a6b24f5439efeece66edae75e3506
                                                                            • Instruction ID: 80dceff54fd7c7607e374e8a405dba3f032bb15cdc3f4a53630576a73fa931ff
                                                                            • Opcode Fuzzy Hash: a64cf630b3b4fcbf92e6cf8d3c010959396a6b24f5439efeece66edae75e3506
                                                                            • Instruction Fuzzy Hash: 79B09279108202FFCB150B60CD0887A7EAAABC8381F008A2CB187411B1C636C852AB26
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: recv
                                                                            • String ID:
                                                                            • API String ID: 1507349165-0
                                                                            • Opcode ID: 12f17b9eb2b05ccee17ecde8d051cd75af37e2c2e0a2002d53484fbbe037e517
                                                                            • Instruction ID: 54da5cb0358175ea3eef87e0ba5f02fe09cc36e19498aa822303b7a5c5cf0de8
                                                                            • Opcode Fuzzy Hash: 12f17b9eb2b05ccee17ecde8d051cd75af37e2c2e0a2002d53484fbbe037e517
                                                                            • Instruction Fuzzy Hash: 38B09B75108302FFC6150750CC0486A7D66DBC8351B00481C714641170C736C8519725
                                                                            APIs
                                                                            • VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411DE7,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CB3
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AllocVirtual
                                                                            • String ID:
                                                                            • API String ID: 4275171209-0
                                                                            • Opcode ID: 419aedcff02c784107df6911406269fb4724b8c0c47efc41c654e3b285a5c19f
                                                                            • Instruction ID: 079a7b638a28e99b338f4493b6ebfa8105bff269478f0661155a893ef6bf0f7e
                                                                            • Opcode Fuzzy Hash: 419aedcff02c784107df6911406269fb4724b8c0c47efc41c654e3b285a5c19f
                                                                            • Instruction Fuzzy Hash: 13B00872418382EBCF02DF90DD0492ABAB2BB88741F184C5CB2A14107187228428EB06
                                                                            APIs
                                                                            • SetEvent.KERNEL32(?,?), ref: 00407CB9
                                                                            • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407D87
                                                                            • DeleteFileW.KERNEL32(00000000), ref: 00407DA9
                                                                              • Part of subcall function 0041C291: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C2EC
                                                                              • Part of subcall function 0041C291: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C31C
                                                                              • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C371
                                                                              • Part of subcall function 0041C291: FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D2
                                                                              • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D9
                                                                              • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                              • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                              • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                                              • Part of subcall function 00404AA1: SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00408197
                                                                            • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 00408278
                                                                            • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084C4
                                                                            • DeleteFileA.KERNEL32(?), ref: 00408652
                                                                              • Part of subcall function 0040880C: __EH_prolog.LIBCMT ref: 00408811
                                                                              • Part of subcall function 0040880C: FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
                                                                              • Part of subcall function 0040880C: __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
                                                                              • Part of subcall function 0040880C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
                                                                            • Sleep.KERNEL32(000007D0), ref: 004086F8
                                                                            • StrToIntA.SHLWAPI(00000000,00000000), ref: 0040873A
                                                                              • Part of subcall function 0041C9E2: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CAD7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                                                                            • String ID: (PG$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$XPG$XPG$XPG$XPG$open$NG
                                                                            • API String ID: 1067849700-181434739
                                                                            • Opcode ID: 4f0a3b0f1ca213c31ba693d5839a498b0a579a4c622c7a55dee94c50121fcbd2
                                                                            • Instruction ID: 75e26f7f6c3f3dbd7fc3c9379f58c72dc3a715cd35b24c1fb8b7d51949cc7e38
                                                                            • Opcode Fuzzy Hash: 4f0a3b0f1ca213c31ba693d5839a498b0a579a4c622c7a55dee94c50121fcbd2
                                                                            • Instruction Fuzzy Hash: FE427F71A043016BC604FB76C95B9AE77A5AF91348F40093FF542671E2EE7C9A08879B
                                                                            APIs
                                                                            • __Init_thread_footer.LIBCMT ref: 004056E6
                                                                              • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                            • __Init_thread_footer.LIBCMT ref: 00405723
                                                                            • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660BC,00000000), ref: 004057B6
                                                                            • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
                                                                            • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
                                                                            • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                                                                            • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004058BC
                                                                            • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                                                                              • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                                            • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90,004660C0,00000062,004660A4), ref: 004059E4
                                                                            • Sleep.KERNEL32(00000064,00000062,004660A4), ref: 004059FE
                                                                            • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                                                                            • CloseHandle.KERNEL32 ref: 00405A23
                                                                            • CloseHandle.KERNEL32 ref: 00405A2B
                                                                            • CloseHandle.KERNEL32 ref: 00405A3D
                                                                            • CloseHandle.KERNEL32 ref: 00405A45
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                                            • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
                                                                            • API String ID: 2994406822-18413064
                                                                            • Opcode ID: d0319069468d25062846aed60bb8d383fef97adfbf9a67d4e884036c4e5c159d
                                                                            • Instruction ID: 70e6a120cd26ef4d63fea04585a98dfb86eec3f3f3d93349c630b188a9e88b71
                                                                            • Opcode Fuzzy Hash: d0319069468d25062846aed60bb8d383fef97adfbf9a67d4e884036c4e5c159d
                                                                            • Instruction Fuzzy Hash: 8891E471604604AFD711FB36ED42A6F369AEB84308F01443FF989A62E2DB7D9C448B5D
                                                                            APIs
                                                                            • GetCurrentProcessId.KERNEL32 ref: 00412106
                                                                              • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                                                                              • Part of subcall function 00413877: RegSetValueExA.KERNEL32(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                                                                              • Part of subcall function 00413877: RegCloseKey.KERNEL32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                                                                            • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00412146
                                                                            • CloseHandle.KERNEL32(00000000), ref: 00412155
                                                                            • CreateThread.KERNEL32(00000000,00000000,004127EE,00000000,00000000,00000000), ref: 004121AB
                                                                            • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0041241A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                                                            • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                                                                            • API String ID: 3018269243-13974260
                                                                            • Opcode ID: 4d69fa6792dad0da87534e6b05b3a9351cc29b890ff179ba718c84a48cf2319c
                                                                            • Instruction ID: 8205490d34a3093c97c97cf0412c87f535f0d81ed9353c04b1464aab831027f3
                                                                            • Opcode Fuzzy Hash: 4d69fa6792dad0da87534e6b05b3a9351cc29b890ff179ba718c84a48cf2319c
                                                                            • Instruction Fuzzy Hash: 2671813160430167C614FB72CD579AE73A4AF90308F50057FB546A61E2FFBC9949C69E
                                                                            APIs
                                                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBAF
                                                                            • FindClose.KERNEL32(00000000), ref: 0040BBC9
                                                                            • FindNextFileA.KERNEL32(00000000,?), ref: 0040BCEC
                                                                            • FindClose.KERNEL32(00000000), ref: 0040BD12
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Find$CloseFile$FirstNext
                                                                            • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                                                            • API String ID: 1164774033-3681987949
                                                                            • Opcode ID: 0727e96575f382ce024b770c9cf78de508cdcdbf02e88d565c43a0fb52ad4714
                                                                            • Instruction ID: 0369a90be492857ee26322cec2c2e6bc6ddf3692cf68474a737f8ca2a3b0d98c
                                                                            • Opcode Fuzzy Hash: 0727e96575f382ce024b770c9cf78de508cdcdbf02e88d565c43a0fb52ad4714
                                                                            • Instruction Fuzzy Hash: 13516E3190421A9ADB14F7B2DC56DEEB739AF11304F10057FF406721E2EF785A89CA89
                                                                            APIs
                                                                            • OpenClipboard.USER32 ref: 004168C2
                                                                            • EmptyClipboard.USER32 ref: 004168D0
                                                                            • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 004168F0
                                                                            • GlobalLock.KERNEL32(00000000), ref: 004168F9
                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 0041692F
                                                                            • SetClipboardData.USER32(0000000D,00000000), ref: 00416938
                                                                            • CloseClipboard.USER32 ref: 00416955
                                                                            • OpenClipboard.USER32 ref: 0041695C
                                                                            • GetClipboardData.USER32(0000000D), ref: 0041696C
                                                                            • GlobalLock.KERNEL32(00000000), ref: 00416975
                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
                                                                            • CloseClipboard.USER32 ref: 00416984
                                                                              • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                                            • String ID: !D@$hdF
                                                                            • API String ID: 3520204547-3475379602
                                                                            • Opcode ID: 5fe4074cd7d149717e633bf68acf1d051bb78dadfea4059d5945b4e12627a69d
                                                                            • Instruction ID: 9e7c9e91df33a813dd3aefbd505e3631e00017b2d00f6ad0929271c723fa7fba
                                                                            • Opcode Fuzzy Hash: 5fe4074cd7d149717e633bf68acf1d051bb78dadfea4059d5945b4e12627a69d
                                                                            • Instruction Fuzzy Hash: 9F212171604301DBD714BB71DC5DABE36A9AF88746F40043EF946921E2EF3C8D45C66A
                                                                            APIs
                                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,004750E4,?,00475338), ref: 0040F48E
                                                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00475338), ref: 0040F4B9
                                                                            • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F4D5
                                                                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F554
                                                                            • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00475338), ref: 0040F563
                                                                              • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                                                              • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                                                                            • CloseHandle.KERNEL32(00000000,?,00475338), ref: 0040F66E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                                                                            • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$hdF$hdF$ieinstal.exe$ielowutil.exe
                                                                            • API String ID: 3756808967-3633479162
                                                                            • Opcode ID: b29ae536f297d0a0eb7115235dc7a106a699a7bdd701e493a05402df9f1bfee3
                                                                            • Instruction ID: b3f00c97eb68dcc530bbf6735eb7028ff3362e05d7342ed3a56d945b0ce45bff
                                                                            • Opcode Fuzzy Hash: b29ae536f297d0a0eb7115235dc7a106a699a7bdd701e493a05402df9f1bfee3
                                                                            • Instruction Fuzzy Hash: F6715E705083419BC724FB21D8959AEB7A5AF90348F50083FF586631E3EF78994ECB5A
                                                                            APIs
                                                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDAF
                                                                            • FindClose.KERNEL32(00000000), ref: 0040BDC9
                                                                            • FindNextFileA.KERNEL32(00000000,?), ref: 0040BE89
                                                                            • FindClose.KERNEL32(00000000), ref: 0040BEAF
                                                                            • FindClose.KERNEL32(00000000), ref: 0040BED0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Find$Close$File$FirstNext
                                                                            • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                            • API String ID: 3527384056-432212279
                                                                            • Opcode ID: a832034822c3cb66eb5f8080b7cde16d67028b55a024d1e421a8b91fcbbd43ec
                                                                            • Instruction ID: daa8673b40617291cefb90f55d029d970aaced9502edc59260dc825ad40fac9f
                                                                            • Opcode Fuzzy Hash: a832034822c3cb66eb5f8080b7cde16d67028b55a024d1e421a8b91fcbbd43ec
                                                                            • Instruction Fuzzy Hash: 38417D3190021AAADB04F7A6DC5A9EEB769DF11704F50017FF506B20D2EF385A46CA9E
                                                                            APIs
                                                                            • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413417
                                                                            • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413425
                                                                            • GetFileSize.KERNEL32(?,00000000), ref: 00413432
                                                                            • UnmapViewOfFile.KERNEL32(00000000), ref: 00413452
                                                                            • CloseHandle.KERNEL32(00000000), ref: 0041345F
                                                                            • CloseHandle.KERNEL32(?), ref: 00413465
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                                                                            • String ID:
                                                                            • API String ID: 297527592-0
                                                                            • Opcode ID: cbaf96c0539d14e3bfc579cb390cbf1a6d01f92e477562203843d299bee7c5bd
                                                                            • Instruction ID: 9e0538afe5582c7c3c7070a3da709670e2bb39b60280b40541f30be5467d1837
                                                                            • Opcode Fuzzy Hash: cbaf96c0539d14e3bfc579cb390cbf1a6d01f92e477562203843d299bee7c5bd
                                                                            • Instruction Fuzzy Hash: ED41E631108305BBD7109F25DC4AF6B3BACEF89726F10092AFA14D51A2DF38DA40C66E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 0$1$2$3$4$5$6$7$VG
                                                                            • API String ID: 0-1861860590
                                                                            • Opcode ID: a0898ada7235e23996d16a558f3c20519f182ec80e29ad8a8220548995af58c0
                                                                            • Instruction ID: 08acf1e0be570df0aadc768861284cd9b307e7e5fc43d41925289fb9f64992c1
                                                                            • Opcode Fuzzy Hash: a0898ada7235e23996d16a558f3c20519f182ec80e29ad8a8220548995af58c0
                                                                            • Instruction Fuzzy Hash: A771B2709183019FD304EF21D862BAB7B94DF95310F10492FF5A26B2D1DF78AA49CB96
                                                                            APIs
                                                                            • _wcslen.LIBCMT ref: 00407521
                                                                            • CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Object_wcslen
                                                                            • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                                                            • API String ID: 240030777-3166923314
                                                                            • Opcode ID: c58fb5e2275a5e844cecf76189ae7002021d5fd77b9420cad953500b1bf3d6e9
                                                                            • Instruction ID: 36c1a35fc662e139fbe0c3856e6c09b73c1590006896ac343f6f9e6a2f87480d
                                                                            • Opcode Fuzzy Hash: c58fb5e2275a5e844cecf76189ae7002021d5fd77b9420cad953500b1bf3d6e9
                                                                            • Instruction Fuzzy Hash: 1D115172D04218BAD710E6959C45ADEB7A89B08714F15007BF904B2282E77CAA4486BA
                                                                            APIs
                                                                            • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A75E
                                                                            • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A7AD
                                                                            • GetLastError.KERNEL32 ref: 0041A7BB
                                                                            • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A7F3
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                                            • String ID:
                                                                            • API String ID: 3587775597-0
                                                                            • Opcode ID: 218ac53db928b89069dfe13c1956cb6f252ee8916d426474b77404009fca52e1
                                                                            • Instruction ID: 0905bbee584710e72bd43cf86ffd47af08151029a50ddcda7611e9b1cb6672f7
                                                                            • Opcode Fuzzy Hash: 218ac53db928b89069dfe13c1956cb6f252ee8916d426474b77404009fca52e1
                                                                            • Instruction Fuzzy Hash: A1815F71104305ABC304EB61D885DAFB7A8FF94749F50092FF585521A2EF78EE48CB9A
                                                                            APIs
                                                                            • FindFirstFileW.KERNEL32(00000000,?), ref: 00419D4B
                                                                            • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419E17
                                                                              • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: File$Find$CreateFirstNext
                                                                            • String ID: (eF$8SG$PXG$PXG$NG$PG
                                                                            • API String ID: 341183262-875132146
                                                                            • Opcode ID: 550122d42fc5c526583b54f9132fb2624797193b3490e4458ada79d0f7538eb3
                                                                            • Instruction ID: 96038134cf9b6260143958ba34f432c8b7c7433700823f8ab46a3e18139dd1a2
                                                                            • Opcode Fuzzy Hash: 550122d42fc5c526583b54f9132fb2624797193b3490e4458ada79d0f7538eb3
                                                                            • Instruction Fuzzy Hash: D48152315083415AC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
                                                                            APIs
                                                                              • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                              • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                              • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                              • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                              • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                                                                              • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                                                                            • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0045271C
                                                                            • IsValidCodePage.KERNEL32(00000000), ref: 00452777
                                                                            • IsValidLocale.KERNEL32(?,00000001), ref: 00452786
                                                                            • GetLocaleInfoW.KERNEL32(?,00001001,lJD,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 004527CE
                                                                            • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 004527ED
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                                            • String ID: lJD$lJD$lJD
                                                                            • API String ID: 745075371-479184356
                                                                            • Opcode ID: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
                                                                            • Instruction ID: 5597d49bf91f8be5c1e88387600e3254545b136a20640e737b6730ed74bf2304
                                                                            • Opcode Fuzzy Hash: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
                                                                            • Instruction Fuzzy Hash: 87518371900205ABDF10DFA5CD41ABF77B8AF19702F14047BFD04E7292E7B899488B69
                                                                            APIs
                                                                            • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C2EC
                                                                            • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C31C
                                                                            • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C38E
                                                                            • DeleteFileW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C39B
                                                                              • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C371
                                                                            • GetLastError.KERNEL32(?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3BC
                                                                            • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D2
                                                                            • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D9
                                                                            • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3E2
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                                            • String ID:
                                                                            • API String ID: 2341273852-0
                                                                            • Opcode ID: 7754893f2187ba533a154fe4103e102bcae7ebd53560a2043af222d2c338aa0a
                                                                            • Instruction ID: c19bc5cae20e4253aafd1d57f534f4f4794eeb6ee7264df4fdb3445c687e6cd6
                                                                            • Opcode Fuzzy Hash: 7754893f2187ba533a154fe4103e102bcae7ebd53560a2043af222d2c338aa0a
                                                                            • Instruction Fuzzy Hash: 1331827294031CAADB24E7A1DC88EDB736CAF04305F4405FBF955D2152EB39DAC88B68
                                                                            APIs
                                                                            • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A2D3
                                                                            • SetWindowsHookExA.USER32(0000000D,0040A2A4,00000000), ref: 0040A2E1
                                                                            • GetLastError.KERNEL32 ref: 0040A2ED
                                                                              • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040A33B
                                                                            • TranslateMessage.USER32(?), ref: 0040A34A
                                                                            • DispatchMessageA.USER32(?), ref: 0040A355
                                                                            Strings
                                                                            • Keylogger initialization failure: error , xrefs: 0040A301
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                                            • String ID: Keylogger initialization failure: error
                                                                            • API String ID: 3219506041-952744263
                                                                            • Opcode ID: 784389c57917a66403d36cfbe4c1925fabc3d79994c5fb5fc7656e631033b074
                                                                            • Instruction ID: 26c2bdf112627336efb266b6f5317542b4ef4d62b82d8858756ad59ca9dca42a
                                                                            • Opcode Fuzzy Hash: 784389c57917a66403d36cfbe4c1925fabc3d79994c5fb5fc7656e631033b074
                                                                            • Instruction Fuzzy Hash: FA11BF32604301ABCB107F76DC0A86B77ECEA95716B10457EFC85E21D1EA38C910CBAA
                                                                            APIs
                                                                            • GetForegroundWindow.USER32(?,?,00000000), ref: 0040A416
                                                                            • GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A422
                                                                            • GetKeyboardLayout.USER32(00000000), ref: 0040A429
                                                                            • GetKeyState.USER32(00000010), ref: 0040A433
                                                                            • GetKeyboardState.USER32(?,?,00000000), ref: 0040A43E
                                                                            • ToUnicodeEx.USER32(00000054,?,?,?,00000010,00000000,00000000), ref: 0040A461
                                                                            • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4C1
                                                                            • ToUnicodeEx.USER32(00000054,?,?,?,00000010,00000000,00000000), ref: 0040A4FA
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                                                            • String ID:
                                                                            • API String ID: 1888522110-0
                                                                            • Opcode ID: 1426d82c345ce4546f91b0c1232e33bf95627ba5262886ba0939e80f39baf944
                                                                            • Instruction ID: 5ff565fa5b8df07833abad56ec5ecbabe923af01fc99f1944a330f9e709d98a3
                                                                            • Opcode Fuzzy Hash: 1426d82c345ce4546f91b0c1232e33bf95627ba5262886ba0939e80f39baf944
                                                                            • Instruction Fuzzy Hash: AE316D72504308FFD710DF94DC45F9BB7ECAB88705F01083AB645D61A0E7B5E9488BA6
                                                                            APIs
                                                                            • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 0041409D
                                                                            • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140A9
                                                                              • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                            • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 0041426A
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 00414271
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AddressCloseCreateLibraryLoadProcsend
                                                                            • String ID: SHDeleteKeyW$Shlwapi.dll
                                                                            • API String ID: 2127411465-314212984
                                                                            • Opcode ID: 1bc4b8a90b1fbf7cebb02437c039050db5a2362158894b52295861a68539e621
                                                                            • Instruction ID: ad322413622673165c78a8c4b5f48079e939d646f467ca97d3bec1feacf55119
                                                                            • Opcode Fuzzy Hash: 1bc4b8a90b1fbf7cebb02437c039050db5a2362158894b52295861a68539e621
                                                                            • Instruction Fuzzy Hash: F9B1F971A0430066CA14FB76DC5B9AF36A86FD1748F40053FF942771E2EE7C9A4886DA
                                                                            APIs
                                                                            • _free.LIBCMT ref: 00449212
                                                                            • _free.LIBCMT ref: 00449236
                                                                            • _free.LIBCMT ref: 004493BD
                                                                            • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F234), ref: 004493CF
                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 00449447
                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 00449474
                                                                            • _free.LIBCMT ref: 00449589
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                                            • String ID:
                                                                            • API String ID: 314583886-0
                                                                            • Opcode ID: 7c3b7828bc6274b5bd5b11a11cafc48e9b57d165ada4f59c78a52a9162688001
                                                                            • Instruction ID: 779aab753f07af14b01adf3fce5c8211df4e7f9331a35af1166ddbde82723190
                                                                            • Opcode Fuzzy Hash: 7c3b7828bc6274b5bd5b11a11cafc48e9b57d165ada4f59c78a52a9162688001
                                                                            • Instruction Fuzzy Hash: CAC15771900205ABFB24DF69CC41AAFBBA8EF46314F1405AFE89497381E7788E42D758
                                                                            APIs
                                                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FBC
                                                                            • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070A0
                                                                            Strings
                                                                            • open, xrefs: 00406FB6
                                                                            • C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, xrefs: 00407007, 0040712F
                                                                            • aF, xrefs: 00406FE0
                                                                            • aF, xrefs: 004070F1
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: DownloadExecuteFileShell
                                                                            • String ID: aF$ aF$C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe$open
                                                                            • API String ID: 2825088817-186884202
                                                                            • Opcode ID: 185b9f1ea44b2dd213e7f9d772a9dfa68d603553b464299ed1cd00630ea07924
                                                                            • Instruction ID: 27a8b34c094a82f854f2ee3e6b31e6014a71d41456184bc7540e3ceb6c1d0c01
                                                                            • Opcode Fuzzy Hash: 185b9f1ea44b2dd213e7f9d772a9dfa68d603553b464299ed1cd00630ea07924
                                                                            • Instruction Fuzzy Hash: 6561A171B0830166CA24FB76C8569BE37A59F81748F50093FB942772D2EE3C9905C69B
                                                                            APIs
                                                                            • __EH_prolog.LIBCMT ref: 00408811
                                                                            • FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
                                                                            • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
                                                                            • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A15
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                                                            • String ID: hdF
                                                                            • API String ID: 1771804793-665520524
                                                                            • Opcode ID: 424cc3ca3a0497321c2077cdad8e75081cf25018ce28f7d8cf7055535df6282b
                                                                            • Instruction ID: 1e810be39857a3d86828f92fa26e793a4655b35e172fafea17edde612d57cc14
                                                                            • Opcode Fuzzy Hash: 424cc3ca3a0497321c2077cdad8e75081cf25018ce28f7d8cf7055535df6282b
                                                                            • Instruction Fuzzy Hash: 16515F72900209AACF04FB61DD569ED7778AF11308F50417FB946B61E2EF389B48CB99
                                                                            APIs
                                                                              • Part of subcall function 00417952: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                                                                              • Part of subcall function 00417952: OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                                                                              • Part of subcall function 00417952: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                                                                              • Part of subcall function 00417952: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                                                                              • Part of subcall function 00417952: GetLastError.KERNEL32 ref: 0041799D
                                                                            • ExitWindowsEx.USER32(00000000,00000001), ref: 00416856
                                                                            • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 0041686B
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 00416872
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                                            • String ID: !D@$PowrProf.dll$SetSuspendState
                                                                            • API String ID: 1589313981-2876530381
                                                                            • Opcode ID: e7c390307ca86512a91751d7e62dadadbabe4fcdf829c95b6f4d20c46d015bea
                                                                            • Instruction ID: 15d3ae9bc4d358b9de40311b9e813ebd0b85961e95f80c383f5c7d57e5fc9640
                                                                            • Opcode Fuzzy Hash: e7c390307ca86512a91751d7e62dadadbabe4fcdf829c95b6f4d20c46d015bea
                                                                            • Instruction Fuzzy Hash: 6E21617060430256CB14FBB68856AAE63599F41788F41487FB442A72D3EF3CD845CBAE
                                                                            APIs
                                                                            • GetLocaleInfoW.KERNEL32(00000000,2000000B,00000000,00000002,00000000,?,?,?,0045275B,?,00000000), ref: 004524D5
                                                                            • GetLocaleInfoW.KERNEL32(00000000,20001004,00000000,00000002,00000000,?,?,?,0045275B,?,00000000), ref: 004524FE
                                                                            • GetACP.KERNEL32(?,?,0045275B,?,00000000), ref: 00452513
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: InfoLocale
                                                                            • String ID: ACP$OCP$['E
                                                                            • API String ID: 2299586839-2532616801
                                                                            • Opcode ID: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                                                                            • Instruction ID: 65f7b5195a5790e2d5819d7d4b0c6b76a8aa59636dcad79128a037cfc813d78c
                                                                            • Opcode Fuzzy Hash: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                                                                            • Instruction Fuzzy Hash: FD21F432600104A7DB348F54CF00AA773A6EB47B1AB168567EC09D7302F7BADD48C398
                                                                            APIs
                                                                            • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA4E
                                                                            • GetLastError.KERNEL32 ref: 0040BA58
                                                                            Strings
                                                                            • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA19
                                                                            • [Chrome StoredLogins found, cleared!], xrefs: 0040BA7E
                                                                            • [Chrome StoredLogins not found], xrefs: 0040BA72
                                                                            • UserProfile, xrefs: 0040BA1E
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: DeleteErrorFileLast
                                                                            • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                                                            • API String ID: 2018770650-1062637481
                                                                            • Opcode ID: c04ade68c18fbe0e569556c46b8928cb2529683c30f590f27aedceba8b26999c
                                                                            • Instruction ID: af402a2c9819bc64f7c9913ab42ffc044d60d1b3c88a69bbc3d4df1d4d30a246
                                                                            • Opcode Fuzzy Hash: c04ade68c18fbe0e569556c46b8928cb2529683c30f590f27aedceba8b26999c
                                                                            • Instruction Fuzzy Hash: 2D01A7B17801056AC70477B6CD5B9BE77249911704F50057FF802725E2FE7D59098ADE
                                                                            APIs
                                                                            • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                                                                            • OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                                                                            • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                                                                            • GetLastError.KERNEL32 ref: 0041799D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                                            • String ID: SeShutdownPrivilege
                                                                            • API String ID: 3534403312-3733053543
                                                                            • Opcode ID: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                                                                            • Instruction ID: b599e5caaba2c857c5a7044ea86e3d1b9a306509f9612008a7a3a71442eb1233
                                                                            • Opcode Fuzzy Hash: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                                                                            • Instruction Fuzzy Hash: 1EF03AB1801229FBDB109BA0EC4DEEF7FBCEF05612F100461B809A1092D7388E04CAB5
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: __floor_pentium4
                                                                            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                            • API String ID: 4168288129-2761157908
                                                                            • Opcode ID: df2971786bbf8e496eef17942e665dfb4286cfe499c735b5cf4645abbbd9631d
                                                                            • Instruction ID: adbfc57a6ba9eb8fd61ef87ee4788d0f45260f030e03b769905361500cdb2a19
                                                                            • Opcode Fuzzy Hash: df2971786bbf8e496eef17942e665dfb4286cfe499c735b5cf4645abbbd9631d
                                                                            • Instruction Fuzzy Hash: EBC26E71E046288FDB25CE28DD407EAB3B5EB85306F1541EBD80DE7241E778AE898F45
                                                                            APIs
                                                                            • __EH_prolog.LIBCMT ref: 00409258
                                                                              • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,004EC468,00000010), ref: 004048E0
                                                                              • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 004092F4
                                                                            • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00409352
                                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 004093AA
                                                                            • FindClose.KERNEL32(00000000), ref: 004093C1
                                                                              • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                                                                              • Part of subcall function 00404E26: SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                                                                              • Part of subcall function 00404E26: CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
                                                                            • FindClose.KERNEL32(00000000), ref: 004095B9
                                                                              • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                                              • Part of subcall function 00404AA1: SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                                                                            • String ID:
                                                                            • API String ID: 1824512719-0
                                                                            • Opcode ID: 5359d1f1f5ec55e8fa04aa43ea7b5fc98d6042629f049f959d9025e797737e4c
                                                                            • Instruction ID: 125c9cc0036adb3739497efb01147483584b5989e706bb19fe9a4109aadf0594
                                                                            • Opcode Fuzzy Hash: 5359d1f1f5ec55e8fa04aa43ea7b5fc98d6042629f049f959d9025e797737e4c
                                                                            • Instruction Fuzzy Hash: DCB18D32900109AACB14EBA1DD96AED7779AF04318F10417FF506B60E2EF785E49CB98
                                                                            APIs
                                                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A6A0,00000000), ref: 0041AA53
                                                                            • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A6A0,00000000), ref: 0041AA68
                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA75
                                                                            • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A6A0,00000000), ref: 0041AA80
                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA92
                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA95
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Service$CloseHandle$Open$ManagerStart
                                                                            • String ID:
                                                                            • API String ID: 276877138-0
                                                                            • Opcode ID: 111e85076d01054706f2f991706b46e80ee8a61e4468a13a30d99def3de89abc
                                                                            • Instruction ID: 9fefcdd13c5f6832e1e8d6374d810b05479d45f16fba084c356bea358aebaaee
                                                                            • Opcode Fuzzy Hash: 111e85076d01054706f2f991706b46e80ee8a61e4468a13a30d99def3de89abc
                                                                            • Instruction Fuzzy Hash: FCF08971101325AFD2119B619C88DFF2B6CDF85BA6B00082AF945921919B68CD49E9B9
                                                                            APIs
                                                                              • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                              • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                              • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                              • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                            • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00444A73,?,?,?,?,004444CA,?,00000004), ref: 00451DBA
                                                                            • _wcschr.LIBVCRUNTIME ref: 00451E4A
                                                                            • _wcschr.LIBVCRUNTIME ref: 00451E58
                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,sJD,00000000,?), ref: 00451EFB
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                                                            • String ID: sJD
                                                                            • API String ID: 4212172061-3536923933
                                                                            • Opcode ID: 7ea90a810ccb8eded513053f15f94d45dc96679ac5d2c45bddb92c1ff4a69e8d
                                                                            • Instruction ID: 601d6103ecad0283333aca7e4f79148897faf6e4cefa34abd84194fcdbd45a0d
                                                                            • Opcode Fuzzy Hash: 7ea90a810ccb8eded513053f15f94d45dc96679ac5d2c45bddb92c1ff4a69e8d
                                                                            • Instruction Fuzzy Hash: ED61FA35500606AAE724AB75CC86BBB73A8EF04316F14046FFD05D7292EB78ED48C769
                                                                            APIs
                                                                            • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407857
                                                                            • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040791F
                                                                              • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: FileFind$FirstNextsend
                                                                            • String ID: (eF$XPG$XPG
                                                                            • API String ID: 4113138495-1496965907
                                                                            • Opcode ID: d166ae521f506f81bff827e31850f01b3bd367880341ca49b1e38042f69ceaf6
                                                                            • Instruction ID: 6b6d716c6ecdfe6ec78918620e47e684a121d368db73a1555a51ac38f2ecb6eb
                                                                            • Opcode Fuzzy Hash: d166ae521f506f81bff827e31850f01b3bd367880341ca49b1e38042f69ceaf6
                                                                            • Instruction Fuzzy Hash: 212195325083419BC314FB61D855DEFB3ACAF90358F40493EF696621E1EF78AA09C65B
                                                                            APIs
                                                                            • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041B4B9
                                                                            • LoadResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4CD
                                                                            • LockResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4D4
                                                                            • SizeofResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4E3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Resource$FindLoadLockSizeof
                                                                            • String ID: SETTINGS
                                                                            • API String ID: 3473537107-594951305
                                                                            • Opcode ID: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                                                                            • Instruction ID: 65170a014006dd87783428e4339c5f85687a52ee3761dac8d56b05c0676c202a
                                                                            • Opcode Fuzzy Hash: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                                                                            • Instruction Fuzzy Hash: 8AE01A36200B22EBEB311BA5AC4CD473E29F7C97637100075F90596232CB798840DAA8
                                                                            APIs
                                                                            • __EH_prolog.LIBCMT ref: 0040966A
                                                                            • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 004096E2
                                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 0040970B
                                                                            • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00409722
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Find$File$CloseFirstH_prologNext
                                                                            • String ID:
                                                                            • API String ID: 1157919129-0
                                                                            • Opcode ID: e3f1c00805b5afe5740b2de69cf235d4ccb5fb3ac33055f1b93609b0d73a44d0
                                                                            • Instruction ID: bc6583c976318a9931a9d4e75bf6093b5b8d8c817350453c5398c0af4fd679c1
                                                                            • Opcode Fuzzy Hash: e3f1c00805b5afe5740b2de69cf235d4ccb5fb3ac33055f1b93609b0d73a44d0
                                                                            • Instruction Fuzzy Hash: 59812B329001199BCB15EBA1DC969EDB378AF14318F10417FE506B71E2EF78AE49CB58
                                                                            APIs
                                                                            • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CAD7
                                                                              • Part of subcall function 0041376F: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041377E
                                                                              • Part of subcall function 0041376F: RegSetValueExA.KERNEL32(?,004674B8,00000000,?,00000000,00000000,004752F0,?,?,0040F853,004674B8,5.0.0 Pro), ref: 004137A6
                                                                              • Part of subcall function 0041376F: RegCloseKey.KERNEL32(?,?,?,0040F853,004674B8,5.0.0 Pro), ref: 004137B1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CloseCreateInfoParametersSystemValue
                                                                            • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                                            • API String ID: 4127273184-3576401099
                                                                            • Opcode ID: f2c43ad2b54eca36b498e515dc1d07e136ae504e1b99f40133731ebf13c7e4dd
                                                                            • Instruction ID: 1197cbbb31bb874c57b9e92d70abebba424d259215afdbf251ae70ffa4d9d73d
                                                                            • Opcode Fuzzy Hash: f2c43ad2b54eca36b498e515dc1d07e136ae504e1b99f40133731ebf13c7e4dd
                                                                            • Instruction Fuzzy Hash: 7B1184B2BC021473D419313E5DABBBE28029743B51F94416BF6123A6C6E8DF0A8102CF
                                                                            APIs
                                                                              • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                              • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                              • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                              • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                              • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                                                                              • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452117
                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452168
                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452228
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorInfoLastLocale$_free$_abort
                                                                            • String ID:
                                                                            • API String ID: 2829624132-0
                                                                            • Opcode ID: b894af2e73636fd6e8af7e748ba09ab431642972e93d3e8eb2aea65845f920f8
                                                                            • Instruction ID: 4b80d7ab7a7ff47978e382ad652e238d088576b56b9f239e8998609391b98480
                                                                            • Opcode Fuzzy Hash: b894af2e73636fd6e8af7e748ba09ab431642972e93d3e8eb2aea65845f920f8
                                                                            • Instruction Fuzzy Hash: B961C1315006079BDB289F25CE82BBB77A8FF05306F1041ABED15C6642F7B89D89DB58
                                                                            APIs
                                                                            • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 100061DA
                                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 100061E4
                                                                            • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 100061F1
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                            • String ID:
                                                                            • API String ID: 3906539128-0
                                                                            • Opcode ID: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                                                                            • Instruction ID: da4494ed88e82f72bec2981ffd8ad716d5acf317cb547f21db02b9c2842d332f
                                                                            • Opcode Fuzzy Hash: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                                                                            • Instruction Fuzzy Hash: 4A31D37490122C9BEB21DF24DD88B8DBBB8EF08350F5041DAE81CA7265E7709F818F55
                                                                            APIs
                                                                            • IsDebuggerPresent.KERNEL32 ref: 0043BC1A
                                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0043BC24
                                                                            • UnhandledExceptionFilter.KERNEL32(?), ref: 0043BC31
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                            • String ID:
                                                                            • API String ID: 3906539128-0
                                                                            • Opcode ID: a72bbe9f24da65e63e608425843f2cf14cbf2294963ef3e60e5c7cfd459546ed
                                                                            • Instruction ID: cbfc558a7ca4bb69983b526de44ffd1abc81b2e56a4044740c9350c1ecaeaada
                                                                            • Opcode Fuzzy Hash: a72bbe9f24da65e63e608425843f2cf14cbf2294963ef3e60e5c7cfd459546ed
                                                                            • Instruction Fuzzy Hash: E131C27590121DABCB21DF65DD89BCDBBB8AF08311F5051EAE80CA6251EB349F858F48
                                                                            APIs
                                                                            • GetCurrentProcess.KERNEL32(?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004AD5
                                                                            • TerminateProcess.KERNEL32(00000000,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004ADC
                                                                            • ExitProcess.KERNEL32 ref: 10004AEE
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: Process$CurrentExitTerminate
                                                                            • String ID:
                                                                            • API String ID: 1703294689-0
                                                                            • Opcode ID: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                                                                            • Instruction ID: 67c7ca3480f18a9b01e05da0926f82de4ad888d39fdd55e1be860e0f4a97641b
                                                                            • Opcode Fuzzy Hash: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                                                                            • Instruction Fuzzy Hash: 04E04676000218AFEF01BF25CD48B493B6AEF013C1F128010F9088B029CB35ED52CA68
                                                                            APIs
                                                                            • GetCurrentProcess.KERNEL32(?,?,0044328B,?), ref: 004432D6
                                                                            • TerminateProcess.KERNEL32(00000000,?,0044328B,?), ref: 004432DD
                                                                            • ExitProcess.KERNEL32 ref: 004432EF
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Process$CurrentExitTerminate
                                                                            • String ID:
                                                                            • API String ID: 1703294689-0
                                                                            • Opcode ID: fda3935ef75a9da2a187ce407300f3730e4ebfece79a37869d002a8a215f2f15
                                                                            • Instruction ID: 3be6e6b92543006147ef5d7b2afd166c5ab2c5ffe072a920593a5ac20c7500e8
                                                                            • Opcode Fuzzy Hash: fda3935ef75a9da2a187ce407300f3730e4ebfece79a37869d002a8a215f2f15
                                                                            • Instruction Fuzzy Hash: D6E0BF31400244FBDF126F55DD0AA993B69FB40757F044469F90946232CB7ADE42CA98
                                                                            APIs
                                                                            • OpenClipboard.USER32(00000000), ref: 0040B711
                                                                            • GetClipboardData.USER32(0000000D), ref: 0040B71D
                                                                            • CloseClipboard.USER32 ref: 0040B725
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Clipboard$CloseDataOpen
                                                                            • String ID:
                                                                            • API String ID: 2058664381-0
                                                                            • Opcode ID: 4d0fbbebb282f7106d92c64efc68bf508b49e50d97736a7c67cfade53f4059c8
                                                                            • Instruction ID: a9752f6e69e3a39ef1c6dae57fb9473311d117e3f10fa11c4aa70225693e5904
                                                                            • Opcode Fuzzy Hash: 4d0fbbebb282f7106d92c64efc68bf508b49e50d97736a7c67cfade53f4059c8
                                                                            • Instruction Fuzzy Hash: 4FE0EC31645320EFC2209B609C49B9A6754DF95F52F41843AB905AB2D5DB78CC40C6AD
                                                                            APIs
                                                                            • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,00415FFF,00000000), ref: 0041BB14
                                                                            • NtSuspendProcess.NTDLL(00000000), ref: 0041BB21
                                                                            • CloseHandle.KERNEL32(00000000,?,?,00415FFF,00000000), ref: 0041BB2A
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Process$CloseHandleOpenSuspend
                                                                            • String ID:
                                                                            • API String ID: 1999457699-0
                                                                            • Opcode ID: 65307f06ae4da2db5a73601f3478dcd91fa25f5db04ba40a4c100ff3b6d3014e
                                                                            • Instruction ID: bc08a5c74f7a636e8823ed9fed2a710289fdff4cb0149baf3e3f1c1580a6a9c0
                                                                            • Opcode Fuzzy Hash: 65307f06ae4da2db5a73601f3478dcd91fa25f5db04ba40a4c100ff3b6d3014e
                                                                            • Instruction Fuzzy Hash: 96D05E36204231E3C32017AA7C0CE97AD68EFC5AA2705412AF804C26649B20CC01C6E8
                                                                            APIs
                                                                            • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,00416024,00000000), ref: 0041BB40
                                                                            • NtResumeProcess.NTDLL(00000000), ref: 0041BB4D
                                                                            • CloseHandle.KERNEL32(00000000,?,?,00416024,00000000), ref: 0041BB56
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Process$CloseHandleOpenResume
                                                                            • String ID:
                                                                            • API String ID: 3614150671-0
                                                                            • Opcode ID: 2a3aa994b22e7efaa36e689b3453aa0ec17d897c0eb19943e791a895e5fd105b
                                                                            • Instruction ID: 907c56f48a3137ad3e5a70bb4b43f8813844e3fa30c0a1486a2e097c633c30d6
                                                                            • Opcode Fuzzy Hash: 2a3aa994b22e7efaa36e689b3453aa0ec17d897c0eb19943e791a895e5fd105b
                                                                            • Instruction Fuzzy Hash: B8D05E36104121E3C220176A7C0CD97AE69EBC5AA2705412AF904C32619B20CC01C6F4
                                                                            APIs
                                                                            • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 00434C6B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: FeaturePresentProcessor
                                                                            • String ID: MZ@
                                                                            • API String ID: 2325560087-2978689999
                                                                            • Opcode ID: e737252210e65bd7558355cab1b99ff1055998ec76fc21d90816c5055d8ae967
                                                                            • Instruction ID: b6e659610939bc40af268f25ffb2b9965a4fe426cdd66f7fc4435c5297b2c53a
                                                                            • Opcode Fuzzy Hash: e737252210e65bd7558355cab1b99ff1055998ec76fc21d90816c5055d8ae967
                                                                            • Instruction Fuzzy Hash: EE515471D002089BEB24CF69D9856DEBBF4FB48354F24956BD819EB350D378AA80CF94
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: .
                                                                            • API String ID: 0-248832578
                                                                            • Opcode ID: d62ff9c274239ee522e16b5fb8162bf78a9045f13a61a74130903e5937500e37
                                                                            • Instruction ID: 9046c4836333a0efab45ea1e09b7d9ff5bbd95f87beecc7c41f4b92e1cb642f0
                                                                            • Opcode Fuzzy Hash: d62ff9c274239ee522e16b5fb8162bf78a9045f13a61a74130903e5937500e37
                                                                            • Instruction Fuzzy Hash: 45313771800159AFEB14CF74CC84EEA7BBEDB49384F200198F81997259E6319E448B60
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: .
                                                                            • API String ID: 0-248832578
                                                                            • Opcode ID: 6d782d14881953f3dc1aa7198760a6549ba6db1eba9a251ec7cea06479966fa1
                                                                            • Instruction ID: 28de479bcd0ee174bbf7ea2f8c467f6584cf945aa63ddb2e5cfeaaf716254919
                                                                            • Opcode Fuzzy Hash: 6d782d14881953f3dc1aa7198760a6549ba6db1eba9a251ec7cea06479966fa1
                                                                            • Instruction Fuzzy Hash: 233106B2900149AFEB249E7ACC85EEB7BBDEF45304F1001AEE819D7291E6349D458B54
                                                                            APIs
                                                                              • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                              • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                              • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                              • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                            • EnumSystemLocalesW.KERNEL32(004520C3,00000001,00000000,?,lJD,?,004526F0,00000000,?,?,?), ref: 0045200D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                            • String ID: lJD
                                                                            • API String ID: 1084509184-3316369744
                                                                            • Opcode ID: 8fcc83528109b8aaf498f975bbbcb34ae0404b7acadb8afce226787919ce0173
                                                                            • Instruction ID: 7d3ee128790e63e9d167a680a676634a6e0759605f9449bc3b94779c572ada63
                                                                            • Opcode Fuzzy Hash: 8fcc83528109b8aaf498f975bbbcb34ae0404b7acadb8afce226787919ce0173
                                                                            • Instruction Fuzzy Hash: E51125372007019FDB189F39C8916BABB91FF8075AB14482EEE4687B41D7B9A946CB44
                                                                            APIs
                                                                              • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                              • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                              • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                              • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                            • EnumSystemLocalesW.KERNEL32(00452313,00000001,?,?,lJD,?,004526B4,lJD,?,?,?,?,?,00444A6C,?,?), ref: 00452082
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                            • String ID: lJD
                                                                            • API String ID: 1084509184-3316369744
                                                                            • Opcode ID: acb24ebe04e4856a9c83d3494bcbe1da60fd92419c71b9527b23937778bf3cf5
                                                                            • Instruction ID: 5d4b7cb44ca553c54ae5d492338df10e7871f8ce083c0ea6e3a4370b1d871309
                                                                            • Opcode Fuzzy Hash: acb24ebe04e4856a9c83d3494bcbe1da60fd92419c71b9527b23937778bf3cf5
                                                                            • Instruction Fuzzy Hash: 44F0FF322003055FDB245F798881A7A7B95FB82769B14446EFE428B681D7F9AC02C604
                                                                            APIs
                                                                            • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,004444CA,?,00000004), ref: 00448940
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: InfoLocale
                                                                            • String ID: GetLocaleInfoEx
                                                                            • API String ID: 2299586839-2904428671
                                                                            • Opcode ID: 2d8ab5e4c08eb423885d267f31dc3d21c73ce0c4a0b39471804a4927225e8e03
                                                                            • Instruction ID: 280d24bb3358c3803ceca68c405fa8cd3b52f77a8ef21af096b961815111c089
                                                                            • Opcode Fuzzy Hash: 2d8ab5e4c08eb423885d267f31dc3d21c73ce0c4a0b39471804a4927225e8e03
                                                                            • Instruction Fuzzy Hash: D1F02B31A40308F7DB119F61DC02F7E7B15DF08751F10056EFC0926261CE399D159A9E
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3af37b45e0065d2a9e4b628ca9eba3ad08e75ba8402ba2670485150a8c7006c8
                                                                            • Instruction ID: a89a86a7c059f2ce1b75669fee0c4fca3fa64158462c9470c468cddaecc71d09
                                                                            • Opcode Fuzzy Hash: 3af37b45e0065d2a9e4b628ca9eba3ad08e75ba8402ba2670485150a8c7006c8
                                                                            • Instruction Fuzzy Hash: FB025D71E002199BEF14CFA9D8806AEBBF1FF49324F26416AD819E7344D734AE41CB85
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: f[A$NG
                                                                            • API String ID: 0-455929796
                                                                            • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                            • Instruction ID: 78f0f7b5b7642c22d8ee35c169576c4e0068381375f86828a5140fd971b96714
                                                                            • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                            • Instruction Fuzzy Hash: 9311E6BB24034143D6088A2DCCB85B7E797EADD321F7D626FF0424B758DB2AA9459608
                                                                            APIs
                                                                            • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,1000B5BC,?,?,00000008,?,?,1000B25C,00000000), ref: 1000B7EE
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: ExceptionRaise
                                                                            • String ID:
                                                                            • API String ID: 3997070919-0
                                                                            • Opcode ID: 5385f7ee1153a66eb2669645b58237e3e0719d9079e030963b5c19e75e4dc3f3
                                                                            • Instruction ID: c899a2dc376e060411cab8954cdd4c29929d9ba6cfa71f030d59b99a2ca162da
                                                                            • Opcode Fuzzy Hash: 5385f7ee1153a66eb2669645b58237e3e0719d9079e030963b5c19e75e4dc3f3
                                                                            • Instruction Fuzzy Hash: 0DB16B31610A09CFE755CF28C486B647BE0FF453A4F25C658E89ACF2A5C735E982CB40
                                                                            APIs
                                                                            • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00453326,?,?,00000008,?,?,004561DD,00000000), ref: 00453558
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ExceptionRaise
                                                                            • String ID:
                                                                            • API String ID: 3997070919-0
                                                                            • Opcode ID: 7607852d8e830f82297ee51b6d0742b1a7d4b3e0fd86a5f67b8f7d07b9d25eec
                                                                            • Instruction ID: ef9cfcefdd20db456822e604066c987cb5d00f1002a97bdaec88d2537339d9b1
                                                                            • Opcode Fuzzy Hash: 7607852d8e830f82297ee51b6d0742b1a7d4b3e0fd86a5f67b8f7d07b9d25eec
                                                                            • Instruction Fuzzy Hash: 40B16C311106089FD715CF28C48AB657BE0FF053A6F258659EC9ACF3A2C739DA96CB44
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 0
                                                                            • API String ID: 0-4108050209
                                                                            • Opcode ID: 1f1efbfc6b98b7ff63776831a751ef1758ce1d1abb45475947e68a2c5420a09b
                                                                            • Instruction ID: aa2317f629b7fe23c078ec1ce6c5eb8ae6c7f7e5ba67e2b2e47e92e01b9ebfde
                                                                            • Opcode Fuzzy Hash: 1f1efbfc6b98b7ff63776831a751ef1758ce1d1abb45475947e68a2c5420a09b
                                                                            • Instruction Fuzzy Hash: A4126F32B083008BD714EF6AD851A1FB3E2BFCC758F15892EF585A7391DA34E9058B46
                                                                            APIs
                                                                              • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                              • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                              • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                              • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                              • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                                                                              • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452367
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLast$_free$InfoLocale_abort
                                                                            • String ID:
                                                                            • API String ID: 1663032902-0
                                                                            • Opcode ID: 5e55e5787c0a8882e24d5b04e2b41f1e3a8b10b9440aec12057efb59017b927c
                                                                            • Instruction ID: a0857f467e030380fa261c038abb83aeded24e37e53cd803257bf99bba5c3bcd
                                                                            • Opcode Fuzzy Hash: 5e55e5787c0a8882e24d5b04e2b41f1e3a8b10b9440aec12057efb59017b927c
                                                                            • Instruction Fuzzy Hash: 0121B632550206ABDB249E35DD41BBA73A8EF05316F1001BFFD01D6242EBBC9D59CB58
                                                                            APIs
                                                                              • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                              • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                              • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                              • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                            • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,004522E1,00000000,00000000,?), ref: 0045256F
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLast$InfoLocale_abort_free
                                                                            • String ID:
                                                                            • API String ID: 2692324296-0
                                                                            • Opcode ID: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                                                            • Instruction ID: deb82abe2421a0f23b1c286da40711a82d27d1439ce4f734d0a93897c1f260ce
                                                                            • Opcode Fuzzy Hash: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                                                            • Instruction Fuzzy Hash: 3EF0993290011ABBDB245A20C916BBB3768EB01316F04046BEC05A3241FBB8FD05C698
                                                                            APIs
                                                                              • Part of subcall function 00445888: EnterCriticalSection.KERNEL32(-0006D41D,?,00442FDB,00000000,0046E928,0000000C,00442F96,?,?,?,00445B26,?,?,004482CA,00000001,00000364), ref: 00445897
                                                                            • EnumSystemLocalesW.KERNEL32(004483BE,00000001,0046EAD0,0000000C), ref: 0044843C
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                            • String ID:
                                                                            • API String ID: 1272433827-0
                                                                            • Opcode ID: 804d43dbd68489efcf8f22bf06177096911cc4f1bd16e2c376f90d23019e8210
                                                                            • Instruction ID: 9543b0ab25bad403ee5e8d2735ec903229a0e0f586434e65d0c90a277242bfd4
                                                                            • Opcode Fuzzy Hash: 804d43dbd68489efcf8f22bf06177096911cc4f1bd16e2c376f90d23019e8210
                                                                            • Instruction Fuzzy Hash: 6FF0AF72A50204EFE700EF69D946B8D37E0FB04725F10856AF414DB2A2CBB889808F09
                                                                            APIs
                                                                              • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                              • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                              • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                              • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                            • EnumSystemLocalesW.KERNEL32(00451EA7,00000001,?,?,?,00452712,lJD,?,?,?,?,?,00444A6C,?,?,?), ref: 00451F87
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                            • String ID:
                                                                            • API String ID: 1084509184-0
                                                                            • Opcode ID: 4d0c5cba832e86d7a557150270e3ca6bc4d6d332941df2bd00d727cb77582ebf
                                                                            • Instruction ID: 7090a925995da140c065d9916092b781359a33e81ca1c933e4536b6f4f09cf03
                                                                            • Opcode Fuzzy Hash: 4d0c5cba832e86d7a557150270e3ca6bc4d6d332941df2bd00d727cb77582ebf
                                                                            • Instruction Fuzzy Hash: A7F0203674020597CB04AF75C809B6A7F90EBC272AB06009AEE058B662C7799842C754
                                                                            APIs
                                                                            • SetUnhandledExceptionFilter.KERNEL32(Function_00034B53,0043487A), ref: 00434B4C
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ExceptionFilterUnhandled
                                                                            • String ID:
                                                                            • API String ID: 3192549508-0
                                                                            • Opcode ID: 94f820becb3d11eb86a2e9fe35426058ee7de7bf36e1f11b305b7456ad7b3320
                                                                            • Instruction ID: b2b6851a15331e9206a2225a79f218ff0d060d1473a4ca8ef9e7ab7021fb00da
                                                                            • Opcode Fuzzy Hash: 94f820becb3d11eb86a2e9fe35426058ee7de7bf36e1f11b305b7456ad7b3320
                                                                            • Instruction Fuzzy Hash:
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 0
                                                                            • API String ID: 0-4108050209
                                                                            • Opcode ID: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                                                                            • Instruction ID: cdd912994a32e16cda9accbda93f1ea0618352901e275441ec4d65c4c105c2b3
                                                                            • Opcode Fuzzy Hash: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                                                                            • Instruction Fuzzy Hash: 9C514771603648A7DF3489AB88567BF63899B0E344F18394BD882C73C3C62DED02975E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: @
                                                                            • API String ID: 0-2766056989
                                                                            • Opcode ID: d5e9d99cca5bd5e192b92381c11644beefd2514f072827777375d50a0dc20ebe
                                                                            • Instruction ID: e4f6ca204f58efd2523fb0dbef6dba8f744ce0bfcff40a2940ff04dc0a880f4e
                                                                            • Opcode Fuzzy Hash: d5e9d99cca5bd5e192b92381c11644beefd2514f072827777375d50a0dc20ebe
                                                                            • Instruction Fuzzy Hash: A841FB75A187558BC340CF29C58061BFBE1FFD8318F655A1EF889A3350D375E9428B86
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: f12bac2ceacaba3709f449de7301e54826307763cc64d35c491f096f7cc92462
                                                                            • Instruction ID: 44f99013a838546abf86f75096a930c39f9ce457c7277da91ad5f6740c4fb7fb
                                                                            • Opcode Fuzzy Hash: f12bac2ceacaba3709f449de7301e54826307763cc64d35c491f096f7cc92462
                                                                            • Instruction Fuzzy Hash: 89628C316083958FD324DF28C48469ABBF1FF85384F154A2DE9E98B391E771D989CB42
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 5da51411db3bde963f465f05a0d8b0dbce9b500299d5c90620e57fed4b77625f
                                                                            • Instruction ID: ecf94096385373c2e9f2c5c276bef480e2dc0267d4a411ba40625ecd8b408152
                                                                            • Opcode Fuzzy Hash: 5da51411db3bde963f465f05a0d8b0dbce9b500299d5c90620e57fed4b77625f
                                                                            • Instruction Fuzzy Hash: 7F323831D69F014DE7239A35C862336A289BFB73C5F15D737F816B5AAAEB28C4834105
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 0a4864b27d88de382483843fe1db909133c688b67c113739af0c1ea374bb11c7
                                                                            • Instruction ID: 709358690f7fb2d2e3012b2358c769367bf3ff6314f01af24d3ecfcd65fe7181
                                                                            • Opcode Fuzzy Hash: 0a4864b27d88de382483843fe1db909133c688b67c113739af0c1ea374bb11c7
                                                                            • Instruction Fuzzy Hash: 443290716087459BD715DE28C4807AAB7E1BF84318F044A3EF89587392D778DD8BCB8A
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: f41a5a7a899c2c5ffe641ad63b885c2af5ab7072673c771f4bdde5d7e27c8b4e
                                                                            • Instruction ID: c5d71c01a3a4c2ba568a1e95f45065819b1df519d68335ab1a8a94a68da0c1ef
                                                                            • Opcode Fuzzy Hash: f41a5a7a899c2c5ffe641ad63b885c2af5ab7072673c771f4bdde5d7e27c8b4e
                                                                            • Instruction Fuzzy Hash: 1002BFB17146519BC318CF2EEC8053AB7E1BB8D301745863EE495C7795EB34E922CB98
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: ab468733ab78125ba0c04a3e06e770d81fa6048f74458c9db32780a1fb096c70
                                                                            • Instruction ID: 4a18c9c21abf6ab3d0e9afb34562907cd60dbb70f6b305f111ae620774dcdf5c
                                                                            • Opcode Fuzzy Hash: ab468733ab78125ba0c04a3e06e770d81fa6048f74458c9db32780a1fb096c70
                                                                            • Instruction Fuzzy Hash: 42F18C716142559FC304DF1EE89182BB3E1FB89301B450A2EF5C2C7391DB79EA16CB9A
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                            • Instruction ID: b3ba5b81110409d95a5723b53b6c8744913893e641e186edab39e166e1bc966b
                                                                            • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                            • Instruction Fuzzy Hash: 7DC1B1723091930ADF2D4A3D853453FFBA15AA57B171A275FE8F2CB2C1EE18C524D524
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                            • Instruction ID: 7f684bb0481695d58232a2b0d47c85f4cbd32b92c5f53758fc2a28b9861b6fac
                                                                            • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                            • Instruction Fuzzy Hash: EAC1C5723092930ADF2D463D853453FFBA15AA57B171A275EE8F2CB2C5FE28C524C614
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                                            • Instruction ID: b4bbf9256ac03f5d23606f900b1ff113549fac5ad7a5b3908127750d008d8003
                                                                            • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                                            • Instruction Fuzzy Hash: FDC1B0B230D1930ADB3D4A3D953453FBBA15AA63B171A275ED8F2CB2C1FE18C524D624
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                            • Instruction ID: c0cc860fb011aaa8bec1e183ca1ba44e4399d72b3d9d4532b0ef978257cdf629
                                                                            • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                            • Instruction Fuzzy Hash: 08C1A0B230D1930ADB3D463D853853FBBA15AA67B171A276ED8F2CB2C1FE18C524D614
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e161149dfcfde14b0cd5a29c2f169de042b37c027391bcdbe844d1d06cbdb277
                                                                            • Instruction ID: 79373b44a76dcf5e8091c0b891bec819a00bcae964dee749e010b71610d2b526
                                                                            • Opcode Fuzzy Hash: e161149dfcfde14b0cd5a29c2f169de042b37c027391bcdbe844d1d06cbdb277
                                                                            • Instruction Fuzzy Hash: F7B1A5795142998ACF05EF28C4913F63BA1EF6A300F4851B9EC9DCF757D2398506EB24
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 912b91bcee59c5ac73c124bb0811566e2b40e5b970351445414cbd9e4b54fd2a
                                                                            • Instruction ID: 9176630f27626b4b14444871c43cfb7a364794bde640040d1d9abeeee83df0d0
                                                                            • Opcode Fuzzy Hash: 912b91bcee59c5ac73c124bb0811566e2b40e5b970351445414cbd9e4b54fd2a
                                                                            • Instruction Fuzzy Hash: E1614531602709E6EF349A2B48917BF2395AB1D304F58341BED42DB3C1D55DED428A1E
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c6b1042308d2b4dc2ea763a701fecb4f21cb89e1eeb5fcb47da04713de909616
                                                                            • Instruction ID: c8a25274eb6ace22fd939f207aba0bb726f52b15d0dfb3f1b2e2615f3a586ecc
                                                                            • Opcode Fuzzy Hash: c6b1042308d2b4dc2ea763a701fecb4f21cb89e1eeb5fcb47da04713de909616
                                                                            • Instruction Fuzzy Hash: B2619C71602609A6DA34496B8893BBF6394EB6D308F94341BE443DB3C1E61DEC43875E
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                                                                            • Instruction ID: b97fed3bff06dc01e1c808345b9e1576e5435f58d5e0cb17a963d6e43aa39459
                                                                            • Opcode Fuzzy Hash: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                                                                            • Instruction Fuzzy Hash: C8516A21E01A4496DB38892964D67BF67A99B1E304F18390FE443CB7C2C64DED06C35E
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 628fd2d23e3b9e8eddda9414cca102861cb20c2ab21f2c1c82199380d97b1b87
                                                                            • Instruction ID: 96b5c22f40dc969dc1399d427f9382315b517a9523814fa291cced01a0c32d8b
                                                                            • Opcode Fuzzy Hash: 628fd2d23e3b9e8eddda9414cca102861cb20c2ab21f2c1c82199380d97b1b87
                                                                            • Instruction Fuzzy Hash: 5B617E72A083059FC304DF35D581A5FB7E5AFCC318F510E2EF499D6151EA35EA088B86
                                                                            APIs
                                                                            • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418E90
                                                                            • CreateCompatibleDC.GDI32(00000000), ref: 00418E9D
                                                                              • Part of subcall function 00419325: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419355
                                                                            • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F13
                                                                            • DeleteDC.GDI32(00000000), ref: 00418F2A
                                                                            • DeleteDC.GDI32(00000000), ref: 00418F2D
                                                                            • DeleteObject.GDI32(00000000), ref: 00418F30
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 00418F51
                                                                            • DeleteDC.GDI32(00000000), ref: 00418F62
                                                                            • DeleteDC.GDI32(00000000), ref: 00418F65
                                                                            • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418F89
                                                                            • GetCursorInfo.USER32(?), ref: 00418FA7
                                                                            • GetIconInfo.USER32(?,?), ref: 00418FBD
                                                                            • DeleteObject.GDI32(?), ref: 00418FEC
                                                                            • DeleteObject.GDI32(?), ref: 00418FF9
                                                                            • DrawIcon.USER32(00000000,?,?,?), ref: 00419006
                                                                            • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 0041903C
                                                                            • GetObjectA.GDI32(00000000,00000018,?), ref: 00419068
                                                                            • LocalAlloc.KERNEL32(00000040,00000001), ref: 004190D5
                                                                            • GlobalAlloc.KERNEL32(00000000,?), ref: 00419144
                                                                            • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00419168
                                                                            • DeleteDC.GDI32(?), ref: 0041917C
                                                                            • DeleteDC.GDI32(00000000), ref: 0041917F
                                                                            • DeleteObject.GDI32(00000000), ref: 00419182
                                                                            • GlobalFree.KERNEL32(?), ref: 0041918D
                                                                            • DeleteObject.GDI32(00000000), ref: 00419241
                                                                            • GlobalFree.KERNEL32(?), ref: 00419248
                                                                            • DeleteDC.GDI32(?), ref: 00419258
                                                                            • DeleteDC.GDI32(00000000), ref: 00419263
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIconInfo$BitmapBitsCursorDisplayDrawEnumLocalSelectSettingsStretch
                                                                            • String ID: DISPLAY
                                                                            • API String ID: 4256916514-865373369
                                                                            • Opcode ID: 5878445abcc7e38958a11c6fc45375258217ed8cb904e3d4223a7c3e5df4666e
                                                                            • Instruction ID: c224b28d618b709f2792c20de920cdabb9de4a917dc726d0ffe82d87ba3e906a
                                                                            • Opcode Fuzzy Hash: 5878445abcc7e38958a11c6fc45375258217ed8cb904e3d4223a7c3e5df4666e
                                                                            • Instruction Fuzzy Hash: 75C14C71508301AFD720DF25DC44BABBBE9EB88715F00482EF98993291DB74ED45CB6A
                                                                            APIs
                                                                              • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                                                                              • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D51D
                                                                            • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D530
                                                                            • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D549
                                                                            • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D579
                                                                              • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                                                                              • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                                                                              • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A267,00000000,?,pth_unenc), ref: 0040B8D5
                                                                              • Part of subcall function 0041C3F1: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466468,00000000,00000000,0040D3F9,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C430
                                                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D7C4
                                                                            • ExitProcess.KERNEL32 ref: 0040D7D0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                            • String ID: """, 0$")$0qF$0qF$8SG$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$hdF$hpF$open$wend$while fso.FileExists("
                                                                            • API String ID: 1861856835-2780701618
                                                                            • Opcode ID: 3bfb276c11d89f16914988a403aa5f93b16cf90bdad716b7f02e5c42c1e00d42
                                                                            • Instruction ID: f0dedf37b1d13a6a68a2ae87fd6fc042f686ba0b246118386f774540a9e6bc24
                                                                            • Opcode Fuzzy Hash: 3bfb276c11d89f16914988a403aa5f93b16cf90bdad716b7f02e5c42c1e00d42
                                                                            • Instruction Fuzzy Hash: 2191A4716082005AC315FB62D8529AFB7A9AF91309F10443FB14AA71E3FF7C9D49C65E
                                                                            APIs
                                                                              • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                                                                              • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1A5
                                                                            • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1B8
                                                                            • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E8
                                                                            • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1F7
                                                                              • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                                                                              • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                                                                              • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A267,00000000,?,pth_unenc), ref: 0040B8D5
                                                                              • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,771B3530,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                                                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D412
                                                                            • ExitProcess.KERNEL32 ref: 0040D419
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                            • String ID: ")$.vbs$8SG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$hdF$hpF$open$pth_unenc$wend$while fso.FileExists("
                                                                            • API String ID: 3797177996-2616068718
                                                                            • Opcode ID: 6999d8c2b7defaa60ffa943b280e2abfec44f6b3cb2c77117b2a48e14078a800
                                                                            • Instruction ID: d7bb7cf55c4450259501d0c3086a2d123ad94ece798773e978a9ab54bd012bbb
                                                                            • Opcode Fuzzy Hash: 6999d8c2b7defaa60ffa943b280e2abfec44f6b3cb2c77117b2a48e14078a800
                                                                            • Instruction Fuzzy Hash: 9081B0716082005BC715FB62D8529AF77A8AFD1308F10483FB586A71E2EF7C9E49C65E
                                                                            APIs
                                                                            • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,004750E4,00000003), ref: 00412494
                                                                            • ExitProcess.KERNEL32(00000000), ref: 004124A0
                                                                            • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0041251A
                                                                            • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412529
                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00412534
                                                                            • CloseHandle.KERNEL32(00000000), ref: 0041253B
                                                                            • GetCurrentProcessId.KERNEL32 ref: 00412541
                                                                            • PathFileExistsW.SHLWAPI(?), ref: 00412572
                                                                            • GetTempPathW.KERNEL32(00000104,?), ref: 004125D5
                                                                            • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 004125EF
                                                                            • lstrcatW.KERNEL32(?,.exe), ref: 00412601
                                                                              • Part of subcall function 0041C3F1: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466468,00000000,00000000,0040D3F9,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C430
                                                                            • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00412641
                                                                            • Sleep.KERNEL32(000001F4), ref: 00412682
                                                                            • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412697
                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126A2
                                                                            • CloseHandle.KERNEL32(00000000), ref: 004126A9
                                                                            • GetCurrentProcessId.KERNEL32 ref: 004126AF
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                                                                            • String ID: .exe$8SG$WDH$exepath$open$temp_
                                                                            • API String ID: 2649220323-436679193
                                                                            • Opcode ID: 4f95786cf2f2c00e5bb866ed93791c3a94b5cceb6ba25eb1f7637f0f1d303f44
                                                                            • Instruction ID: 17e21f0bcac096b9b94ced5306d028ab2385f4d1d2402c2ee3c492442eb82615
                                                                            • Opcode Fuzzy Hash: 4f95786cf2f2c00e5bb866ed93791c3a94b5cceb6ba25eb1f7637f0f1d303f44
                                                                            • Instruction Fuzzy Hash: 4651B371A00315BBDB10ABA09C9AEFE336D9B04715F10406BF502E71D2EFBC8E85865D
                                                                            APIs
                                                                            • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B13C
                                                                            • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B150
                                                                            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660A4), ref: 0041B178
                                                                            • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00474EE0,00000000), ref: 0041B18E
                                                                            • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B1CF
                                                                            • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B1E7
                                                                            • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B1FC
                                                                            • SetEvent.KERNEL32 ref: 0041B219
                                                                            • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B22A
                                                                            • CloseHandle.KERNEL32 ref: 0041B23A
                                                                            • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B25C
                                                                            • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B266
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                                            • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                                                                            • API String ID: 738084811-2094122233
                                                                            • Opcode ID: 05f3acae96ab52dc4df31f363fd47b843a51916255cda885d09cc80cc35ee70c
                                                                            • Instruction ID: fe650b41180b39ed17604f18bcb9a712e211fca36760164052b554565c231c06
                                                                            • Opcode Fuzzy Hash: 05f3acae96ab52dc4df31f363fd47b843a51916255cda885d09cc80cc35ee70c
                                                                            • Instruction Fuzzy Hash: 0351A3B12842056AD314B771DC96ABF379CDB84358F10043FB64A521E2EF788D48CA6E
                                                                            APIs
                                                                            • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                                                            • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401B03
                                                                            • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401B13
                                                                            • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B23
                                                                            • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B33
                                                                            • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B43
                                                                            • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B54
                                                                            • WriteFile.KERNEL32(00000000,00472AAA,00000002,00000000,00000000), ref: 00401B65
                                                                            • WriteFile.KERNEL32(00000000,00472AAC,00000004,00000000,00000000), ref: 00401B75
                                                                            • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B85
                                                                            • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B96
                                                                            • WriteFile.KERNEL32(00000000,00472AB6,00000002,00000000,00000000), ref: 00401BA7
                                                                            • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401BB7
                                                                            • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BC7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: File$Write$Create
                                                                            • String ID: RIFF$WAVE$data$fmt
                                                                            • API String ID: 1602526932-4212202414
                                                                            • Opcode ID: 62b265300192e2cf3fc36ee1b19606fb2409bb2919511e1e0316a81c88f5e1bc
                                                                            • Instruction ID: 2ec91bc18be8700290cedec85ec8f66933089e8d2246bcc6fed4c3761e19f715
                                                                            • Opcode Fuzzy Hash: 62b265300192e2cf3fc36ee1b19606fb2409bb2919511e1e0316a81c88f5e1bc
                                                                            • Instruction Fuzzy Hash: EB414E72644308BAE210DA51DD86FBB7EECEB89B50F40441AF644D60C0D7A4E909DBB3
                                                                            APIs
                                                                            • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe,00000001,0040764D,C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe,00000003,00407675,004752D8,004076CE), ref: 00407284
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0040728D
                                                                            • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072A2
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 004072A5
                                                                            • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072B6
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 004072B9
                                                                            • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 004072CA
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 004072CD
                                                                            • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 004072DE
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 004072E1
                                                                            • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 004072F2
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 004072F5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AddressHandleModuleProc
                                                                            • String ID: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                                                            • API String ID: 1646373207-2634250704
                                                                            • Opcode ID: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
                                                                            • Instruction ID: f839149ce94c73eee9bda0254407c114f4740b95dc73f4bc012c28e2a4ae17e7
                                                                            • Opcode Fuzzy Hash: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
                                                                            • Instruction Fuzzy Hash: 520171E0E4431676DB216F3A6C54D4B6F9C9E5125131A087BB409E2292FEBCE800CE6D
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _free$EnvironmentVariable$_wcschr
                                                                            • String ID: @ L
                                                                            • API String ID: 3899193279-1698004427
                                                                            • Opcode ID: 12b2d8700cfafab1c51f31b0af1c60b5a90c67e430b3d12670f3d9796c815c4a
                                                                            • Instruction ID: f75d98bba309171a1893162bbba9979c566f834f65d54a181aa040c21db392b6
                                                                            • Opcode Fuzzy Hash: 12b2d8700cfafab1c51f31b0af1c60b5a90c67e430b3d12670f3d9796c815c4a
                                                                            • Instruction Fuzzy Hash: C4D13672D007006BFB20AF799D81A6B77A4EF01318F05427FE919A7382EB3D99058799
                                                                            APIs
                                                                              • Part of subcall function 10001CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D1B
                                                                              • Part of subcall function 10001CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 10001D37
                                                                              • Part of subcall function 10001CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D4B
                                                                            • _strlen.LIBCMT ref: 10001855
                                                                            • _strlen.LIBCMT ref: 10001869
                                                                            • _strlen.LIBCMT ref: 1000188B
                                                                            • _strlen.LIBCMT ref: 100018AE
                                                                            • _strlen.LIBCMT ref: 100018C8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: _strlen$File$CopyCreateDelete
                                                                            • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                                                            • API String ID: 3296212668-3023110444
                                                                            • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                            • Instruction ID: bb93a2ec4ecc4c0c7ac40ef0fbf5621e946fdf476ba73097d2750e43d9e064ca
                                                                            • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                            • Instruction Fuzzy Hash: 69612475D04218ABFF11CBE4C851BDEB7F9EF45280F00409AE604A7299EF706A45CF96
                                                                            APIs
                                                                            • _wcslen.LIBCMT ref: 0040CE07
                                                                            • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE20
                                                                            • CopyFileW.KERNEL32(C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe,00000000,00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040CED0
                                                                            • _wcslen.LIBCMT ref: 0040CEE6
                                                                            • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CF6E
                                                                            • CopyFileW.KERNEL32(C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe,00000000,00000000), ref: 0040CF84
                                                                            • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFC3
                                                                            • _wcslen.LIBCMT ref: 0040CFC6
                                                                            • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFDD
                                                                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004750E4,0000000E), ref: 0040D02D
                                                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000001), ref: 0040D04B
                                                                            • ExitProcess.KERNEL32 ref: 0040D062
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                                                            • String ID: 6$C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe$del$hdF$open
                                                                            • API String ID: 1579085052-2049344445
                                                                            • Opcode ID: 3086fcc41018f2ce909f9a72eeaa1e900af00283aa8feca1a43e8abaef8eac56
                                                                            • Instruction ID: 6918cae47ac4af68ec004dabb58255b0e3542cbe00f5913d2fcd66cab837b2ae
                                                                            • Opcode Fuzzy Hash: 3086fcc41018f2ce909f9a72eeaa1e900af00283aa8feca1a43e8abaef8eac56
                                                                            • Instruction Fuzzy Hash: CA51A620208302ABD605B7659C92A6F679D9F84719F10443FF609A62E3EFBC9D05866E
                                                                            APIs
                                                                            • lstrlenW.KERNEL32(?), ref: 0041C036
                                                                            • _memcmp.LIBVCRUNTIME ref: 0041C04E
                                                                            • lstrlenW.KERNEL32(?), ref: 0041C067
                                                                            • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041C0A2
                                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C0B5
                                                                            • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C0F9
                                                                            • lstrcmpW.KERNEL32(?,?), ref: 0041C114
                                                                            • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C12C
                                                                            • _wcslen.LIBCMT ref: 0041C13B
                                                                            • FindVolumeClose.KERNEL32(?), ref: 0041C15B
                                                                            • GetLastError.KERNEL32 ref: 0041C173
                                                                            • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C1A0
                                                                            • lstrcatW.KERNEL32(?,?), ref: 0041C1B9
                                                                            • lstrcpyW.KERNEL32(?,?), ref: 0041C1C8
                                                                            • GetLastError.KERNEL32 ref: 0041C1D0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                                                            • String ID: ?
                                                                            • API String ID: 3941738427-1684325040
                                                                            • Opcode ID: 8bb61c95002590c369f4a1d7d05134d86b2ad7932cc4dc2ebb1cdf4d201e776a
                                                                            • Instruction ID: a349862c8cee18361e8dc915c9858c0b302c9409c899df8dda18ff866c7f94c5
                                                                            • Opcode Fuzzy Hash: 8bb61c95002590c369f4a1d7d05134d86b2ad7932cc4dc2ebb1cdf4d201e776a
                                                                            • Instruction Fuzzy Hash: 8B416171584316EBD720DFA0DC889EB77ECAB49755F00092BF545C2261EB78C988CBDA
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: _strlen
                                                                            • String ID: %m$~$Gon~$~F@7$~dra
                                                                            • API String ID: 4218353326-230879103
                                                                            • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                            • Instruction ID: 2a57ee3bda34e0ca62253b4f9cdd28a92c7aa5ebcaa9e167bfd7dd38749d7a78
                                                                            • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                            • Instruction Fuzzy Hash: 9371F5B5D002685BEF11DBB49895BDF7BFCDB05280F104096E644D7246EB74EB85CBA0
                                                                            APIs
                                                                            • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00408CE3
                                                                            • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D1B
                                                                            • __aulldiv.LIBCMT ref: 00408D4D
                                                                              • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                              • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                            • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408E70
                                                                            • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408E8B
                                                                            • CloseHandle.KERNEL32(00000000), ref: 00408F64
                                                                            • CloseHandle.KERNEL32(00000000,00000052), ref: 00408FAE
                                                                            • CloseHandle.KERNEL32(00000000), ref: 00408FFC
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                                                                            • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $hdF$NG
                                                                            • API String ID: 3086580692-1206044436
                                                                            • Opcode ID: 3804643fd958a4ac374dec170b6c338a936134b2c724837e981c4b00b94c25ef
                                                                            • Instruction ID: 4fd1ef8f0950b8c70c5ee12d710945c0a569e6ad21e20d2a74dcf75f3ec9a52d
                                                                            • Opcode Fuzzy Hash: 3804643fd958a4ac374dec170b6c338a936134b2c724837e981c4b00b94c25ef
                                                                            • Instruction Fuzzy Hash: 95B193716083409BC314FB25C982AAFB7E5AFC4354F50492FF589622D2EF789945CB8B
                                                                            APIs
                                                                            • Sleep.KERNEL32(00001388), ref: 0040A740
                                                                              • Part of subcall function 0040A675: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A74D), ref: 0040A6AB
                                                                              • Part of subcall function 0040A675: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                                                                              • Part of subcall function 0040A675: Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                                                                              • Part of subcall function 0040A675: CloseHandle.KERNEL32(00000000,?,?,?,0040A74D), ref: 0040A6EE
                                                                            • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A77C
                                                                            • GetFileAttributesW.KERNEL32(00000000), ref: 0040A78D
                                                                            • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7A4
                                                                            • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 0040A81E
                                                                              • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                                                                            • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466468,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A927
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                                            • String ID: 8SG$8SG$hdF$pQG$pQG$PG$PG
                                                                            • API String ID: 3795512280-4009011672
                                                                            • Opcode ID: 91f6b9c06e9d4844e7c32ad32402956a2a8adfe33dd1ba7976fb2e6f12053f73
                                                                            • Instruction ID: 265ddfea45d140738b9a7e0f0353a6f5be26653907181caffe3561bb72ed66c0
                                                                            • Opcode Fuzzy Hash: 91f6b9c06e9d4844e7c32ad32402956a2a8adfe33dd1ba7976fb2e6f12053f73
                                                                            • Instruction Fuzzy Hash: A7517E716043055ACB09BB32C866ABE739A9F80349F00483FB642B71E2DF7C9D09865E
                                                                            APIs
                                                                            • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D5DA
                                                                            • GetCursorPos.USER32(?), ref: 0041D5E9
                                                                            • SetForegroundWindow.USER32(?), ref: 0041D5F2
                                                                            • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D60C
                                                                            • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D65D
                                                                            • ExitProcess.KERNEL32 ref: 0041D665
                                                                            • CreatePopupMenu.USER32 ref: 0041D66B
                                                                            • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D680
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                                            • String ID: Close
                                                                            • API String ID: 1657328048-3535843008
                                                                            • Opcode ID: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
                                                                            • Instruction ID: 483e3be36cf21f9f431d69439bfbb75804d706e25d1e382f075e68ac53faeb55
                                                                            • Opcode Fuzzy Hash: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
                                                                            • Instruction Fuzzy Hash: 392127B1944208FFDB194FA4ED0EAAA3B65FB08342F000135FA0A950B1D775EDA1EB5D
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _free$Info
                                                                            • String ID:
                                                                            • API String ID: 2509303402-0
                                                                            • Opcode ID: 9a1e8def710a50f9e802e5816f878b52a4fdf116ee4a506070fe770fe0ef34d2
                                                                            • Instruction ID: 88ee944febda996c7adaaf7605242af7944d99fb061a5fd2e4f26fad8993db39
                                                                            • Opcode Fuzzy Hash: 9a1e8def710a50f9e802e5816f878b52a4fdf116ee4a506070fe770fe0ef34d2
                                                                            • Instruction Fuzzy Hash: 75B1CD719006059FEF20DF69C881BEEBBB4FF09304F14412EF5A8A7242D6799D45CB65
                                                                            APIs
                                                                              • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                                                                              • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                                                                              • Part of subcall function 004136F8: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 00413714
                                                                              • Part of subcall function 004136F8: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 0041372D
                                                                              • Part of subcall function 004136F8: RegCloseKey.KERNEL32(00000000), ref: 00413738
                                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D859
                                                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D9B8
                                                                            • ExitProcess.KERNEL32 ref: 0040D9C4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                                            • String ID: """, 0$.vbs$8SG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$hdF$open
                                                                            • API String ID: 1913171305-51354631
                                                                            • Opcode ID: 46cd6bf0509e7030147452596fa32e8e8a107671da42907bde47147df3777d3b
                                                                            • Instruction ID: 6fc8d312854778a25908ca85050b1cee1951ef16e4956e50e312a563d71e527c
                                                                            • Opcode Fuzzy Hash: 46cd6bf0509e7030147452596fa32e8e8a107671da42907bde47147df3777d3b
                                                                            • Instruction Fuzzy Hash: 0C413A719001195ACB15FA62DC56DEEB778AF50309F10007FB10AB61E2EF785E4ACA98
                                                                            APIs
                                                                            • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414DD5
                                                                            • LoadLibraryA.KERNEL32(?), ref: 00414E17
                                                                            • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E37
                                                                            • FreeLibrary.KERNEL32(00000000), ref: 00414E3E
                                                                            • LoadLibraryA.KERNEL32(?), ref: 00414E76
                                                                            • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E88
                                                                            • FreeLibrary.KERNEL32(00000000), ref: 00414E8F
                                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00414E9E
                                                                            • FreeLibrary.KERNEL32(00000000), ref: 00414EB5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                                                            • String ID: \ws2_32$\wship6$getaddrinfo
                                                                            • API String ID: 2490988753-3078833738
                                                                            • Opcode ID: 5f1d90fefb9d3b4d80abd47ac0ceceaf8be97214d3ee7f7b1d429d579a686c66
                                                                            • Instruction ID: d7a8240acd80c680e6a706eb94e62412fcb65bdb905c2e3468e0ccb64a1f64dc
                                                                            • Opcode Fuzzy Hash: 5f1d90fefb9d3b4d80abd47ac0ceceaf8be97214d3ee7f7b1d429d579a686c66
                                                                            • Instruction Fuzzy Hash: 8C31D5B1902315A7C320EF65DC84EDBB7D8AF84744F004A2AF94893250D778DD858BEE
                                                                            APIs
                                                                            • ___free_lconv_mon.LIBCMT ref: 10007D06
                                                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 100090D7
                                                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 100090E9
                                                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 100090FB
                                                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 1000910D
                                                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 1000911F
                                                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 10009131
                                                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 10009143
                                                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 10009155
                                                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 10009167
                                                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 10009179
                                                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 1000918B
                                                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 1000919D
                                                                              • Part of subcall function 100090BA: _free.LIBCMT ref: 100091AF
                                                                            • _free.LIBCMT ref: 10007CFB
                                                                              • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                              • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                            • _free.LIBCMT ref: 10007D1D
                                                                            • _free.LIBCMT ref: 10007D32
                                                                            • _free.LIBCMT ref: 10007D3D
                                                                            • _free.LIBCMT ref: 10007D5F
                                                                            • _free.LIBCMT ref: 10007D72
                                                                            • _free.LIBCMT ref: 10007D80
                                                                            • _free.LIBCMT ref: 10007D8B
                                                                            • _free.LIBCMT ref: 10007DC3
                                                                            • _free.LIBCMT ref: 10007DCA
                                                                            • _free.LIBCMT ref: 10007DE7
                                                                            • _free.LIBCMT ref: 10007DFF
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                            • String ID:
                                                                            • API String ID: 161543041-0
                                                                            • Opcode ID: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                                                                            • Instruction ID: 6de9b84f5b51ee4e35cbeb1ed48e08772f21b212059d2ac72beb9c863e9ed859
                                                                            • Opcode Fuzzy Hash: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                                                                            • Instruction Fuzzy Hash: 90313931A04645EFFB21DA38E941B6A77FAFF002D1F11446AE84DDB159DE3ABC809B14
                                                                            APIs
                                                                            • ___free_lconv_mon.LIBCMT ref: 0045130A
                                                                              • Part of subcall function 00450502: _free.LIBCMT ref: 0045051F
                                                                              • Part of subcall function 00450502: _free.LIBCMT ref: 00450531
                                                                              • Part of subcall function 00450502: _free.LIBCMT ref: 00450543
                                                                              • Part of subcall function 00450502: _free.LIBCMT ref: 00450555
                                                                              • Part of subcall function 00450502: _free.LIBCMT ref: 00450567
                                                                              • Part of subcall function 00450502: _free.LIBCMT ref: 00450579
                                                                              • Part of subcall function 00450502: _free.LIBCMT ref: 0045058B
                                                                              • Part of subcall function 00450502: _free.LIBCMT ref: 0045059D
                                                                              • Part of subcall function 00450502: _free.LIBCMT ref: 004505AF
                                                                              • Part of subcall function 00450502: _free.LIBCMT ref: 004505C1
                                                                              • Part of subcall function 00450502: _free.LIBCMT ref: 004505D3
                                                                              • Part of subcall function 00450502: _free.LIBCMT ref: 004505E5
                                                                              • Part of subcall function 00450502: _free.LIBCMT ref: 004505F7
                                                                            • _free.LIBCMT ref: 004512FF
                                                                              • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                              • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                            • _free.LIBCMT ref: 00451321
                                                                            • _free.LIBCMT ref: 00451336
                                                                            • _free.LIBCMT ref: 00451341
                                                                            • _free.LIBCMT ref: 00451363
                                                                            • _free.LIBCMT ref: 00451376
                                                                            • _free.LIBCMT ref: 00451384
                                                                            • _free.LIBCMT ref: 0045138F
                                                                            • _free.LIBCMT ref: 004513C7
                                                                            • _free.LIBCMT ref: 004513CE
                                                                            • _free.LIBCMT ref: 004513EB
                                                                            • _free.LIBCMT ref: 00451403
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                            • String ID:
                                                                            • API String ID: 161543041-0
                                                                            • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                                            • Instruction ID: 673b37a441ff9bbb7eb6cd98574e5fa8379d72fae64c09c4febd1ea684bb8cd8
                                                                            • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                                            • Instruction Fuzzy Hash: 0E319E315007009FFB20AA7AD845B5B73E8EF0131AF50851FEC68D7662DF78AD448B59
                                                                            APIs
                                                                            • __EH_prolog.LIBCMT ref: 00419FB9
                                                                            • GdiplusStartup.GDIPLUS(00474ACC,?,00000000), ref: 00419FEB
                                                                            • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A077
                                                                            • Sleep.KERNEL32(000003E8), ref: 0041A0FD
                                                                            • GetLocalTime.KERNEL32(?), ref: 0041A105
                                                                            • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A1F4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                                                            • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i$PG$PG$PG
                                                                            • API String ID: 489098229-1431523004
                                                                            • Opcode ID: 396f7c805518ff44f8955f196189542a16df27791e11915e286bf7b11c64131f
                                                                            • Instruction ID: 65e100c03f0dda0ba9a952c873ad8774fe275ee1deca45487f64c7c8a8292b0e
                                                                            • Opcode Fuzzy Hash: 396f7c805518ff44f8955f196189542a16df27791e11915e286bf7b11c64131f
                                                                            • Instruction Fuzzy Hash: E7515D70A00215AACB14BBB5C8529ED7BA9AB44308F40403FF509AB1E2EF7C9D85C799
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _free
                                                                            • String ID:
                                                                            • API String ID: 269201875-0
                                                                            • Opcode ID: 47079874d6611f76b22abc1c1892e8562d414d23f3395fd45a7677fdf32a9ec5
                                                                            • Instruction ID: d910990a8472ee08c0279d8077499983e41ff25138a9859a729e4309013b5263
                                                                            • Opcode Fuzzy Hash: 47079874d6611f76b22abc1c1892e8562d414d23f3395fd45a7677fdf32a9ec5
                                                                            • Instruction Fuzzy Hash: E2C17476D40204AFEB20DBA9CC83FDE77B8AB19705F14015AFE05EB283D6B49D458798
                                                                            APIs
                                                                              • Part of subcall function 004558A9: CreateFileW.KERNEL32(00000000,00000000,?,00455C84,?,?,00000000,?,00455C84,00000000,0000000C), ref: 004558C6
                                                                            • GetLastError.KERNEL32 ref: 00455CEF
                                                                            • __dosmaperr.LIBCMT ref: 00455CF6
                                                                            • GetFileType.KERNEL32(00000000), ref: 00455D02
                                                                            • GetLastError.KERNEL32 ref: 00455D0C
                                                                            • __dosmaperr.LIBCMT ref: 00455D15
                                                                            • CloseHandle.KERNEL32(00000000), ref: 00455D35
                                                                            • CloseHandle.KERNEL32(?), ref: 00455E7F
                                                                            • GetLastError.KERNEL32 ref: 00455EB1
                                                                            • __dosmaperr.LIBCMT ref: 00455EB8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                            • String ID: H
                                                                            • API String ID: 4237864984-2852464175
                                                                            • Opcode ID: ad10cc44415123364ccf3ab0f87a2b5b2deaae059395c87e8052164914e7d7f7
                                                                            • Instruction ID: f4290dc4267d91ba683862cdaabef3013db21248f4240db41616def06e578eae
                                                                            • Opcode Fuzzy Hash: ad10cc44415123364ccf3ab0f87a2b5b2deaae059395c87e8052164914e7d7f7
                                                                            • Instruction Fuzzy Hash: D5A155329106049FDF19AF68DC617BE3BA0EB06325F14415EEC11EB392CB398D5ACB59
                                                                            APIs
                                                                            • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,0045405C,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00453E2F
                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453EB2
                                                                            • __alloca_probe_16.LIBCMT ref: 00453EEA
                                                                            • MultiByteToWideChar.KERNEL32(00000001,00000001,?,00000001,00000000,\@E,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F45
                                                                            • __alloca_probe_16.LIBCMT ref: 00453F94
                                                                            • MultiByteToWideChar.KERNEL32(00000001,00000009,00000001,00000000,00000000,00000000,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F5C
                                                                              • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                                            • MultiByteToWideChar.KERNEL32(00000001,00000001,00000001,00000000,00000000,?,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FD8
                                                                            • __freea.LIBCMT ref: 00454003
                                                                            • __freea.LIBCMT ref: 0045400F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                                                            • String ID: \@E
                                                                            • API String ID: 201697637-1814623452
                                                                            • Opcode ID: fb6195c260b9ae5d4324619eca1f95c452dc13a98459a94436f4153b7f964d62
                                                                            • Instruction ID: bd5a1837779a5f2dcb5c2ea5aeb828518df7829aba760434011a70bbc407b236
                                                                            • Opcode Fuzzy Hash: fb6195c260b9ae5d4324619eca1f95c452dc13a98459a94436f4153b7f964d62
                                                                            • Instruction Fuzzy Hash: E391F472E002069ADB209E65CC42AEFBBF59F09756F14052BFC01E7282D739DD89C768
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _free
                                                                            • String ID: \&G$\&G$`&G
                                                                            • API String ID: 269201875-253610517
                                                                            • Opcode ID: 3d3472b72281963140e8887de038e5b99b85b4a8b881428f5fb0b5852324da1c
                                                                            • Instruction ID: 0b3297c67b001fbc5a9f4fbe1fd197d652097ca420ae28a40b4f72db8b3ed5d1
                                                                            • Opcode Fuzzy Hash: 3d3472b72281963140e8887de038e5b99b85b4a8b881428f5fb0b5852324da1c
                                                                            • Instruction Fuzzy Hash: 77610475900204AFDB20CFA9C882B9ABBF4EF05315F14416BED58EB342D774AD458B98
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 65535$udp
                                                                            • API String ID: 0-1267037602
                                                                            • Opcode ID: c855b19cc43d9bec36cd86ac5f012ace8f0d54e169e32fa1a21da6d4488bf9b2
                                                                            • Instruction ID: ff24d6befd6f0703c902a6165bd45161ed4db0fb5f75d2635e7e580b9b2721aa
                                                                            • Opcode Fuzzy Hash: c855b19cc43d9bec36cd86ac5f012ace8f0d54e169e32fa1a21da6d4488bf9b2
                                                                            • Instruction Fuzzy Hash: EF51E7756093019FDB209B58E9057BB37A4AFC4755F08082FF881973A1E76DCCC1865E
                                                                            APIs
                                                                            • __Init_thread_footer.LIBCMT ref: 0040AD38
                                                                            • Sleep.KERNEL32(000001F4), ref: 0040AD43
                                                                            • GetForegroundWindow.USER32 ref: 0040AD49
                                                                            • GetWindowTextLengthW.USER32(00000000), ref: 0040AD52
                                                                            • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040AD86
                                                                            • Sleep.KERNEL32(000003E8), ref: 0040AE54
                                                                              • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                                                            • String ID: [${ User has been idle for $ minutes }$]
                                                                            • API String ID: 911427763-3954389425
                                                                            • Opcode ID: 0504ba795a07ec8e773f38fd37631b79ba9c28390160a9d48ad6aa0b4072649e
                                                                            • Instruction ID: 3d5ee5432c15115af2c0f1375ae13a0ba8112eb59c463c5c733e63bb31497985
                                                                            • Opcode Fuzzy Hash: 0504ba795a07ec8e773f38fd37631b79ba9c28390160a9d48ad6aa0b4072649e
                                                                            • Instruction Fuzzy Hash: 6D51B1316043419BD314FB21D846AAE7796AB84308F50093FF586A22E2EF7C9D45C69F
                                                                            APIs
                                                                            • OpenClipboard.USER32 ref: 00416941
                                                                            • EmptyClipboard.USER32 ref: 0041694F
                                                                            • CloseClipboard.USER32 ref: 00416955
                                                                            • OpenClipboard.USER32 ref: 0041695C
                                                                            • GetClipboardData.USER32(0000000D), ref: 0041696C
                                                                            • GlobalLock.KERNEL32(00000000), ref: 00416975
                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
                                                                            • CloseClipboard.USER32 ref: 00416984
                                                                              • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                                            • String ID: !D@$hdF
                                                                            • API String ID: 2172192267-3475379602
                                                                            • Opcode ID: 5dc307ca67fdebf6cc499d53330797a0c7353f18ef651a74d64d87c7de958bad
                                                                            • Instruction ID: 305b70c8a6b081cbeb1fc088e42579eafb4add048c4ccd3ac1cf7446a02d8759
                                                                            • Opcode Fuzzy Hash: 5dc307ca67fdebf6cc499d53330797a0c7353f18ef651a74d64d87c7de958bad
                                                                            • Instruction Fuzzy Hash: CC015E31214301DFC714BB72DC09AAE77A5AF88742F40047EF906821E2DF38CC44CA69
                                                                            APIs
                                                                            • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A892
                                                                            • GetLastError.KERNEL32(?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A89F
                                                                            • __dosmaperr.LIBCMT ref: 0043A8A6
                                                                            • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8D2
                                                                            • GetLastError.KERNEL32(?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8DC
                                                                            • __dosmaperr.LIBCMT ref: 0043A8E3
                                                                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D55,?), ref: 0043A926
                                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A930
                                                                            • __dosmaperr.LIBCMT ref: 0043A937
                                                                            • _free.LIBCMT ref: 0043A943
                                                                            • _free.LIBCMT ref: 0043A94A
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                                            • String ID:
                                                                            • API String ID: 2441525078-0
                                                                            • Opcode ID: dbaba6b5bf7e8e3101b206719032b6e5feaa877e1e5831e4faa096a05e69cc69
                                                                            • Instruction ID: 785efe6d9c8e3fffb8b85045f967b8474775cb8629fdf0d32462ae01257f7f2e
                                                                            • Opcode Fuzzy Hash: dbaba6b5bf7e8e3101b206719032b6e5feaa877e1e5831e4faa096a05e69cc69
                                                                            • Instruction Fuzzy Hash: FF31F57140420AFFDF01AFA5CC45DAF3B68EF09325F10021AF950662A1DB38CD21DB6A
                                                                            APIs
                                                                            • SetEvent.KERNEL32(?,?), ref: 004054BF
                                                                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040556F
                                                                            • TranslateMessage.USER32(?), ref: 0040557E
                                                                            • DispatchMessageA.USER32(?), ref: 00405589
                                                                            • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
                                                                            • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405679
                                                                              • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                                            • String ID: CloseChat$DisplayMessage$GetMessage
                                                                            • API String ID: 2956720200-749203953
                                                                            • Opcode ID: 2034418f8b0b6b739ac6ee338f4bccbf57815ff26b8fc240261a89f20db97106
                                                                            • Instruction ID: c1940132788662b917c5ec79ff16bb55de46c7435784779dc5fc992d72e4b12f
                                                                            • Opcode Fuzzy Hash: 2034418f8b0b6b739ac6ee338f4bccbf57815ff26b8fc240261a89f20db97106
                                                                            • Instruction Fuzzy Hash: CE41A171604701ABCB14FB75DC5A86F37A9AB85704F40093EF916A36E1EF3C8905CB9A
                                                                            APIs
                                                                              • Part of subcall function 00417F2C: __EH_prolog.LIBCMT ref: 00417F31
                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660A4), ref: 00417DDC
                                                                            • CloseHandle.KERNEL32(00000000), ref: 00417DE5
                                                                            • DeleteFileA.KERNEL32(00000000), ref: 00417DF4
                                                                            • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DA8
                                                                              • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                                                                            • String ID: 0VG$0VG$<$@$Temp
                                                                            • API String ID: 1704390241-2575729100
                                                                            • Opcode ID: c92f56b32030375566b7ec9392f9d96bbaf9532ed50e2dc3fe351fdc92585e77
                                                                            • Instruction ID: cfce1e327495ca125f9f778a73892d1ad62a3a088d665d9de3c725e9e650d499
                                                                            • Opcode Fuzzy Hash: c92f56b32030375566b7ec9392f9d96bbaf9532ed50e2dc3fe351fdc92585e77
                                                                            • Instruction Fuzzy Hash: 0E415F319002099BCB14FB62DC56AEE7775AF40318F50417EF506764E1EF7C1A8ACB99
                                                                            APIs
                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 00410E6E
                                                                            • int.LIBCPMT ref: 00410E81
                                                                              • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                                                                              • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
                                                                            • std::_Facet_Register.LIBCPMT ref: 00410EC1
                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 00410ECA
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00410EE8
                                                                            • __Init_thread_footer.LIBCMT ref: 00410F29
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                                                                            • String ID: ,kG$0kG$@!G
                                                                            • API String ID: 3815856325-312998898
                                                                            • Opcode ID: 104655b219d7360bbd62e7af1339e96782af3c0a0346709f02f53ac4a63324da
                                                                            • Instruction ID: 12cf7b7900226bd12227407fb3b1cbab205c4dd0745ae636880afd2a72082c2f
                                                                            • Opcode Fuzzy Hash: 104655b219d7360bbd62e7af1339e96782af3c0a0346709f02f53ac4a63324da
                                                                            • Instruction Fuzzy Hash: 162134329005249BC704EB6AD9428DE37A8EF48324F20056FF804A72D1DBB9AD81CB9D
                                                                            APIs
                                                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB1C
                                                                            • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB33
                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB40
                                                                            • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB4F
                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB60
                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB63
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Service$CloseHandle$Open$ControlManager
                                                                            • String ID:
                                                                            • API String ID: 221034970-0
                                                                            • Opcode ID: c44e113348d55063d712d49508ac41577e4e2f17bf3754f4eb0da61d9044c34d
                                                                            • Instruction ID: 6fbe0b082825830d9e24babaefac53afed48758aa8e56b4d18e4903ff4329a9c
                                                                            • Opcode Fuzzy Hash: c44e113348d55063d712d49508ac41577e4e2f17bf3754f4eb0da61d9044c34d
                                                                            • Instruction Fuzzy Hash: 41114C71901218AFD711AF64DCC4DFF3B7CDB42B62B000036FA05D2192DB289C46AAFA
                                                                            APIs
                                                                            • _free.LIBCMT ref: 100059EA
                                                                              • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                              • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                            • _free.LIBCMT ref: 100059F6
                                                                            • _free.LIBCMT ref: 10005A01
                                                                            • _free.LIBCMT ref: 10005A0C
                                                                            • _free.LIBCMT ref: 10005A17
                                                                            • _free.LIBCMT ref: 10005A22
                                                                            • _free.LIBCMT ref: 10005A2D
                                                                            • _free.LIBCMT ref: 10005A38
                                                                            • _free.LIBCMT ref: 10005A43
                                                                            • _free.LIBCMT ref: 10005A51
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                            • String ID:
                                                                            • API String ID: 776569668-0
                                                                            • Opcode ID: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                                                                            • Instruction ID: 60753d52f1e9cb5801f9add085180c5dd3fc305f79823ad6bc57240ee419c635
                                                                            • Opcode Fuzzy Hash: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                                                                            • Instruction Fuzzy Hash: BE11B97E514548FFEB11DF58D842CDE3FA9EF04291B4540A1BD088F12ADA32EE50AB84
                                                                            APIs
                                                                            • _free.LIBCMT ref: 00448135
                                                                              • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                              • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                            • _free.LIBCMT ref: 00448141
                                                                            • _free.LIBCMT ref: 0044814C
                                                                            • _free.LIBCMT ref: 00448157
                                                                            • _free.LIBCMT ref: 00448162
                                                                            • _free.LIBCMT ref: 0044816D
                                                                            • _free.LIBCMT ref: 00448178
                                                                            • _free.LIBCMT ref: 00448183
                                                                            • _free.LIBCMT ref: 0044818E
                                                                            • _free.LIBCMT ref: 0044819C
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                            • String ID:
                                                                            • API String ID: 776569668-0
                                                                            • Opcode ID: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
                                                                            • Instruction ID: 63500befab30bf138fa449b3e81d3956d19e40097f86fc95f12732a98ce5ff4f
                                                                            • Opcode Fuzzy Hash: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
                                                                            • Instruction Fuzzy Hash: C211B67A500508BFEB01EF96C842CDD3BA5FF05359B0240AAFA588F222DA35DF509BC5
                                                                            APIs
                                                                            • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041C6B1
                                                                            • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041C6F5
                                                                            • RegCloseKey.ADVAPI32(?), ref: 0041C9BF
                                                                            Strings
                                                                            • DisplayName, xrefs: 0041C73C
                                                                            • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 0041C6A7
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CloseEnumOpen
                                                                            • String ID: DisplayName$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                                            • API String ID: 1332880857-3614651759
                                                                            • Opcode ID: 356bfe9865ee6e98e7c7db8a7c03d2aabffaff362a87d8cf184468e27cb822f7
                                                                            • Instruction ID: af0903b0dab8fbea49832074ad132f154b97281cd99b968e1e8b6bf9777b958e
                                                                            • Opcode Fuzzy Hash: 356bfe9865ee6e98e7c7db8a7c03d2aabffaff362a87d8cf184468e27cb822f7
                                                                            • Instruction Fuzzy Hash: 248144711083419BC325EF11D851EEFB7E8BF94309F10492FB589921A1FF78AE49CA5A
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Eventinet_ntoa
                                                                            • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                                                                            • API String ID: 3578746661-3604713145
                                                                            • Opcode ID: 1f47df1e8167b3a50ef4c045e8701f593e31227bcdbd88ec0386224df8e12211
                                                                            • Instruction ID: 71dfdc03858149a45142756d2b421c0b7bbb6d70992310a40494c7f1f0681c69
                                                                            • Opcode Fuzzy Hash: 1f47df1e8167b3a50ef4c045e8701f593e31227bcdbd88ec0386224df8e12211
                                                                            • Instruction Fuzzy Hash: 0051C131A042015BC614FB36C91AAAE37A5AB85344F40453FF906A76F1EF7C8985C7DE
                                                                            APIs
                                                                            • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 004174F5
                                                                              • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                                                                            • Sleep.KERNEL32(00000064), ref: 00417521
                                                                            • DeleteFileW.KERNEL32(00000000), ref: 00417555
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: File$CreateDeleteExecuteShellSleep
                                                                            • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                                            • API String ID: 1462127192-2001430897
                                                                            • Opcode ID: 611b03a539f906c9b4f74eecec83b72d0843638f96fddad5b6b41ada01efbde0
                                                                            • Instruction ID: 51d64fe7c8a5c54eac4555a52c350958ac4104e8f54c8767ba2a87230734c78e
                                                                            • Opcode Fuzzy Hash: 611b03a539f906c9b4f74eecec83b72d0843638f96fddad5b6b41ada01efbde0
                                                                            • Instruction Fuzzy Hash: 1431307194011A9ADB04FB62DC96DED7779AF50309F40017EF606730E2EF785A8ACA9C
                                                                            APIs
                                                                            • GetCurrentProcess.KERNEL32(00472B14,00000000,004752D8,00003000,00000004,00000000,00000001), ref: 004073DD
                                                                            • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407656,C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe), ref: 0040749E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CurrentProcess
                                                                            • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                                                                            • API String ID: 2050909247-4242073005
                                                                            • Opcode ID: 1dcac826a5e52bf6061f4ebfcee704f683c74aacb316ad2bc9bf89965cfe4023
                                                                            • Instruction ID: f630994b7aed3d2c1b9b8fa2b3e4f68b22e8b08ead4833dea6669ff7d567ef23
                                                                            • Opcode Fuzzy Hash: 1dcac826a5e52bf6061f4ebfcee704f683c74aacb316ad2bc9bf89965cfe4023
                                                                            • Instruction Fuzzy Hash: 7031A471A04700ABD321FF65ED46F167BB8AB44305F10087EF515A6292E7B8B8448B6F
                                                                            APIs
                                                                            • _strftime.LIBCMT ref: 00401D50
                                                                              • Part of subcall function 00401A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                                                            • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000,?), ref: 00401E02
                                                                            • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401E40
                                                                            • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401E4F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                                                            • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
                                                                            • API String ID: 3809562944-243156785
                                                                            • Opcode ID: 8864fa9e8513f99a3f5eff352973bd08ec1db5dd8ad84d05466d2ed3165b0427
                                                                            • Instruction ID: 027c37fd5a1300b84eaed5fd93cda356eabc1c7fedb6cd9f381e221a57c36ff8
                                                                            • Opcode Fuzzy Hash: 8864fa9e8513f99a3f5eff352973bd08ec1db5dd8ad84d05466d2ed3165b0427
                                                                            • Instruction Fuzzy Hash: 383181315043019FC324EB21DD46A9A77A8EB84314F40443EF18DA21F2EFB89A49CB5E
                                                                            APIs
                                                                            • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BF9
                                                                            • waveInOpen.WINMM(00472AC0,000000FF,00472AA8,Function_00001D0B,00000000,00000000,00000024), ref: 00401C8F
                                                                            • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CE3
                                                                            • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CF2
                                                                            • waveInStart.WINMM ref: 00401CFE
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                                            • String ID: dMG$|MG$PG
                                                                            • API String ID: 1356121797-532278878
                                                                            • Opcode ID: 4847331a3159101abd2f471b23cb9d67ee169c85da226fed21ec568aa636ce6b
                                                                            • Instruction ID: ba088f7df0b955e0db37e5e5e2d8d6799d5f59e9c832501e8260ac80857d70f0
                                                                            • Opcode Fuzzy Hash: 4847331a3159101abd2f471b23cb9d67ee169c85da226fed21ec568aa636ce6b
                                                                            • Instruction Fuzzy Hash: 53212A71604201AFC739DF6AEE15A6A7BB6FB94715B00803FA10DD76B1DBB84881CB5C
                                                                            APIs
                                                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D476
                                                                              • Part of subcall function 0041D50F: RegisterClassExA.USER32(00000030), ref: 0041D55B
                                                                              • Part of subcall function 0041D50F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D576
                                                                              • Part of subcall function 0041D50F: GetLastError.KERNEL32 ref: 0041D580
                                                                            • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D4AD
                                                                            • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D4C7
                                                                            • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D4DD
                                                                            • TranslateMessage.USER32(?), ref: 0041D4E9
                                                                            • DispatchMessageA.USER32(?), ref: 0041D4F3
                                                                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041D500
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                                            • String ID: Remcos
                                                                            • API String ID: 1970332568-165870891
                                                                            • Opcode ID: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                                                                            • Instruction ID: 4ccd8a34d55b2cf311069b5b9598b364b65d9d4e2968dcdf9eb94a5ca0393a4d
                                                                            • Opcode Fuzzy Hash: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                                                                            • Instruction Fuzzy Hash: AC015271800245EBD7109FA5EC4CFEABB7CEB85705F004026F515930A1D778E885CB98
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 7d049b86027effad8d92042d9403d5bfe2ea3e93186a839875c543696ca89538
                                                                            • Instruction ID: c2c0890efeac2311cc0422bbb5d66c498191acafde20d8af94b1f6b0c86a236e
                                                                            • Opcode Fuzzy Hash: 7d049b86027effad8d92042d9403d5bfe2ea3e93186a839875c543696ca89538
                                                                            • Instruction Fuzzy Hash: 5AC1D770D04249AFEF11DFA9C881BAEBBB4EF09314F18415AE914A7392C77C9D41CB69
                                                                            APIs
                                                                            • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D1B
                                                                            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 10001D37
                                                                            • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D4B
                                                                            • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D58
                                                                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D72
                                                                            • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D7D
                                                                            • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D8A
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: File$Delete$CloseCopyCreateHandleReadSize
                                                                            • String ID:
                                                                            • API String ID: 1454806937-0
                                                                            • Opcode ID: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                                                                            • Instruction ID: 3114db45d92e83daf92c47a85baf70c14dd0292bf94a6379629bf72341f68b19
                                                                            • Opcode Fuzzy Hash: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                                                                            • Instruction Fuzzy Hash: 2221FCB594122CAFF710EBA08CCCFEF76ACEB08395F010566F515D2154D6709E458A70
                                                                            APIs
                                                                              • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                              • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                              • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                              • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                            • _memcmp.LIBVCRUNTIME ref: 00445423
                                                                            • _free.LIBCMT ref: 00445494
                                                                            • _free.LIBCMT ref: 004454AD
                                                                            • _free.LIBCMT ref: 004454DF
                                                                            • _free.LIBCMT ref: 004454E8
                                                                            • _free.LIBCMT ref: 004454F4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _free$ErrorLast$_abort_memcmp
                                                                            • String ID: C
                                                                            • API String ID: 1679612858-1037565863
                                                                            • Opcode ID: 0768c3d9e3dd940518f99a63cbcd3aeb961d046fc1a72f364ae26972a0ea9dca
                                                                            • Instruction ID: 551747f29a431029642ca2aca46be5bbca0cbe6c77a4b2ed9ddfbf6361621c56
                                                                            • Opcode Fuzzy Hash: 0768c3d9e3dd940518f99a63cbcd3aeb961d046fc1a72f364ae26972a0ea9dca
                                                                            • Instruction Fuzzy Hash: B2B13975A016199BEB24DF18C884BAEB7B4FF08308F5045EEE949A7351E774AE90CF44
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: tcp$udp
                                                                            • API String ID: 0-3725065008
                                                                            • Opcode ID: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                                                                            • Instruction ID: c6aeaafd44a905d145cb4251883953767b251f71b123717361be5a5837da4da2
                                                                            • Opcode Fuzzy Hash: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                                                                            • Instruction Fuzzy Hash: 637177B06083028FDB24CF65C480BABB7E4AFD4395F15442FF88986351E778DD858B9A
                                                                            APIs
                                                                            • __Init_thread_footer.LIBCMT ref: 004018BE
                                                                            • ExitThread.KERNEL32 ref: 004018F6
                                                                            • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00474EE0,00000000), ref: 00401A04
                                                                              • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                                            • String ID: PkG$XMG$NG$NG
                                                                            • API String ID: 1649129571-3151166067
                                                                            • Opcode ID: 13eeb22f2b879f4ded124f2feb41883baadf378155546bee5f2683eb9da998f6
                                                                            • Instruction ID: 5b8630810f78da979eb204bf693be1d55f2004797ab3201abec5cd50ea38d472
                                                                            • Opcode Fuzzy Hash: 13eeb22f2b879f4ded124f2feb41883baadf378155546bee5f2683eb9da998f6
                                                                            • Instruction Fuzzy Hash: BF41B4312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D49C75E
                                                                            APIs
                                                                            • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00413D46
                                                                              • Part of subcall function 00413A55: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
                                                                              • Part of subcall function 00413A55: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413AEB
                                                                              • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                            • RegCloseKey.ADVAPI32(00000000,004660A4,004660A4,00466468,00466468,00000071), ref: 00413EB4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CloseEnumInfoOpenQuerysend
                                                                            • String ID: hdF$xUG$NG$NG$TG
                                                                            • API String ID: 3114080316-2774981958
                                                                            • Opcode ID: d9771f4e7db5ae061ff1c4fa71029557430116f6cf1d7e6249c096721bf8ae0e
                                                                            • Instruction ID: 865164b8d80166fcad8b4517e5ed4c9fbafb7c73de3830c3e78154838722fbed
                                                                            • Opcode Fuzzy Hash: d9771f4e7db5ae061ff1c4fa71029557430116f6cf1d7e6249c096721bf8ae0e
                                                                            • Instruction Fuzzy Hash: 0B419E316082405BC324F726DC56AEF72959FD1348F40883FF54A671D2EF7C5949866E
                                                                            APIs
                                                                            • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00474EE0,00465FA4,?,00000000,00407FFC,00000000), ref: 004079C5
                                                                            • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,00407FFC,00000000,?,?,0000000A,00000000), ref: 00407A0D
                                                                              • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                            • CloseHandle.KERNEL32(00000000,?,00000000,00407FFC,00000000,?,?,0000000A,00000000), ref: 00407A4D
                                                                            • MoveFileW.KERNEL32(00000000,00000000), ref: 00407A6A
                                                                            • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407A95
                                                                            • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AA5
                                                                              • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(00000000,000000FF,?,00474EF8,00404C49,00000000,00000000,00000000,?,00474EF8,?), ref: 00404BA5
                                                                              • Part of subcall function 00404B96: SetEvent.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040548B), ref: 00404BC3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                                            • String ID: .part
                                                                            • API String ID: 1303771098-3499674018
                                                                            • Opcode ID: 2fe652ae2756e30b912233a0a1c0a4b7c35db9d316565695f3a0737a61b9c72a
                                                                            • Instruction ID: 3872d967715c28256f57216ae0d43a20e9ded80e7ed52efebe816600842ab993
                                                                            • Opcode Fuzzy Hash: 2fe652ae2756e30b912233a0a1c0a4b7c35db9d316565695f3a0737a61b9c72a
                                                                            • Instruction Fuzzy Hash: 7F318371508341AFC210EB21DC4599FB7A8FF94359F00493EB545A2192EB78EE48CB9A
                                                                            APIs
                                                                            • AllocConsole.KERNEL32(00475338), ref: 0041CDA4
                                                                            • GetConsoleWindow.KERNEL32 ref: 0041CDAA
                                                                            • ShowWindow.USER32(00000000,00000000), ref: 0041CDBD
                                                                            • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CDE2
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Console$Window$AllocOutputShow
                                                                            • String ID: Remcos v$5.0.0 Pro$CONOUT$
                                                                            • API String ID: 4067487056-2278869229
                                                                            • Opcode ID: 7204a5bae693ec2f4884850c6238c56aa94b879f8555490226ef59d43c8bca4e
                                                                            • Instruction ID: 3d4e39fb732e2b6cb40f789e287104da8d9afdf675614735db993d10cd8ea689
                                                                            • Opcode Fuzzy Hash: 7204a5bae693ec2f4884850c6238c56aa94b879f8555490226ef59d43c8bca4e
                                                                            • Instruction Fuzzy Hash: CD0188719803087AD610F7F1DC8BF9D776C5B14705F6004277604A70D3E7BD9954466E
                                                                            APIs
                                                                            • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042DD01,?,?,?,0044AE9A,00000001,00000001,?), ref: 0044ACA3
                                                                            • __alloca_probe_16.LIBCMT ref: 0044ACDB
                                                                            • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042DD01,?,?,?,0044AE9A,00000001,00000001,?), ref: 0044AD29
                                                                            • __alloca_probe_16.LIBCMT ref: 0044ADC0
                                                                            • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AE23
                                                                            • __freea.LIBCMT ref: 0044AE30
                                                                              • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                                            • __freea.LIBCMT ref: 0044AE39
                                                                            • __freea.LIBCMT ref: 0044AE5E
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                                            • String ID:
                                                                            • API String ID: 3864826663-0
                                                                            • Opcode ID: 118846f8b98fa7142c6fc34e08ba9c255994cc722e781db25b6080b075eb9fff
                                                                            • Instruction ID: b5b01290aead076256688b5938d42e4b2a7c64905c3dece0b68445a47d4ef5f6
                                                                            • Opcode Fuzzy Hash: 118846f8b98fa7142c6fc34e08ba9c255994cc722e781db25b6080b075eb9fff
                                                                            • Instruction Fuzzy Hash: 1F513A72680206AFFB258F64CC41EBF77AAEB44714F24462EFC14D6240EB38DC60875A
                                                                            APIs
                                                                            • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 004199CC
                                                                            • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004199ED
                                                                            • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A0D
                                                                            • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A21
                                                                            • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A37
                                                                            • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00419A54
                                                                            • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00419A6F
                                                                            • SendInput.USER32(00000001,?,0000001C,?,00000000), ref: 00419A8B
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: InputSend
                                                                            • String ID:
                                                                            • API String ID: 3431551938-0
                                                                            • Opcode ID: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
                                                                            • Instruction ID: babcb3f23bbfeda7ed9031f98f3524dfd9ae94bb4b0c65128b251ed995bccade
                                                                            • Opcode Fuzzy Hash: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
                                                                            • Instruction Fuzzy Hash: CE31B471558349AEE310CF51DC41BEBBBDCEF98B54F00080FF6808A181D2A6A9C88B97
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: __freea$__alloca_probe_16_free
                                                                            • String ID: a/p$am/pm$zD
                                                                            • API String ID: 2936374016-2723203690
                                                                            • Opcode ID: 582b27bd1da2528f23ecf4cf811f425633019422103e053086a59298c2d48650
                                                                            • Instruction ID: 9fbfa546a4d6e8c17a1525f8bb1fcc11d6b56032d3bbc67104e2604220ae0e85
                                                                            • Opcode Fuzzy Hash: 582b27bd1da2528f23ecf4cf811f425633019422103e053086a59298c2d48650
                                                                            • Instruction Fuzzy Hash: 6AD1D1B1918206CAFB249F68C845ABBB7B1FF05310F28415BE545AB351D33D9D43CBA9
                                                                            APIs
                                                                            • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
                                                                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413AEB
                                                                            • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 00413B8B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Enum$InfoQueryValue
                                                                            • String ID: [regsplt]$xUG$TG
                                                                            • API String ID: 3554306468-1165877943
                                                                            • Opcode ID: e62d4c854d6988f4c18472ee17f9dc6b2d4465e4c9d473c093292faa687a128b
                                                                            • Instruction ID: b9c9d149d6e4de0395087b00820169330fa190b61d8fc59f93bff107e3475f49
                                                                            • Opcode Fuzzy Hash: e62d4c854d6988f4c18472ee17f9dc6b2d4465e4c9d473c093292faa687a128b
                                                                            • Instruction Fuzzy Hash: E5511D72900219AADB11EB95DC85EEFB77DAF04305F10007AF505F6191EF786B48CBA9
                                                                            APIs
                                                                            • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,10009C07,?,00000000,?,00000000,00000000), ref: 100094D4
                                                                            • __fassign.LIBCMT ref: 1000954F
                                                                            • __fassign.LIBCMT ref: 1000956A
                                                                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 10009590
                                                                            • WriteFile.KERNEL32(?,?,00000000,10009C07,00000000,?,?,?,?,?,?,?,?,?,10009C07,?), ref: 100095AF
                                                                            • WriteFile.KERNEL32(?,?,00000001,10009C07,00000000,?,?,?,?,?,?,?,?,?,10009C07,?), ref: 100095E8
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                            • String ID:
                                                                            • API String ID: 1324828854-0
                                                                            • Opcode ID: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                                                                            • Instruction ID: 7b1e32e7ca62d622bc6abd4954a79b3a1191cf35157f5551c2bc05612337e78d
                                                                            • Opcode Fuzzy Hash: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                                                                            • Instruction Fuzzy Hash: D7519271D00249AFEB10CFA4CC95BDEBBF8EF09350F15811AE955E7295D731AA41CB60
                                                                            APIs
                                                                            • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,0044BB31,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B3FE
                                                                            • __fassign.LIBCMT ref: 0044B479
                                                                            • __fassign.LIBCMT ref: 0044B494
                                                                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B4BA
                                                                            • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BB31,00000000,?,?,?,?,?,?,?,?,?,0044BB31,?), ref: 0044B4D9
                                                                            • WriteFile.KERNEL32(?,?,00000001,0044BB31,00000000,?,?,?,?,?,?,?,?,?,0044BB31,?), ref: 0044B512
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                            • String ID:
                                                                            • API String ID: 1324828854-0
                                                                            • Opcode ID: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
                                                                            • Instruction ID: 24f44d390d373c30b0d8a34eda065edd0bccebe0da4884afe324d1cece3cc5ea
                                                                            • Opcode Fuzzy Hash: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
                                                                            • Instruction Fuzzy Hash: 0751D270900208AFDB10CFA8D885AEEFBF4EF09305F14856BE955E7292D734D941CBA9
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _free
                                                                            • String ID: D[E$D[E
                                                                            • API String ID: 269201875-3695742444
                                                                            • Opcode ID: a6e07d2e332d0ea6e1aa7b7f7b4c4c7b9128dbb8fddfed026ac15973f0d55745
                                                                            • Instruction ID: e1ec1e089ae9cf4c30c2343e7c59e1c9a5dba52e91c7d03f0b1416238821c5a9
                                                                            • Opcode Fuzzy Hash: a6e07d2e332d0ea6e1aa7b7f7b4c4c7b9128dbb8fddfed026ac15973f0d55745
                                                                            • Instruction Fuzzy Hash: 7A415B31A001046BEB216BBA8C4566F3BB4EF41336F96061BFC24D7293DA7C880D566D
                                                                            APIs
                                                                            • _ValidateLocalCookies.LIBCMT ref: 1000339B
                                                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 100033A3
                                                                            • _ValidateLocalCookies.LIBCMT ref: 10003431
                                                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 1000345C
                                                                            • _ValidateLocalCookies.LIBCMT ref: 100034B1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                            • String ID: csm
                                                                            • API String ID: 1170836740-1018135373
                                                                            • Opcode ID: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                                                                            • Instruction ID: 0a936c430148d26a69835db3fa9f683d01d5328c1142e13f0191aacd949c771e
                                                                            • Opcode Fuzzy Hash: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                                                                            • Instruction Fuzzy Hash: D141D678E042189BEB12CF68C880A9FBBF9EF453A4F10C155E9159F25AD731FA01CB91
                                                                            APIs
                                                                              • Part of subcall function 0041361B: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,004750E4), ref: 0041363D
                                                                              • Part of subcall function 0041361B: RegQueryValueExW.ADVAPI32(?,0040F313,00000000,00000000,?,00000400), ref: 0041365C
                                                                              • Part of subcall function 0041361B: RegCloseKey.ADVAPI32(?), ref: 00413665
                                                                              • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                                                                              • Part of subcall function 0041BFB7: IsWow64Process.KERNEL32(00000000,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFCF
                                                                            • _wcslen.LIBCMT ref: 0041B763
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Process$CloseCurrentOpenQueryValueWow64_wcslen
                                                                            • String ID: .exe$8SG$http\shell\open\command$program files (x86)\$program files\
                                                                            • API String ID: 3286818993-122982132
                                                                            • Opcode ID: beda08a1b1c40574d21245d8602e5e1f0d8846f63fd546cd604377887a79a677
                                                                            • Instruction ID: 0af867b59be632d30c611c6dccf556baefac66a2e67262e696d3f692bc65d575
                                                                            • Opcode Fuzzy Hash: beda08a1b1c40574d21245d8602e5e1f0d8846f63fd546cd604377887a79a677
                                                                            • Instruction Fuzzy Hash: 6721A472A002086BDB14BAB58CD6AFE766D9B85328F14043FF405B72C2EE7C9D494269
                                                                            APIs
                                                                              • Part of subcall function 004135A6: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                                                                              • Part of subcall function 004135A6: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 004135E7
                                                                              • Part of subcall function 004135A6: RegCloseKey.KERNEL32(?), ref: 004135F2
                                                                            • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BF6B
                                                                            • PathFileExistsA.SHLWAPI(?), ref: 0040BF78
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                                                            • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                                                            • API String ID: 1133728706-4073444585
                                                                            • Opcode ID: 00048b8d05e3f78b3bd6084bad38d3a6963e7e20b212bba954b275ecce9748fd
                                                                            • Instruction ID: 11f9a5ab4d81baf10890d677fe2d2a0774849eb970c5828eb217b404dd8a17fe
                                                                            • Opcode Fuzzy Hash: 00048b8d05e3f78b3bd6084bad38d3a6963e7e20b212bba954b275ecce9748fd
                                                                            • Instruction Fuzzy Hash: 38215271A4021AA6CB04F7B2CC569EE77699F10704F40017FE506B71D2EF7899498ADE
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b15328f38de36e2236e67be376e02f2a3afc52644fcc3b23babb247561bddb00
                                                                            • Instruction ID: 6cb1fb7365923ae9cd4386fa22a0d7cc2d4bdc50975796c61f51bb0de8f74700
                                                                            • Opcode Fuzzy Hash: b15328f38de36e2236e67be376e02f2a3afc52644fcc3b23babb247561bddb00
                                                                            • Instruction Fuzzy Hash: B9110272504214BAEB216F728C0496F3AACEF85326B52422BFD11C7252DE38CC41CAA8
                                                                            APIs
                                                                            • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466468,00000000,00000000,0040D3F9,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C430
                                                                            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041C44D
                                                                            • CloseHandle.KERNEL32(00000000), ref: 0041C459
                                                                            • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041C46A
                                                                            • CloseHandle.KERNEL32(00000000), ref: 0041C477
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: File$CloseHandle$CreatePointerWrite
                                                                            • String ID: hpF
                                                                            • API String ID: 1852769593-151379673
                                                                            • Opcode ID: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
                                                                            • Instruction ID: 5cb8be75c3dc4c1e2f747800af3fbfd5a98fa41e64789a84fd548ad7506a8702
                                                                            • Opcode Fuzzy Hash: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
                                                                            • Instruction Fuzzy Hash: B0110471288220FFEA104B24ACD9EFB739CEB46375F10462AF592C22C1C7259C81863A
                                                                            APIs
                                                                              • Part of subcall function 10009221: _free.LIBCMT ref: 1000924A
                                                                            • _free.LIBCMT ref: 100092AB
                                                                              • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                              • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                            • _free.LIBCMT ref: 100092B6
                                                                            • _free.LIBCMT ref: 100092C1
                                                                            • _free.LIBCMT ref: 10009315
                                                                            • _free.LIBCMT ref: 10009320
                                                                            • _free.LIBCMT ref: 1000932B
                                                                            • _free.LIBCMT ref: 10009336
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                            • String ID:
                                                                            • API String ID: 776569668-0
                                                                            • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                            • Instruction ID: 62dea9ede071ec04ae7e8d39c2d2a9b8d59ba4565e42afa4a1a73bd13a3591d1
                                                                            • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                            • Instruction Fuzzy Hash: 3E118E35548B08FAFA20EBB0EC47FCB7B9DEF04780F400824BA9DB6097DA25B5249751
                                                                            APIs
                                                                              • Part of subcall function 00450C41: _free.LIBCMT ref: 00450C6A
                                                                            • _free.LIBCMT ref: 00450F48
                                                                              • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                              • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                            • _free.LIBCMT ref: 00450F53
                                                                            • _free.LIBCMT ref: 00450F5E
                                                                            • _free.LIBCMT ref: 00450FB2
                                                                            • _free.LIBCMT ref: 00450FBD
                                                                            • _free.LIBCMT ref: 00450FC8
                                                                            • _free.LIBCMT ref: 00450FD3
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                            • String ID:
                                                                            • API String ID: 776569668-0
                                                                            • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                                            • Instruction ID: d9348172fd0740f80504453a64c2ebf0df3e8af845a5f6206b1ac0666941ab15
                                                                            • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                                            • Instruction Fuzzy Hash: B411A231540B04AAD625BB72CC47FCB779CAF0230BF44491EBEED66053D6ACB9085745
                                                                            APIs
                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 00411170
                                                                            • int.LIBCPMT ref: 00411183
                                                                              • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                                                                              • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
                                                                            • std::_Facet_Register.LIBCPMT ref: 004111C3
                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 004111CC
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 004111EA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                            • String ID: (mG
                                                                            • API String ID: 2536120697-4059303827
                                                                            • Opcode ID: 4358ddd6f05c9e1b133220cf21f5160a6bdd3ecf1c15f3e73f45c2fde7630a6a
                                                                            • Instruction ID: 9d9da6683174d9a5c92fa95d325e3547e0845688fcbb555b93a4fb26f280994d
                                                                            • Opcode Fuzzy Hash: 4358ddd6f05c9e1b133220cf21f5160a6bdd3ecf1c15f3e73f45c2fde7630a6a
                                                                            • Instruction Fuzzy Hash: 1411EB32900518A7CB14BB9AD8058DEBB79DF44354F10456FBE04A72D1DB789D40C7D9
                                                                            APIs
                                                                            • GetLastError.KERNEL32(?,?,0043A351,004392BE), ref: 0043A368
                                                                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A376
                                                                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A38F
                                                                            • SetLastError.KERNEL32(00000000,?,0043A351,004392BE), ref: 0043A3E1
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLastValue___vcrt_
                                                                            • String ID:
                                                                            • API String ID: 3852720340-0
                                                                            • Opcode ID: eac7a4b750c305e7b0904a447f782895729b7b2cae8ca2bab40c67d71c469531
                                                                            • Instruction ID: 5d53a0da36a7034647469206452edf011e0dcb0cee8899775f26e7a14c982385
                                                                            • Opcode Fuzzy Hash: eac7a4b750c305e7b0904a447f782895729b7b2cae8ca2bab40c67d71c469531
                                                                            • Instruction Fuzzy Hash: 7F01283214C3519EA61526796C86A6B2648EB0A7B9F30133FF918815F1EF594C90514D
                                                                            APIs
                                                                            • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe), ref: 004075D0
                                                                              • Part of subcall function 004074FD: _wcslen.LIBCMT ref: 00407521
                                                                              • Part of subcall function 004074FD: CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
                                                                            • CoUninitialize.OLE32 ref: 00407629
                                                                            Strings
                                                                            • [+] before ShellExec, xrefs: 004075F1
                                                                            • [+] ucmCMLuaUtilShellExecMethod, xrefs: 004075B5
                                                                            • C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, xrefs: 004075B0, 004075B3, 00407605
                                                                            • [+] ShellExec success, xrefs: 0040760E
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: InitializeObjectUninitialize_wcslen
                                                                            • String ID: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                                                            • API String ID: 3851391207-3500018646
                                                                            • Opcode ID: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
                                                                            • Instruction ID: 681a2da4e9d4b9e6b45db6330fec0c9e961fb52a18ca78f8243115a9baea1a6b
                                                                            • Opcode Fuzzy Hash: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
                                                                            • Instruction Fuzzy Hash: B201D272B087016BE2245B25DC0EF6B7758DB81729F11083FF902A61C2EBA9BC0145AB
                                                                            APIs
                                                                            • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BADD
                                                                            • GetLastError.KERNEL32 ref: 0040BAE7
                                                                            Strings
                                                                            • [Chrome Cookies found, cleared!], xrefs: 0040BB0D
                                                                            • UserProfile, xrefs: 0040BAAD
                                                                            • [Chrome Cookies not found], xrefs: 0040BB01
                                                                            • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAA8
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: DeleteErrorFileLast
                                                                            • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                                                            • API String ID: 2018770650-304995407
                                                                            • Opcode ID: 167214da9fedc2eb77704bddeaa2e6e6e0e18728c289feeb4f38cfb7b5f99995
                                                                            • Instruction ID: 6bc0ec4de36c0471385c24d45a27137009bd471b3f80e31671ebbef4da92dce6
                                                                            • Opcode Fuzzy Hash: 167214da9fedc2eb77704bddeaa2e6e6e0e18728c289feeb4f38cfb7b5f99995
                                                                            • Instruction Fuzzy Hash: 08018F31A402095ACA04BBBACD5B8BE7724E912714F50017BF802726E6FE7D5A059ADE
                                                                            Strings
                                                                            • Rmc-43JG4A, xrefs: 004076DA
                                                                            • C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, xrefs: 004076C4
                                                                            • hdF, xrefs: 004076A9
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe$Rmc-43JG4A$hdF
                                                                            • API String ID: 0-387997115
                                                                            • Opcode ID: a134d68e00a23aec850ce34bab2ba566fca7fbefa287618f70ce8b1be92ee060
                                                                            • Instruction ID: 1b954d03a55cc3c1a25a26db856d3c6076ddce7f3b9fad0ad77fefb3a3407f05
                                                                            • Opcode Fuzzy Hash: a134d68e00a23aec850ce34bab2ba566fca7fbefa287618f70ce8b1be92ee060
                                                                            • Instruction Fuzzy Hash: 2CF046B0F14A00EBCB0467655D186693A05A740356F404C77F907EA2F2EBBD5C41C61E
                                                                            APIs
                                                                            • _free.LIBCMT ref: 1000536F
                                                                              • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                              • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                            • _free.LIBCMT ref: 10005381
                                                                            • _free.LIBCMT ref: 10005394
                                                                            • _free.LIBCMT ref: 100053A5
                                                                            • _free.LIBCMT ref: 100053B6
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                            • String ID: 0sT
                                                                            • API String ID: 776569668-3007218522
                                                                            • Opcode ID: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                                                                            • Instruction ID: ba906e9feca9bc6e71cd1aa5ebacb8f64a9f241ffe6b13fedf7f16c4e4854dfa
                                                                            • Opcode Fuzzy Hash: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                                                                            • Instruction Fuzzy Hash: 38F0F478C18934EBF741DF28ADC140A3BB5F718A91342C15AFC1497279DB36D9429B84
                                                                            APIs
                                                                            • _free.LIBCMT ref: 00444066
                                                                              • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                              • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                            • _free.LIBCMT ref: 00444078
                                                                            • _free.LIBCMT ref: 0044408B
                                                                            • _free.LIBCMT ref: 0044409C
                                                                            • _free.LIBCMT ref: 004440AD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                            • String ID: @5L
                                                                            • API String ID: 776569668-1384160223
                                                                            • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                                            • Instruction ID: c4ed0220327abb1134bcf7d54e43c2409a3611c90002b0fe773cef56a7474a4d
                                                                            • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                                            • Instruction Fuzzy Hash: 11F03AB18009208FA631AF2DBD414053B61E705769346822BF62C62A70C7B94ED2CFCF
                                                                            APIs
                                                                            • __allrem.LIBCMT ref: 0043AC69
                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AC85
                                                                            • __allrem.LIBCMT ref: 0043AC9C
                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043ACBA
                                                                            • __allrem.LIBCMT ref: 0043ACD1
                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043ACEF
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                            • String ID:
                                                                            • API String ID: 1992179935-0
                                                                            • Opcode ID: 324a3f8db7a4af308d45995ace6313bc09822ddcf2faf4fc4501ccf235525b64
                                                                            • Instruction ID: 0cac597ccac2158415e78c81c2c349525783c2449c9f0a8280db41f57d0428da
                                                                            • Opcode Fuzzy Hash: 324a3f8db7a4af308d45995ace6313bc09822ddcf2faf4fc4501ccf235525b64
                                                                            • Instruction Fuzzy Hash: CC812B72640706ABE7209F29CC41B5BB3A9EF48324F24552FF590D7781EB7CE9108B5A
                                                                            APIs
                                                                            • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,10006FFD,00000000,?,?,?,10008A72,?,?,00000100), ref: 1000887B
                                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,10008A72,?,?,00000100,5EFC4D8B,?,?), ref: 10008901
                                                                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 100089FB
                                                                            • __freea.LIBCMT ref: 10008A08
                                                                              • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                            • __freea.LIBCMT ref: 10008A11
                                                                            • __freea.LIBCMT ref: 10008A36
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                            • String ID:
                                                                            • API String ID: 1414292761-0
                                                                            • Opcode ID: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                                                                            • Instruction ID: 3f57ce737592ef9202bcebfaa3f65c0582e3f3231b4dd00ae19a895c9b397c34
                                                                            • Opcode Fuzzy Hash: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                                                                            • Instruction Fuzzy Hash: 4F51CF72710216ABFB15CF60CC85EAB37A9FB417D0F11462AFC44D6148EB35EE509BA1
                                                                            APIs
                                                                            • Sleep.KERNEL32(00000000,0040D262), ref: 004044C4
                                                                              • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: H_prologSleep
                                                                            • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                                                                            • API String ID: 3469354165-3054508432
                                                                            • Opcode ID: 405f4aa34acf843a18f1340cb7d9d79cb0363690e2f49fd5f8c6e0be5aa0dad6
                                                                            • Instruction ID: 62663cdee79800d8a54f028f5a980ee1c6790ad11611a7059aef087dab150aaf
                                                                            • Opcode Fuzzy Hash: 405f4aa34acf843a18f1340cb7d9d79cb0363690e2f49fd5f8c6e0be5aa0dad6
                                                                            • Instruction Fuzzy Hash: 5C51E1B1A042116BCA14FB369D0A66E3755ABC5748F00053FFA06677E2EF7C8A45839E
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: __cftoe
                                                                            • String ID:
                                                                            • API String ID: 4189289331-0
                                                                            • Opcode ID: 9a4a9018df91bb80547d8cd227be064c11647db9cc7a9b7c485a3b8778a52ece
                                                                            • Instruction ID: 6c78d09a6f5169ef6f707262af513c71f712f2c279f5202ad8aecd4a6012115a
                                                                            • Opcode Fuzzy Hash: 9a4a9018df91bb80547d8cd227be064c11647db9cc7a9b7c485a3b8778a52ece
                                                                            • Instruction Fuzzy Hash: D951EA72900A05ABFF209B59CC81FAF77A9EF49334F14421FF515A6293DB39D900866C
                                                                            APIs
                                                                            • _strlen.LIBCMT ref: 10001607
                                                                            • _strcat.LIBCMT ref: 1000161D
                                                                            • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,1000190E,?,?,00000000,?,00000000), ref: 10001643
                                                                            • lstrcatW.KERNEL32(?,?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 1000165A
                                                                            • lstrlenW.KERNEL32(?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 10001661
                                                                            • lstrcatW.KERNEL32(00001008,?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 10001686
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: lstrcatlstrlen$_strcat_strlen
                                                                            • String ID:
                                                                            • API String ID: 1922816806-0
                                                                            • Opcode ID: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                                                                            • Instruction ID: a267a6945d1554df97f4c8e17fbec8689bbb0548aac84132402ab8fad08d9bbc
                                                                            • Opcode Fuzzy Hash: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                                                                            • Instruction Fuzzy Hash: 9821A776900204ABEB05DBA4DC85FEE77B8EF88750F24401BF604AB185DF34B94587A9
                                                                            APIs
                                                                            • lstrcatW.KERNEL32(?,?,?,?,?,00000000), ref: 10001038
                                                                            • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 1000104B
                                                                            • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 10001061
                                                                            • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 10001075
                                                                            • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 10001090
                                                                            • lstrlenW.KERNEL32(?,?,?,00000000), ref: 100010B8
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: lstrlen$AttributesFilelstrcat
                                                                            • String ID:
                                                                            • API String ID: 3594823470-0
                                                                            • Opcode ID: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                                                                            • Instruction ID: f5da6160d3db499da992451a69b84f141dc83571de07cfa19ff2ab3d93a8fd2c
                                                                            • Opcode Fuzzy Hash: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                                                                            • Instruction Fuzzy Hash: DB21E5359003289BEF10DBA0DC48EDF37B8EF44294F104556E999931A6DE709EC5CF50
                                                                            APIs
                                                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A38E,00000000), ref: 0041AC88
                                                                            • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A38E,00000000), ref: 0041AC9C
                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACA9
                                                                            • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A38E,00000000), ref: 0041ACDE
                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACF0
                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACF3
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                                            • String ID:
                                                                            • API String ID: 493672254-0
                                                                            • Opcode ID: 6cb883e879e3adec3ef702ab5770b65c6e4e8cda1ecb6b845e742d50db62b0de
                                                                            • Instruction ID: ed0bae8235b77a8e2b5b4951a925fd67a34dfbd091713fce30693036f81a5133
                                                                            • Opcode Fuzzy Hash: 6cb883e879e3adec3ef702ab5770b65c6e4e8cda1ecb6b845e742d50db62b0de
                                                                            • Instruction Fuzzy Hash: 84014E311452147BD6110B385C4DEFB3B5CDB42771F100317F925922D1EA68CD45B5EE
                                                                            APIs
                                                                            • GetLastError.KERNEL32(?,?,10003518,100023F1,10001F17), ref: 10003864
                                                                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 10003872
                                                                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 1000388B
                                                                            • SetLastError.KERNEL32(00000000,?,10003518,100023F1,10001F17), ref: 100038DD
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLastValue___vcrt_
                                                                            • String ID:
                                                                            • API String ID: 3852720340-0
                                                                            • Opcode ID: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                                                                            • Instruction ID: 2a33bd680f99e964f7cdf1ea0b0e713dcb61597015083b2077453114c578dac0
                                                                            • Opcode Fuzzy Hash: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                                                                            • Instruction Fuzzy Hash: 0F012432608B225EF207D7796CCAA0B2BDDDB096F9B20C27AF510940E9EF219C009300
                                                                            APIs
                                                                            • GetLastError.KERNEL32(?,?,10006C6C), ref: 10005AFA
                                                                            • _free.LIBCMT ref: 10005B2D
                                                                            • _free.LIBCMT ref: 10005B55
                                                                            • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B62
                                                                            • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B6E
                                                                            • _abort.LIBCMT ref: 10005B74
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$_free$_abort
                                                                            • String ID:
                                                                            • API String ID: 3160817290-0
                                                                            • Opcode ID: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                                                                            • Instruction ID: 6ab9c425fee0725613b21b3b36aaf5e4259b246f4cabca8c388d0d7fb541d563
                                                                            • Opcode Fuzzy Hash: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                                                                            • Instruction Fuzzy Hash: 8FF0A47A508911AAF212E3346C4AF0F36AACBC55E3F264125F918A619DFF27B9024174
                                                                            APIs
                                                                            • GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                            • _free.LIBCMT ref: 0044824C
                                                                            • _free.LIBCMT ref: 00448274
                                                                            • SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                                                                            • SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                            • _abort.LIBCMT ref: 00448293
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLast$_free$_abort
                                                                            • String ID:
                                                                            • API String ID: 3160817290-0
                                                                            • Opcode ID: d577d612c1ffbc00090520c66a2c794f4cb9603406b177c38f93d9dbc2276fca
                                                                            • Instruction ID: 1e51d54565af68f960eede883612623578b8b4ccb82fc25c91f14e3db4823c68
                                                                            • Opcode Fuzzy Hash: d577d612c1ffbc00090520c66a2c794f4cb9603406b177c38f93d9dbc2276fca
                                                                            • Instruction Fuzzy Hash: 15F0F935104F006AF611332A6C05B5F2515ABC276AF25066FF92892292DFACCC4581AD
                                                                            APIs
                                                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAB5
                                                                            • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAC9
                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAD6
                                                                            • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAE5
                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAF7
                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAFA
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Service$CloseHandle$Open$ControlManager
                                                                            • String ID:
                                                                            • API String ID: 221034970-0
                                                                            • Opcode ID: 1c36c8b8fbb0f60f85e5bd8cb4bd77bb1ee8634a121bb7363fc37c117bde4d7e
                                                                            • Instruction ID: 651adf303b3d55a6ad93a9774d9c6d096703db2647e4265c62a250da7e042a32
                                                                            • Opcode Fuzzy Hash: 1c36c8b8fbb0f60f85e5bd8cb4bd77bb1ee8634a121bb7363fc37c117bde4d7e
                                                                            • Instruction Fuzzy Hash: 68F0C231541218ABD711AF25AC49EFF3B6CDF45BA2F000026FE0992192DB68CD4695E9
                                                                            APIs
                                                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABB9
                                                                            • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABCD
                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABDA
                                                                            • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABE9
                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABFB
                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABFE
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Service$CloseHandle$Open$ControlManager
                                                                            • String ID:
                                                                            • API String ID: 221034970-0
                                                                            • Opcode ID: 1a3fe85bb9917efbb9e6000c696a5d43cbec5acda189459a6d4173ed623f1a8c
                                                                            • Instruction ID: cdcae22f94af1ce7d279f83afe572816001e75aa845eac4345c2c81124f82824
                                                                            • Opcode Fuzzy Hash: 1a3fe85bb9917efbb9e6000c696a5d43cbec5acda189459a6d4173ed623f1a8c
                                                                            • Instruction Fuzzy Hash: 84F0C231501218ABD6116F259C49DFF3B6CDB45B62F40002AFE0996192EB38DD4595F9
                                                                            APIs
                                                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC20
                                                                            • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC34
                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC41
                                                                            • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC50
                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC62
                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC65
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Service$CloseHandle$Open$ControlManager
                                                                            • String ID:
                                                                            • API String ID: 221034970-0
                                                                            • Opcode ID: 40e8e139c223a5eccf2c469847cabda74560827fb4be953270158eeb9dd7cdfd
                                                                            • Instruction ID: 1af6be829003de2eeb85b71d4b0cbdb2c911632148e7083bdbbda8586ff13133
                                                                            • Opcode Fuzzy Hash: 40e8e139c223a5eccf2c469847cabda74560827fb4be953270158eeb9dd7cdfd
                                                                            • Instruction Fuzzy Hash: 2FF0F631501228BBD711AF25EC49DFF3B6CDB45B62F00002AFE0992192EB38CD4595F9
                                                                            APIs
                                                                            • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe,00000104), ref: 10004C1D
                                                                            • _free.LIBCMT ref: 10004CE8
                                                                            • _free.LIBCMT ref: 10004CF2
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: _free$FileModuleName
                                                                            • String ID: 0sT$C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe
                                                                            • API String ID: 2506810119-866494054
                                                                            • Opcode ID: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                                                                            • Instruction ID: 12f2da1a58c9c923660241357757b5dddff340f6d61411cdc8d35d961f62cc7a
                                                                            • Opcode Fuzzy Hash: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                                                                            • Instruction Fuzzy Hash: EB31A0B5A01258EFFB51CF99CC81D9EBBFCEB88390F12806AF80497215DA709E41CB54
                                                                            APIs
                                                                              • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                                                                              • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,?,?,100010DF,?,?,?,00000000), ref: 10001EAC
                                                                              • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                                                                              • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                                                                              • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,100010DF,?,100010DF,?,?,?,00000000), ref: 10001ED3
                                                                            • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 1000122A
                                                                              • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001855
                                                                              • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001869
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                                                            • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                                                            • API String ID: 4036392271-1520055953
                                                                            • Opcode ID: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                                                                            • Instruction ID: e2b7c7e1c3038021adfe9ab266432482c710e64fc4cfb1bae4cfd9c1521b4980
                                                                            • Opcode Fuzzy Hash: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                                                                            • Instruction Fuzzy Hash: 4B21D579E142486AFB14D7A0EC92FED7339EF80754F000556F604EB1D5EBB16E818758
                                                                            APIs
                                                                            • GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B172
                                                                            • wsprintfW.USER32 ref: 0040B1F3
                                                                              • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: EventLocalTimewsprintf
                                                                            • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                                                                            • API String ID: 1497725170-248792730
                                                                            • Opcode ID: 79e741552c135888b9cd1103ac800c237bbdb41cf9d041aff958f427528d9d9e
                                                                            • Instruction ID: 81b60f5d3581edaaac31e3e44e1e4f5c322996b2d8bf5e7d6f89c643b346fb92
                                                                            • Opcode Fuzzy Hash: 79e741552c135888b9cd1103ac800c237bbdb41cf9d041aff958f427528d9d9e
                                                                            • Instruction Fuzzy Hash: 82117F72504118AACB18AB96EC558FE77BCEE48315B00012FF506A60E1FF7C9E46C6AC
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: @ L
                                                                            • API String ID: 0-1698004427
                                                                            • Opcode ID: 544fafb264448ea5c1072d449201ab24ccf485d51590c339dd7f80fdded84d3d
                                                                            • Instruction ID: 34d970f17befced98e3ca294e9c9a609e5e7bfbb0444a55afbb34e25ce639c56
                                                                            • Opcode Fuzzy Hash: 544fafb264448ea5c1072d449201ab24ccf485d51590c339dd7f80fdded84d3d
                                                                            • Instruction Fuzzy Hash: 0601A2B26096117EFA111E796CC4E27624CDB81BBF325032BF535612D6DA688E014169
                                                                            APIs
                                                                            • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A74D), ref: 0040A6AB
                                                                            • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                                                                            • Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,0040A74D), ref: 0040A6EE
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: File$CloseCreateHandleSizeSleep
                                                                            • String ID: XQG
                                                                            • API String ID: 1958988193-3606453820
                                                                            • Opcode ID: a1c719673f0d7440ec25b2c996448bd066d6d4fa0d0bcd8bc203fb9c13a9478f
                                                                            • Instruction ID: 2d5b847f40b6dc6d65e682cb961bc0859910b41d7418e35cc132b68a4a9af338
                                                                            • Opcode Fuzzy Hash: a1c719673f0d7440ec25b2c996448bd066d6d4fa0d0bcd8bc203fb9c13a9478f
                                                                            • Instruction Fuzzy Hash: AD112B30600740EEE631A7249895A5F3B6AEB41356F48083AF2C26B6D2C6799CA0C35E
                                                                            APIs
                                                                            • RegisterClassExA.USER32(00000030), ref: 0041D55B
                                                                            • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D576
                                                                            • GetLastError.KERNEL32 ref: 0041D580
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ClassCreateErrorLastRegisterWindow
                                                                            • String ID: 0$MsgWindowClass
                                                                            • API String ID: 2877667751-2410386613
                                                                            • Opcode ID: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
                                                                            • Instruction ID: 921741f364e14ac5d494c0d6481b3569f22aad0bbfd2e997b493b5423d792a6e
                                                                            • Opcode Fuzzy Hash: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
                                                                            • Instruction Fuzzy Hash: 910129B1D00219BBDB00DFD5ECC49EFBBBDEA04355F40053AF900A6240E77859058AA4
                                                                            APIs
                                                                            • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 0040779B
                                                                            • CloseHandle.KERNEL32(?), ref: 004077AA
                                                                            • CloseHandle.KERNEL32(?), ref: 004077AF
                                                                            Strings
                                                                            • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 00407791
                                                                            • C:\Windows\System32\cmd.exe, xrefs: 00407796
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CloseHandle$CreateProcess
                                                                            • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                                            • API String ID: 2922976086-4183131282
                                                                            • Opcode ID: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
                                                                            • Instruction ID: bcd6b2dc2297655d1c2a6c7a9d844aadd79638dc8707381bf3a952a3ff6736b4
                                                                            • Opcode Fuzzy Hash: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
                                                                            • Instruction Fuzzy Hash: BCF03676D4029D76CB20ABD6DC0EEDF7F7DEBC5B11F00056AF904A6141E6746404C6B9
                                                                            APIs
                                                                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000), ref: 10004B59
                                                                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 10004B6C
                                                                            • FreeLibrary.KERNEL32(00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082), ref: 10004B8F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: AddressFreeHandleLibraryModuleProc
                                                                            • String ID: CorExitProcess$mscoree.dll
                                                                            • API String ID: 4061214504-1276376045
                                                                            • Opcode ID: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                                                                            • Instruction ID: e6e2f78cdd7cd30bdf2d4d174718ae12991e9b6ae5ca6a82eaba56a43cf4d13d
                                                                            • Opcode Fuzzy Hash: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                                                                            • Instruction Fuzzy Hash: C8F03C71900218BBEB11AB94CC48BAEBFB9EF043D1F01416AE909A6164DF309941CAA5
                                                                            APIs
                                                                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,004432EB,?,?,0044328B,?), ref: 0044335A
                                                                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044336D
                                                                            • FreeLibrary.KERNEL32(00000000,?,?,?,004432EB,?,?,0044328B,?), ref: 00443390
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AddressFreeHandleLibraryModuleProc
                                                                            • String ID: CorExitProcess$mscoree.dll
                                                                            • API String ID: 4061214504-1276376045
                                                                            • Opcode ID: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
                                                                            • Instruction ID: b4f1316bd170a33105784e50650a9bde6d9e9410588fddf83d5a1a7bf10dc45d
                                                                            • Opcode Fuzzy Hash: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
                                                                            • Instruction Fuzzy Hash: 6AF0A430A00208FBDB149F55DC09B9EBFB4EF04713F0041A9FC05A2261CB349E40CA98
                                                                            APIs
                                                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405120
                                                                            • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 0040512C
                                                                            • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405137
                                                                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405140
                                                                              • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                                            • String ID: KeepAlive | Disabled
                                                                            • API String ID: 2993684571-305739064
                                                                            • Opcode ID: 17bfdc88350a56738500cb661d506395563dca3eea58109498aa24bd4a02de42
                                                                            • Instruction ID: c1447ea2195e795a2fa4d382ed9a15925dec3dc8ccf256ab7d783030aa8980db
                                                                            • Opcode Fuzzy Hash: 17bfdc88350a56738500cb661d506395563dca3eea58109498aa24bd4a02de42
                                                                            • Instruction Fuzzy Hash: 4CF06271904711BBDB103B758D0A66B7A54AB02311F0009BEF982916E2D6798840CF9A
                                                                            APIs
                                                                              • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                            • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041ADF2
                                                                            • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE00
                                                                            • Sleep.KERNEL32(00002710), ref: 0041AE07
                                                                            • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AE10
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: PlaySound$HandleLocalModuleSleepTime
                                                                            • String ID: Alarm triggered
                                                                            • API String ID: 614609389-2816303416
                                                                            • Opcode ID: 8320d0a8477b2dfdf5ffede3a6159dd71cddf314a322f93aa69cf56e5021b822
                                                                            • Instruction ID: 9c0713ce1321a11b0f254193fe9a85ef30a97b7eb59a64372af151f10574a600
                                                                            • Opcode Fuzzy Hash: 8320d0a8477b2dfdf5ffede3a6159dd71cddf314a322f93aa69cf56e5021b822
                                                                            • Instruction Fuzzy Hash: 36E01226B44260779620377B6D4FD6F3D28DAC2B5170100BEFA0666192D9580C4586FB
                                                                            APIs
                                                                            • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CDED), ref: 0041CD62
                                                                            • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041CDED), ref: 0041CD6F
                                                                            • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041CDED), ref: 0041CD7C
                                                                            • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041CDED), ref: 0041CD8F
                                                                            Strings
                                                                            • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CD82
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Console$AttributeText$BufferHandleInfoScreen
                                                                            • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                                                            • API String ID: 3024135584-2418719853
                                                                            • Opcode ID: 7fe6fe9ce11b1ae804115fcba13355f31785efbed8ffac05f5782df1f2ab6211
                                                                            • Instruction ID: 0b88db63cd78dea0703aeaf814a7171c31f7e2e6e0b1944ffb711cb25cf7542c
                                                                            • Opcode Fuzzy Hash: 7fe6fe9ce11b1ae804115fcba13355f31785efbed8ffac05f5782df1f2ab6211
                                                                            • Instruction Fuzzy Hash: B4E04872904315E7E31027B5EC4DDAB7B7CE745713B100266FA12915D39A749C40C6B5
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d82b14c4b7eddcab2a525b8a5736e815382cccc6b286473e45e20a4a09cb7dcc
                                                                            • Instruction ID: 3288ceb70b28299b768e57bc56a65f905b411dc47ae91625c595fe6b39b3afde
                                                                            • Opcode Fuzzy Hash: d82b14c4b7eddcab2a525b8a5736e815382cccc6b286473e45e20a4a09cb7dcc
                                                                            • Instruction Fuzzy Hash: 4D71C431900256ABEF21CF55C884AFFBBB5EF95350F14012BE812A72A1D7748CC1CBA9
                                                                            APIs
                                                                              • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                                            • _free.LIBCMT ref: 00444E06
                                                                            • _free.LIBCMT ref: 00444E1D
                                                                            • _free.LIBCMT ref: 00444E3C
                                                                            • _free.LIBCMT ref: 00444E57
                                                                            • _free.LIBCMT ref: 00444E6E
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _free$AllocateHeap
                                                                            • String ID:
                                                                            • API String ID: 3033488037-0
                                                                            • Opcode ID: d775a197f71d536e5d52874a7a30662ad33d8ad4d8240f212ad1ffb4432d1cba
                                                                            • Instruction ID: 75a60bec03265776b93b53542ea819fdab521e44af267d44e1f719a945e8e2e2
                                                                            • Opcode Fuzzy Hash: d775a197f71d536e5d52874a7a30662ad33d8ad4d8240f212ad1ffb4432d1cba
                                                                            • Instruction Fuzzy Hash: 5451D371A00704AFEB20DF6AC841B6673F4FF85729B14456EE819D7250E739EE01CB88
                                                                            APIs
                                                                            • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F234), ref: 004493CF
                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 00449447
                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 00449474
                                                                            • _free.LIBCMT ref: 004493BD
                                                                              • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                              • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                            • _free.LIBCMT ref: 00449589
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                                            • String ID:
                                                                            • API String ID: 1286116820-0
                                                                            • Opcode ID: 0a3c6fbe7e5a1f133d1032b40f823fca6b3dff27f0c0d46b4efcd8c71cfe77a6
                                                                            • Instruction ID: c95a83c4fc9d8f5f381c6ef12c4bd90d50aad01b0883e3b7d6e96279f2ead045
                                                                            • Opcode Fuzzy Hash: 0a3c6fbe7e5a1f133d1032b40f823fca6b3dff27f0c0d46b4efcd8c71cfe77a6
                                                                            • Instruction Fuzzy Hash: 71511A71904205EBEB14EFA9DD819AFB7BCEF44324F10066FE51493291EB788E42DB58
                                                                            APIs
                                                                              • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                                                                              • Part of subcall function 0041BFB7: IsWow64Process.KERNEL32(00000000,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFCF
                                                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F91B
                                                                            • Process32FirstW.KERNEL32(00000000,?), ref: 0040F93F
                                                                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F94E
                                                                            • CloseHandle.KERNEL32(00000000), ref: 0040FB05
                                                                              • Part of subcall function 0041BFE5: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F5F9,00000000,?,?,00475338), ref: 0041BFFA
                                                                              • Part of subcall function 0041BFE5: IsWow64Process.KERNEL32(00000000,?,?,?,00475338), ref: 0041C005
                                                                              • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                                                              • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                                                                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FAF6
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Process$OpenProcess32$NextWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                                            • String ID:
                                                                            • API String ID: 2180151492-0
                                                                            • Opcode ID: 7564d71fffc510b41ad14ca4abc8c0a5948b403b26f5b1e140d32ea507b1df42
                                                                            • Instruction ID: d179df5438ecf7187d550cf9263b6860c2801d48d571b2859f9d543a591e132f
                                                                            • Opcode Fuzzy Hash: 7564d71fffc510b41ad14ca4abc8c0a5948b403b26f5b1e140d32ea507b1df42
                                                                            • Instruction Fuzzy Hash: 784116311083419BC325F722DC55AEFB3A5AF94345F50493EF48A921E2EF385A49C75A
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _free
                                                                            • String ID:
                                                                            • API String ID: 269201875-0
                                                                            • Opcode ID: f0d0e5395ad938097262dc5d88931f0578874cbbbca0d0094bbf983591b431c8
                                                                            • Instruction ID: 5dce3a056f7b38871bf3701478ebec2c01ef4ac0d1e4adeac0a27022f106ca0c
                                                                            • Opcode Fuzzy Hash: f0d0e5395ad938097262dc5d88931f0578874cbbbca0d0094bbf983591b431c8
                                                                            • Instruction Fuzzy Hash: 0741F536A012009FEB20DF78C881A5EB3F1EF89B14F2545AEE515EB341DB35AE01CB84
                                                                            APIs
                                                                            • MultiByteToWideChar.KERNEL32(?,00000000,?,00000000,00000000,00000000,0042DD01,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01), ref: 00451179
                                                                            • __alloca_probe_16.LIBCMT ref: 004511B1
                                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,00000000,0042DD01,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01,?), ref: 00451202
                                                                            • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01,?,00000002,00000000), ref: 00451214
                                                                            • __freea.LIBCMT ref: 0045121D
                                                                              • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                                            • String ID:
                                                                            • API String ID: 313313983-0
                                                                            • Opcode ID: 176232f54f3ec98bfb029651777c0c6490447229ae5715771154ed3ce12be0f5
                                                                            • Instruction ID: 2862a929c21554b3885a63a70f5d1b49ed21d23a3953ed9914841bfcf42aa681
                                                                            • Opcode Fuzzy Hash: 176232f54f3ec98bfb029651777c0c6490447229ae5715771154ed3ce12be0f5
                                                                            • Instruction Fuzzy Hash: 6631D271A0020AABDF24DFA5DC41EAF7BA5EB04315F0445AAFC04D72A2E739CD55CB94
                                                                            APIs
                                                                            • GetEnvironmentStringsW.KERNEL32 ref: 1000715C
                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 1000717F
                                                                              • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 100071A5
                                                                            • _free.LIBCMT ref: 100071B8
                                                                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 100071C7
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                            • String ID:
                                                                            • API String ID: 336800556-0
                                                                            • Opcode ID: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                                                                            • Instruction ID: fdf90bdbf822fabaf3dd9d310e80898d5fc59248e37e3ebe61ec6e18e74c85b1
                                                                            • Opcode Fuzzy Hash: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                                                                            • Instruction Fuzzy Hash: 6601D872A01225BB73129BBE5C8CDBF2A6DFBC69E0311012AFD0CC7288DB658C0181B0
                                                                            APIs
                                                                            • GetEnvironmentStringsW.KERNEL32 ref: 0044F363
                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F386
                                                                              • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F3AC
                                                                            • _free.LIBCMT ref: 0044F3BF
                                                                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F3CE
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                            • String ID:
                                                                            • API String ID: 336800556-0
                                                                            • Opcode ID: 5a321bf6ad982bb41f22afd847bffa7b7f2aa598f804dd442cdb837d811de21f
                                                                            • Instruction ID: 8337c1946637dec1c7c9c61cb05458c13fbc509b7d73539ecc926bc10a2836fd
                                                                            • Opcode Fuzzy Hash: 5a321bf6ad982bb41f22afd847bffa7b7f2aa598f804dd442cdb837d811de21f
                                                                            • Instruction Fuzzy Hash: 2301B173601755BB37211ABA5C8CC7F6A6CDAC6FA5315013FFD14C2202EA68CD0581B9
                                                                            APIs
                                                                            • GetLastError.KERNEL32(00000000,?,00000000,1000636D,10005713,00000000,?,10002249,?,?,10001D66,00000000,?,?,00000000), ref: 10005B7F
                                                                            • _free.LIBCMT ref: 10005BB4
                                                                            • _free.LIBCMT ref: 10005BDB
                                                                            • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BE8
                                                                            • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BF1
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$_free
                                                                            • String ID:
                                                                            • API String ID: 3170660625-0
                                                                            • Opcode ID: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                                                                            • Instruction ID: a404960836b3e2f032ab47abdd1028028b52a365ddf0c47563f665e512f3cffd
                                                                            • Opcode Fuzzy Hash: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                                                                            • Instruction Fuzzy Hash: 5501F47A108A52A7F202E7345C85E1F3AAEDBC55F37220025FD19A615EEF73FD024164
                                                                            APIs
                                                                            • GetLastError.KERNEL32(?,00000000,00000000,0043BC87,00000000,00000000,?,0043BD0B,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044829E
                                                                            • _free.LIBCMT ref: 004482D3
                                                                            • _free.LIBCMT ref: 004482FA
                                                                            • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448307
                                                                            • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448310
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLast$_free
                                                                            • String ID:
                                                                            • API String ID: 3170660625-0
                                                                            • Opcode ID: 3b5a676440ed160f08d3b9c67501060176d9d4d3bcfe02f134d94644f9898a15
                                                                            • Instruction ID: 817e1e76de570c2b023109a843fda652767a1b5a915d0172e9d2adf04509528a
                                                                            • Opcode Fuzzy Hash: 3b5a676440ed160f08d3b9c67501060176d9d4d3bcfe02f134d94644f9898a15
                                                                            • Instruction Fuzzy Hash: 5601F936500B0067F3112A2A5C8596F2559EBC2B7A735452FFD19A22D2EFADCC01816D
                                                                            APIs
                                                                            • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                                                            • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                                                                            • GetProcessImageFileNameW.PSAPI(00000000,?,00000104,?,00000000,00000000,00000000), ref: 0041C228
                                                                            • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C233
                                                                            • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C23B
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Process$CloseHandleOpen$FileImageName
                                                                            • String ID:
                                                                            • API String ID: 2951400881-0
                                                                            • Opcode ID: 1e7be7e3fee9fe9f53efffed8e7c4b72b04eac179993691fa06ce58dcf0b32db
                                                                            • Instruction ID: 502f13a9e38f74389cb09c542eced9ec4ef47df168bad581006c654e14f0d55b
                                                                            • Opcode Fuzzy Hash: 1e7be7e3fee9fe9f53efffed8e7c4b72b04eac179993691fa06ce58dcf0b32db
                                                                            • Instruction Fuzzy Hash: 53012BB1680315ABD61057D49C89FB7B27CDB84796F0000A7FA04D21D2EF748C818679
                                                                            APIs
                                                                            • lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                                                                            • lstrcatW.KERNEL32(?,?,?,100010DF,?,?,?,00000000), ref: 10001EAC
                                                                            • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                                                                            • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                                                                            • lstrcatW.KERNEL32(?,100010DF,?,100010DF,?,?,?,00000000), ref: 10001ED3
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: lstrlen$lstrcat
                                                                            • String ID:
                                                                            • API String ID: 493641738-0
                                                                            • Opcode ID: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                                                                            • Instruction ID: f5d9027fafc921fe84ae6627056796c55de3fa1ad923a59450c5185d8ca5453c
                                                                            • Opcode Fuzzy Hash: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                                                                            • Instruction Fuzzy Hash: D8F082261002207AF621772AECC5FBF7B7CEFC6AA0F04001AFA0C83194DB54684292B5
                                                                            APIs
                                                                            • _free.LIBCMT ref: 100091D0
                                                                              • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                              • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                            • _free.LIBCMT ref: 100091E2
                                                                            • _free.LIBCMT ref: 100091F4
                                                                            • _free.LIBCMT ref: 10009206
                                                                            • _free.LIBCMT ref: 10009218
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                            • String ID:
                                                                            • API String ID: 776569668-0
                                                                            • Opcode ID: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                                                                            • Instruction ID: a08e021c65853776c99c3fd86fadada58ae96d962e635c5153d22f52a77de1c5
                                                                            • Opcode Fuzzy Hash: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                                                                            • Instruction Fuzzy Hash: 77F06DB161C650ABE664DB58EAC6C4B7BEDFB003E13608805FC4DD7549CB31FC809A64
                                                                            APIs
                                                                            • _free.LIBCMT ref: 004509D4
                                                                              • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                              • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                            • _free.LIBCMT ref: 004509E6
                                                                            • _free.LIBCMT ref: 004509F8
                                                                            • _free.LIBCMT ref: 00450A0A
                                                                            • _free.LIBCMT ref: 00450A1C
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                            • String ID:
                                                                            • API String ID: 776569668-0
                                                                            • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                                            • Instruction ID: 8e1836d4b3683ea2f551dac33bf8b94159c93f8dbbc189607f67f5fa0db289e6
                                                                            • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                                            • Instruction Fuzzy Hash: F3F04F76504600B79620EB5DE8C2C1B73D9EA0571A795891BF66CDB612CB38FCC0869C
                                                                            APIs
                                                                            • _strpbrk.LIBCMT ref: 0044E738
                                                                            • _free.LIBCMT ref: 0044E855
                                                                              • Part of subcall function 0043BD19: IsProcessorFeaturePresent.KERNEL32(00000017,0043BCEB,00405103,?,00000000,00000000,004020A6,00000000,00000000,?,0043BD0B,00000000,00000000,00000000,00000000,00000000), ref: 0043BD1B
                                                                              • Part of subcall function 0043BD19: GetCurrentProcess.KERNEL32(C0000417,?,00405103), ref: 0043BD3D
                                                                              • Part of subcall function 0043BD19: TerminateProcess.KERNEL32(00000000,?,00405103), ref: 0043BD44
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                                                            • String ID: *?$.
                                                                            • API String ID: 2812119850-3972193922
                                                                            • Opcode ID: 6703a85dd49711e1afab558f77f60869b6155e4f96c4351f2947c71862cae23b
                                                                            • Instruction ID: 94a4b4bbf586d133b1ca6d09685756ea089c4dad0dcc4a5060c65dcbb11523ea
                                                                            • Opcode Fuzzy Hash: 6703a85dd49711e1afab558f77f60869b6155e4f96c4351f2947c71862cae23b
                                                                            • Instruction Fuzzy Hash: B951C375E00109EFEF14DFAAC881AAEBBB5FF58314F25816EE454E7301E6399E018B54
                                                                            APIs
                                                                            • GetKeyboardLayoutNameA.USER32(?), ref: 00409ED3
                                                                              • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,004EC468,00000010), ref: 004048E0
                                                                              • Part of subcall function 0041C515: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409F5B,00474EE0,?,00474EE0,00000000,00474EE0,00000000), ref: 0041C52A
                                                                              • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CreateFileKeyboardLayoutNameconnectsend
                                                                            • String ID: XQG$NG$PG
                                                                            • API String ID: 1634807452-3565412412
                                                                            • Opcode ID: d51798478b8c2059cb664a5fdc9dfef2ac9a8f0178a14d770530cd60d0ff3c72
                                                                            • Instruction ID: e0ccbd324811511655e6ba18c086c0ffec884fa52ef92f7e14ea490dcf81b303
                                                                            • Opcode Fuzzy Hash: d51798478b8c2059cb664a5fdc9dfef2ac9a8f0178a14d770530cd60d0ff3c72
                                                                            • Instruction Fuzzy Hash: BA5133315082415AC324F732D852AEFB3E5AFD4348F50493FF44A671E6EF78594AC649
                                                                            APIs
                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424DE
                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424F3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                            • String ID: `#D$`#D
                                                                            • API String ID: 885266447-2450397995
                                                                            • Opcode ID: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
                                                                            • Instruction ID: d0478598ef992627c852fcfbe86add3ca1c9fa58067414995f231753f3186543
                                                                            • Opcode Fuzzy Hash: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
                                                                            • Instruction Fuzzy Hash: 78519071A00208AFDF18DF59C980AAEBBB2FB94314F59C19AF81897361D7B9DD41CB44
                                                                            APIs
                                                                            • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe,00000104), ref: 00443475
                                                                            • _free.LIBCMT ref: 00443540
                                                                            • _free.LIBCMT ref: 0044354A
                                                                            Strings
                                                                            • C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe, xrefs: 0044346C, 00443473, 004434A2, 004434DA
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _free$FileModuleName
                                                                            • String ID: C:\Users\user\Desktop\1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exe
                                                                            • API String ID: 2506810119-1331162973
                                                                            • Opcode ID: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
                                                                            • Instruction ID: 78b8e4ab202bb8962dfea6a4c95dea7b8c186c0554b41bb8e719afd17783d6d0
                                                                            • Opcode Fuzzy Hash: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
                                                                            • Instruction Fuzzy Hash: 2E31C471A00258BFEB21DF999C8199EBBBCEF85B15F10406BF50497311D6B89F81CB98
                                                                            APIs
                                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                                                                              • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,771B3530,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                                                                              • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E74), ref: 0041857E
                                                                              • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F,?,?,004040F5,00465E74), ref: 00418587
                                                                              • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                                                                            • Sleep.KERNEL32(000000FA,00465E74), ref: 00404138
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                                            • String ID: /sort "Visit Time" /stext "$0NG
                                                                            • API String ID: 368326130-3219657780
                                                                            • Opcode ID: da364e5c083bc93751a7e0187573033c618666f4beda25f22a0b16db5828728b
                                                                            • Instruction ID: 62b88373b0174ac8ae4090b78ebfd0a8fca35ca34796720d8357018cc2c92f87
                                                                            • Opcode Fuzzy Hash: da364e5c083bc93751a7e0187573033c618666f4beda25f22a0b16db5828728b
                                                                            • Instruction Fuzzy Hash: E9316271A0011956CB15FBA6D8969EE7375AB90308F40007FF206B71E2EF385D89CA99
                                                                            APIs
                                                                              • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                              • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                              • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                              • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                              • Part of subcall function 0044F077: _abort.LIBCMT ref: 0044F0A9
                                                                              • Part of subcall function 0044F077: _free.LIBCMT ref: 0044F0DD
                                                                              • Part of subcall function 0044ECEC: GetOEMCP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED17
                                                                            • _free.LIBCMT ref: 0044EFD0
                                                                            • _free.LIBCMT ref: 0044F006
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _free$ErrorLast_abort
                                                                            • String ID: @5L$@5L
                                                                            • API String ID: 2991157371-2453861365
                                                                            • Opcode ID: 6c0cb8569b147b13637b122a080b5d55873410717ba166906214e1e8c131c017
                                                                            • Instruction ID: 3a29b68b49955ca98559fee15c42126097606514ccea0e67eec2104835090475
                                                                            • Opcode Fuzzy Hash: 6c0cb8569b147b13637b122a080b5d55873410717ba166906214e1e8c131c017
                                                                            • Instruction Fuzzy Hash: FD31D531904104BFFB10EB6AD440B9EB7E4FF40329F2540AFE5149B2A1DB399D45CB48
                                                                            APIs
                                                                              • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                                            • __Init_thread_footer.LIBCMT ref: 0040B797
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Init_thread_footer__onexit
                                                                            • String ID: [End of clipboard]$[Text copied to clipboard]$hdF
                                                                            • API String ID: 1881088180-1379921833
                                                                            • Opcode ID: eeabd7f781cc65c7051f21893074f18797d4390f91478e11e4d77ad36144e008
                                                                            • Instruction ID: c7bebb0a0a15900a9cc4ffb6e17528162536323bfdf0e6139bd55c50ddf57f74
                                                                            • Opcode Fuzzy Hash: eeabd7f781cc65c7051f21893074f18797d4390f91478e11e4d77ad36144e008
                                                                            • Instruction Fuzzy Hash: C0219F32A101054ACB14FB66D8829EDB379AF90318F10453FE505731E2EF386D4A8A9C
                                                                            APIs
                                                                            • _wcslen.LIBCMT ref: 004162F5
                                                                              • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                                                                              • Part of subcall function 00413877: RegSetValueExA.KERNEL32(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                                                                              • Part of subcall function 00413877: RegCloseKey.KERNEL32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                                                                              • Part of subcall function 00409DE4: _wcslen.LIBCMT ref: 00409DFD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _wcslen$CloseCreateValue
                                                                            • String ID: !D@$okmode$PG
                                                                            • API String ID: 3411444782-3370592832
                                                                            • Opcode ID: a04d05716512b7121ee97be2d66f1905d69fbc859f79e27ede2103061701d044
                                                                            • Instruction ID: dff749dc984b923ba5de2327a6f3f9cc2e67bcaf748228c26ce3aec7d70e92d7
                                                                            • Opcode Fuzzy Hash: a04d05716512b7121ee97be2d66f1905d69fbc859f79e27ede2103061701d044
                                                                            • Instruction Fuzzy Hash: 10119371B442011ADB187B72D832ABD22969F94358F80443FF54AAF2E2DEBD4C51525D
                                                                            APIs
                                                                            • CreateThread.KERNEL32(00000000,00000000,0040A27D,?,00000000,00000000), ref: 0040A1FE
                                                                            • CreateThread.KERNEL32(00000000,00000000,Function_0000A267,?,00000000,00000000), ref: 0040A20E
                                                                            • CreateThread.KERNEL32(00000000,00000000,0040A289,?,00000000,00000000), ref: 0040A21A
                                                                              • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B172
                                                                              • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CreateThread$LocalTimewsprintf
                                                                            • String ID: Offline Keylogger Started
                                                                            • API String ID: 465354869-4114347211
                                                                            • Opcode ID: cf535ad84a308a0199b72b55cdc52b675f59ba9ef997251bddf3d8f0cc5bc2aa
                                                                            • Instruction ID: bcf1cfbdc14a627f6781ea3a40f7cea6448602225ce5b2be95dc640702f6c2bd
                                                                            • Opcode Fuzzy Hash: cf535ad84a308a0199b72b55cdc52b675f59ba9ef997251bddf3d8f0cc5bc2aa
                                                                            • Instruction Fuzzy Hash: DE1194B12003187AD220B7369C86CBB765DDA8139CB00057FF946222D2EA795D54CAFB
                                                                            APIs
                                                                              • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B172
                                                                              • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                                                                              • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                            • CreateThread.KERNEL32(00000000,00000000,Function_0000A267,?,00000000,00000000), ref: 0040AF6E
                                                                            • CreateThread.KERNEL32(00000000,00000000,Function_0000A289,?,00000000,00000000), ref: 0040AF7A
                                                                            • CreateThread.KERNEL32(00000000,00000000,0040A295,?,00000000,00000000), ref: 0040AF86
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CreateThread$LocalTime$wsprintf
                                                                            • String ID: Online Keylogger Started
                                                                            • API String ID: 112202259-1258561607
                                                                            • Opcode ID: c54ea447ec553110fbd8b6a53cbfd27dae09f4e423abdb6fb40980f5ac29de0a
                                                                            • Instruction ID: a86b307176fed80e65d2d8085b20e14cf0e56bf63d45b36b749a5edd9f3e52e0
                                                                            • Opcode Fuzzy Hash: c54ea447ec553110fbd8b6a53cbfd27dae09f4e423abdb6fb40980f5ac29de0a
                                                                            • Instruction Fuzzy Hash: 1401C8A070031939E62076365C87D7F7A5DCA81398F40057FF645362C6D97D1C5586FB
                                                                            APIs
                                                                            • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                                                                            • CloseHandle.KERNEL32(?), ref: 004051CA
                                                                            • SetEvent.KERNEL32(?), ref: 004051D9
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CloseEventHandleObjectSingleWait
                                                                            • String ID: Connection Timeout
                                                                            • API String ID: 2055531096-499159329
                                                                            • Opcode ID: b2d32d1c486696acff87f5af967792298d31230c8842a0f6a1d2fc38208b6c67
                                                                            • Instruction ID: e4880b57ed2806ada623013920947221b56867654f576af2420d72dde76e11cf
                                                                            • Opcode Fuzzy Hash: b2d32d1c486696acff87f5af967792298d31230c8842a0f6a1d2fc38208b6c67
                                                                            • Instruction Fuzzy Hash: 1201D831A40F40AFE7257B368D9552BBBE0FF01302704097FE68396AE2D6789800CF59
                                                                            APIs
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E833
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Exception@8Throw
                                                                            • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                            • API String ID: 2005118841-1866435925
                                                                            • Opcode ID: 14b47bc0c01e13b5246ea87e39f47a408aa5ce0847750dcdb3cc0488a1de7433
                                                                            • Instruction ID: aca7d9cae529c24a85643cb8f0975e7fdd15ab88b82278639a3f13e82648cb6f
                                                                            • Opcode Fuzzy Hash: 14b47bc0c01e13b5246ea87e39f47a408aa5ce0847750dcdb3cc0488a1de7433
                                                                            • Instruction Fuzzy Hash: 2C01B1315443086AE618F693C843FAA73585B10708F108C2FAA15761C2F67D6961C66B
                                                                            APIs
                                                                            • RegCreateKeyW.ADVAPI32(80000001,00000000,004752D8), ref: 0041381F
                                                                            • RegSetValueExW.ADVAPI32(004752D8,?,00000000,00000001,00000000,00000000,004752F0,?,0040F823,pth_unenc,004752D8), ref: 0041384D
                                                                            • RegCloseKey.ADVAPI32(004752D8,?,0040F823,pth_unenc,004752D8), ref: 00413858
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CloseCreateValue
                                                                            • String ID: pth_unenc
                                                                            • API String ID: 1818849710-4028850238
                                                                            • Opcode ID: 334ac71a5669d4d05b3098fa823a2424cd3e63efddecc6075895a6bf5b9d749f
                                                                            • Instruction ID: 91b44a8789fefabe47d0aed0b401f4e945a8dec35bb1902c17c37083bf943f80
                                                                            • Opcode Fuzzy Hash: 334ac71a5669d4d05b3098fa823a2424cd3e63efddecc6075895a6bf5b9d749f
                                                                            • Instruction Fuzzy Hash: 83F0C271440218FBDF10AFA1EC45FEE376CEF00B56F10452AF905A61A1E7359F04DA94
                                                                            APIs
                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFB1
                                                                            • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040DFF0
                                                                              • Part of subcall function 00435640: _Yarn.LIBCPMT ref: 0043565F
                                                                              • Part of subcall function 00435640: _Yarn.LIBCPMT ref: 00435683
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E016
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                                                            • String ID: bad locale name
                                                                            • API String ID: 3628047217-1405518554
                                                                            • Opcode ID: 86f49e18a429e1939de4d1535c8c5fe7fe9a78163a93b43351c768af92284890
                                                                            • Instruction ID: c9d4814c50014869750c7e26a4e1a69426a580a77e14145940ab7c7d7e24a8db
                                                                            • Opcode Fuzzy Hash: 86f49e18a429e1939de4d1535c8c5fe7fe9a78163a93b43351c768af92284890
                                                                            • Instruction Fuzzy Hash: EAF081314006049AC634FA62D863B9AB7B89F14718F504A7FB906228D1EF7CBA1CCA4C
                                                                            APIs
                                                                            • CreateThread.KERNEL32(00000000,00000000,Function_0001D45D,00000000,00000000,00000000), ref: 00416C47
                                                                            • ShowWindow.USER32(00000009), ref: 00416C61
                                                                            • SetForegroundWindow.USER32 ref: 00416C6D
                                                                              • Part of subcall function 0041CD9B: AllocConsole.KERNEL32(00475338), ref: 0041CDA4
                                                                              • Part of subcall function 0041CD9B: GetConsoleWindow.KERNEL32 ref: 0041CDAA
                                                                              • Part of subcall function 0041CD9B: ShowWindow.USER32(00000000,00000000), ref: 0041CDBD
                                                                              • Part of subcall function 0041CD9B: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CDE2
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Window$Console$Show$AllocCreateForegroundOutputThread
                                                                            • String ID: !D@
                                                                            • API String ID: 186401046-604454484
                                                                            • Opcode ID: 270a81812c9a9c954965cfdd6a4c81df0ea1f3669daa27631f06eddb7f53d270
                                                                            • Instruction ID: c1d0571eb829819ca76672189d51ce116019f2d3a91c4b5ec781e9fa27a10d2f
                                                                            • Opcode Fuzzy Hash: 270a81812c9a9c954965cfdd6a4c81df0ea1f3669daa27631f06eddb7f53d270
                                                                            • Instruction Fuzzy Hash: 9EF05E70158201EAD720AB62EC45AFA7B69EB54351F00483BF849D14F2DB398C85C69D
                                                                            APIs
                                                                            • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 00416130
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ExecuteShell
                                                                            • String ID: /C $cmd.exe$open
                                                                            • API String ID: 587946157-3896048727
                                                                            • Opcode ID: d24626e27fe6863c14b8bec5c881ce703146f44b1112e23ae8860dcd3eea8f57
                                                                            • Instruction ID: 0a18f3537a1213b4b5dca9b82f73c842755a7e35c30cee8a650de64661b344da
                                                                            • Opcode Fuzzy Hash: d24626e27fe6863c14b8bec5c881ce703146f44b1112e23ae8860dcd3eea8f57
                                                                            • Instruction Fuzzy Hash: 0DE0C0B0208345AAC705E775CC95CBF73ADAA94749B50483F7142A20E2EF7C9D49C659
                                                                            APIs
                                                                            • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040B876
                                                                            • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8A1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: DeleteDirectoryFileRemove
                                                                            • String ID: hdF$pth_unenc
                                                                            • API String ID: 3325800564-514923600
                                                                            • Opcode ID: a0279363c5a25902ec7a11d25b89e924bfdaaad508c09a6524f83826895f7699
                                                                            • Instruction ID: 8281cfb8de641f04b50c20d0c8e921e0d4b8d2282f61a3be21f0805504db5409
                                                                            • Opcode Fuzzy Hash: a0279363c5a25902ec7a11d25b89e924bfdaaad508c09a6524f83826895f7699
                                                                            • Instruction Fuzzy Hash: 45E046321007119BCB14AB258C48AD6339CAF0031AF00486FA492A32A1DF38AC09CAA8
                                                                            APIs
                                                                            • TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                                                                            • UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                                                                            • TerminateThread.KERNEL32(0040A267,00000000,?,pth_unenc), ref: 0040B8D5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: TerminateThread$HookUnhookWindows
                                                                            • String ID: pth_unenc
                                                                            • API String ID: 3123878439-4028850238
                                                                            • Opcode ID: 507b53b63eb7c6f10faa5869e7b72cd95082fe0a88c6c54c261be3869f185826
                                                                            • Instruction ID: 1c21f009177841ea8acfe7f5b61a435624369701cc7e40c150536a334dec3301
                                                                            • Opcode Fuzzy Hash: 507b53b63eb7c6f10faa5869e7b72cd95082fe0a88c6c54c261be3869f185826
                                                                            • Instruction Fuzzy Hash: 4AE01272205356EFD7241FA09C988267BEEDA0478A324487EF2C3626B1CA794C10CB5D
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: __alldvrm$_strrchr
                                                                            • String ID:
                                                                            • API String ID: 1036877536-0
                                                                            • Opcode ID: 4f8832beee02cc7ac8349e43431f1a5ed1ce449240751d3aeed044ff3a2741d2
                                                                            • Instruction ID: 0200e234d7a66e392568480c50467de0d06b46efb2a76a7ba0b74d69ca9a70f2
                                                                            • Opcode Fuzzy Hash: 4f8832beee02cc7ac8349e43431f1a5ed1ce449240751d3aeed044ff3a2741d2
                                                                            • Instruction Fuzzy Hash: 57A166319843869FFB21CF58C8817AEBBA1FF25304F1441AFE9859B382C27D8951C75A
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
                                                                            • Instruction ID: 497cf8d2f4a88fd96e7f98feeb1d24cd381d204b534fd1f3fd6e485e43360072
                                                                            • Opcode Fuzzy Hash: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
                                                                            • Instruction Fuzzy Hash: EA413871A00704BFF324AF79CD41B5EBBA9EB88710F10862FF105DB681E7B999418788
                                                                            APIs
                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,10006FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 10008731
                                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 100087BA
                                                                            • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 100087CC
                                                                            • __freea.LIBCMT ref: 100087D5
                                                                              • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                            • String ID:
                                                                            • API String ID: 2652629310-0
                                                                            • Opcode ID: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                                                                            • Instruction ID: 5b9b35b0a4db414dac5c81271493033b4f2f0f3dd9b893eeefd60fa04c8ec889
                                                                            • Opcode Fuzzy Hash: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                                                                            • Instruction Fuzzy Hash: 2731AE32A0021AABEF15CF64CC85EAF7BA5EF44290F214129FC48D7158EB35DE50CBA0
                                                                            APIs
                                                                            Strings
                                                                            • Cleared browsers logins and cookies., xrefs: 0040C0F5
                                                                            • [Cleared browsers logins and cookies.], xrefs: 0040C0E4
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Sleep
                                                                            • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                                            • API String ID: 3472027048-1236744412
                                                                            • Opcode ID: bc362d70cf4f5ad946d2d6bce893b7e03ef5b56e408b8141a290fd3d2dbf3af0
                                                                            • Instruction ID: fac43f66edf0589ccdcbb227709f1a337e776f7542e83b73a027453bfa593f46
                                                                            • Opcode Fuzzy Hash: bc362d70cf4f5ad946d2d6bce893b7e03ef5b56e408b8141a290fd3d2dbf3af0
                                                                            • Instruction Fuzzy Hash: 2531C804348380E9D6116BF554567AB7B814E93744F08457FB9C42B3D3D97E4848C7AF
                                                                            APIs
                                                                              • Part of subcall function 004136F8: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 00413714
                                                                              • Part of subcall function 004136F8: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 0041372D
                                                                              • Part of subcall function 004136F8: RegCloseKey.KERNEL32(00000000), ref: 00413738
                                                                            • Sleep.KERNEL32(00000BB8), ref: 0041277A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CloseOpenQuerySleepValue
                                                                            • String ID: 8SG$exepath$hdF
                                                                            • API String ID: 4119054056-3379396883
                                                                            • Opcode ID: abf20036ad70d98174a07eb652c7711c4b2f7adaf8a1d534f2fe302cffeed402
                                                                            • Instruction ID: f3cf03c5a64ef847c6da3637c810c9cb64e8e240b2c65477c235684d5dc29c85
                                                                            • Opcode Fuzzy Hash: abf20036ad70d98174a07eb652c7711c4b2f7adaf8a1d534f2fe302cffeed402
                                                                            • Instruction Fuzzy Hash: B52148A0B0030427DA00B7366D46EBF724E8B84318F40443FB916E72D3EEBC9C48426D
                                                                            APIs
                                                                              • Part of subcall function 0041C551: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041C561
                                                                              • Part of subcall function 0041C551: GetWindowTextLengthW.USER32(00000000), ref: 0041C56A
                                                                              • Part of subcall function 0041C551: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041C594
                                                                            • Sleep.KERNEL32(000001F4), ref: 0040A573
                                                                            • Sleep.KERNEL32(00000064), ref: 0040A5FD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Window$SleepText$ForegroundLength
                                                                            • String ID: [ $ ]
                                                                            • API String ID: 3309952895-93608704
                                                                            • Opcode ID: 91fbb58dd73c21752913e74166b8dde54cbd13c1bf14a177d1a120e5c2d5368c
                                                                            • Instruction ID: 97bd403738d1ca0cb59e80c1fc79ee6201ed0cb329172f4776a94889a39aca56
                                                                            • Opcode Fuzzy Hash: 91fbb58dd73c21752913e74166b8dde54cbd13c1bf14a177d1a120e5c2d5368c
                                                                            • Instruction Fuzzy Hash: FE119F315043006BC614BB65CC5399F77A8AF50308F40053FF552665E2FF79AA5886DB
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: SystemTimes$Sleep__aulldiv
                                                                            • String ID:
                                                                            • API String ID: 188215759-0
                                                                            • Opcode ID: 1460bbf00a7581670417fcbf42b3a1dfd5e2489cdc62901d12e8026d78940c5d
                                                                            • Instruction ID: 72b4c32e7059473e424b83a6cc96647c38f9827b21069785d395d2d8421d6a64
                                                                            • Opcode Fuzzy Hash: 1460bbf00a7581670417fcbf42b3a1dfd5e2489cdc62901d12e8026d78940c5d
                                                                            • Instruction Fuzzy Hash: B0113D7A5083456BD304FAB5CC85DEB7BACEAC4654F040A3EF54A82051FE68EA4886A5
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 26aae147e3b4032e8d822610677c8b44980169b964e3a1f9465f38b9cd56633c
                                                                            • Instruction ID: 17f232e73e96fb976a24982deb7d35e81c220cd9520ca4ef7e8dcf180de91df6
                                                                            • Opcode Fuzzy Hash: 26aae147e3b4032e8d822610677c8b44980169b964e3a1f9465f38b9cd56633c
                                                                            • Instruction Fuzzy Hash: 1301F2B36497067EFA202E786CC1F67220CDF41BBEB34032BB574712D1DA68CE404568
                                                                            APIs
                                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,10001D66,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue), ref: 10005D13
                                                                            • GetLastError.KERNEL32(?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000,00000364,?,10005BC8), ref: 10005D1F
                                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000), ref: 10005D2D
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: LibraryLoad$ErrorLast
                                                                            • String ID:
                                                                            • API String ID: 3177248105-0
                                                                            • Opcode ID: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                                                                            • Instruction ID: ab8c2af688280ff547417c348c7c3430721907d0b6a0cc88e9d35c15e8af339b
                                                                            • Opcode Fuzzy Hash: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                                                                            • Instruction Fuzzy Hash: 59018436615732ABE7319B689C8CB4B7798EF056E2B214623F909D7158D731D801CAE0
                                                                            APIs
                                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue), ref: 00448598
                                                                            • GetLastError.KERNEL32(?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000,00000364,?,004482E7), ref: 004485A4
                                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000), ref: 004485B2
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: LibraryLoad$ErrorLast
                                                                            • String ID:
                                                                            • API String ID: 3177248105-0
                                                                            • Opcode ID: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
                                                                            • Instruction ID: d5df962f837ff7629ef00c7a8b4dcab40ba3e58d8e4ddb8b40c265455ff02ab4
                                                                            • Opcode Fuzzy Hash: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
                                                                            • Instruction Fuzzy Hash: AA012832602322FBD7214B289C4495B7798AB50B61B20053AFD05D3241DF34CD01CAE8
                                                                            APIs
                                                                            • ___BuildCatchObject.LIBVCRUNTIME ref: 0043987A
                                                                              • Part of subcall function 00439EB2: ___AdjustPointer.LIBCMT ref: 00439EFC
                                                                            • _UnwindNestedFrames.LIBCMT ref: 00439891
                                                                            • ___FrameUnwindToState.LIBVCRUNTIME ref: 004398A3
                                                                            • CallCatchBlock.LIBVCRUNTIME ref: 004398C7
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                                            • String ID:
                                                                            • API String ID: 2633735394-0
                                                                            • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                            • Instruction ID: dcee73c62e3621a690853eebe59cad03ae51e1002f288686f44977c5109bb855
                                                                            • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                            • Instruction Fuzzy Hash: 18011732000109BBCF12AF55CC01EDA3BBAEF9D754F04511AFD5861221C3BAE861DBA5
                                                                            APIs
                                                                            • GetSystemMetrics.USER32(0000004C), ref: 004193F0
                                                                            • GetSystemMetrics.USER32(0000004D), ref: 004193F6
                                                                            • GetSystemMetrics.USER32(0000004E), ref: 004193FC
                                                                            • GetSystemMetrics.USER32(0000004F), ref: 00419402
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: MetricsSystem
                                                                            • String ID:
                                                                            • API String ID: 4116985748-0
                                                                            • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                                            • Instruction ID: 9a44d86f369c7068fc2c949f9b02ed5542bf43da40f6b7222f807aea32733f55
                                                                            • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                                            • Instruction Fuzzy Hash: DFF0A471B043155BD744EA759C51A6F6BD5EBD4264F10043FF20887281EE78DC468785
                                                                            APIs
                                                                            • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438F31
                                                                            • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438F36
                                                                            • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438F3B
                                                                              • Part of subcall function 0043A43A: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A44B
                                                                            • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438F50
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                                                            • String ID:
                                                                            • API String ID: 1761009282-0
                                                                            • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                                            • Instruction ID: 04dbcd9d80b8837b95b31ffc0e846904d80335f120ca5f78e3accc67d081205e
                                                                            • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                                            • Instruction Fuzzy Hash: 59C04C15080781541C50B6B2210B2AE83461E7E38DFD074DFFCE0571038E4E043B653F
                                                                            APIs
                                                                            • __startOneArgErrorHandling.LIBCMT ref: 00442CED
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorHandling__start
                                                                            • String ID: pow
                                                                            • API String ID: 3213639722-2276729525
                                                                            • Opcode ID: ae0341c24035669086af68b363e9d44c4063f2ceb2f02d621ae22780893f867c
                                                                            • Instruction ID: c2a334fe3ab53b67a82bc2a1da04863f7f1ed5e2a579c87dfbcc8ae8a095d349
                                                                            • Opcode Fuzzy Hash: ae0341c24035669086af68b363e9d44c4063f2ceb2f02d621ae22780893f867c
                                                                            • Instruction Fuzzy Hash: C6516DA1E0420296FB167B14CE4137B2BA4DB40751F704D7FF096823AAEB7D8C859A4F
                                                                            APIs
                                                                            • _free.LIBCMT ref: 1000655C
                                                                              • Part of subcall function 100062BC: IsProcessorFeaturePresent.KERNEL32(00000017,100062AB,00000000,?,?,?,?,00000016,?,?,100062B8,00000000,00000000,00000000,00000000,00000000), ref: 100062BE
                                                                              • Part of subcall function 100062BC: GetCurrentProcess.KERNEL32(C0000417), ref: 100062E0
                                                                              • Part of subcall function 100062BC: TerminateProcess.KERNEL32(00000000), ref: 100062E7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                                                            • String ID: *?$.
                                                                            • API String ID: 2667617558-3972193922
                                                                            • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                            • Instruction ID: 55016225c6cf3c2ad74d5bf99958d96f24b8fe448c0df4d83e2be8db5664878a
                                                                            • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                            • Instruction Fuzzy Hash: 2D519475E0060A9FEB14CFA8CC81AADB7F6FF4C394F258169E854E7349D635AE018B50
                                                                            APIs
                                                                            • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00418ABE
                                                                              • Part of subcall function 00418656: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418AD1,00000000,?,?,?,?,00000000), ref: 0041866A
                                                                            • SHCreateMemStream.SHLWAPI(00000000), ref: 00418B0B
                                                                              • Part of subcall function 004186CB: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B27,00000000,?,?), ref: 004186DD
                                                                              • Part of subcall function 00418679: GdipDisposeImage.GDIPLUS(?,00418B82), ref: 00418682
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                                                            • String ID: image/jpeg
                                                                            • API String ID: 1291196975-3785015651
                                                                            • Opcode ID: d9a19672ec4dc75711255ce94c2c2311e4e29857de9186f34d814f6d2a4cbe43
                                                                            • Instruction ID: 71c7567624fb1f0fb67e5b365d5baafb3eed0516d04e2b9615b8e3d4f66a2876
                                                                            • Opcode Fuzzy Hash: d9a19672ec4dc75711255ce94c2c2311e4e29857de9186f34d814f6d2a4cbe43
                                                                            • Instruction Fuzzy Hash: 13317F71504300AFC301EF65CC84DAFB7E9FF8A704F00496EF985A7251DB7999448BA6
                                                                            APIs
                                                                            • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00451D92,?,00000050,?,?,?,?,?), ref: 00451C12
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: ACP$OCP
                                                                            • API String ID: 0-711371036
                                                                            • Opcode ID: 9e0df5bdb224d2be14a0cd5949da06f0ee57b11af7c7271d7bdd2cdd18eeb32c
                                                                            • Instruction ID: fc24b39bc158c677debbea649066bee6e1bba6d32f28379ebc1c8ba741b2d3ba
                                                                            • Opcode Fuzzy Hash: 9e0df5bdb224d2be14a0cd5949da06f0ee57b11af7c7271d7bdd2cdd18eeb32c
                                                                            • Instruction Fuzzy Hash: BA217D22A4010063DB34CF54C940B9B326ADF50B27F568166ED09C7322F73AED44C39C
                                                                            APIs
                                                                            • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00418BAA
                                                                              • Part of subcall function 00418656: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418AD1,00000000,?,?,?,?,00000000), ref: 0041866A
                                                                            • SHCreateMemStream.SHLWAPI(00000000,00000000,00000000,?,?,?,?,00000000), ref: 00418BCF
                                                                              • Part of subcall function 004186CB: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B27,00000000,?,?), ref: 004186DD
                                                                              • Part of subcall function 00418679: GdipDisposeImage.GDIPLUS(?,00418B82), ref: 00418682
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                                                            • String ID: image/png
                                                                            • API String ID: 1291196975-2966254431
                                                                            • Opcode ID: d4f259a593197f1d9dbe7f79535cfb99d89987488e7eb69950e532603a38181c
                                                                            • Instruction ID: c6f894421d6f6d4ca6915e56eba1d7ff3797fde04a376feef2065c2e579c4a83
                                                                            • Opcode Fuzzy Hash: d4f259a593197f1d9dbe7f79535cfb99d89987488e7eb69950e532603a38181c
                                                                            • Instruction Fuzzy Hash: 30219371204211AFC705EB61CC88CBFBBADEFCA754F10092EF54693161DB399945CBA6
                                                                            APIs
                                                                            • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415CC9,?,00000001,0000004C,00000000), ref: 00405030
                                                                              • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                            • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415CC9,?,00000001,0000004C,00000000), ref: 00405087
                                                                            Strings
                                                                            • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: LocalTime
                                                                            • String ID: KeepAlive | Enabled | Timeout:
                                                                            • API String ID: 481472006-1507639952
                                                                            • Opcode ID: fc6fd2976fce52e420e93154f067944891124436d589d9090f7aa13d535a9618
                                                                            • Instruction ID: 59903f388a44bacb81d563bcbf5ab321eb0051b597eccb46fab67989b44e7fd4
                                                                            • Opcode Fuzzy Hash: fc6fd2976fce52e420e93154f067944891124436d589d9090f7aa13d535a9618
                                                                            • Instruction Fuzzy Hash: 1D21F2719046405BD710B7259C0676F7B64E751308F40087EE8491B2A6DA7D5A88CBEF
                                                                            APIs
                                                                            • Sleep.KERNEL32 ref: 00416640
                                                                            • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166A2
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: DownloadFileSleep
                                                                            • String ID: !D@
                                                                            • API String ID: 1931167962-604454484
                                                                            • Opcode ID: c61a6df9391303b818bef6130128f3ef40b318688b814cb8f5659eb7713ef5c9
                                                                            • Instruction ID: f21b004d79e7af0ef9ad63e4b6518ad07bb10e0138b316cec4f8e9f86784bb19
                                                                            • Opcode Fuzzy Hash: c61a6df9391303b818bef6130128f3ef40b318688b814cb8f5659eb7713ef5c9
                                                                            • Instruction Fuzzy Hash: C6115171A083029AC714FF72D8969BE77A8AF54348F400C3FF546621E2EE3C9949C65A
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: _strlen
                                                                            • String ID: : $Se.
                                                                            • API String ID: 4218353326-4089948878
                                                                            • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                            • Instruction ID: 66f447a9efa091531784e06c0e565222335d100d85517175c1dac28435e0d9bb
                                                                            • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                            • Instruction Fuzzy Hash: 2F11E7B5904249AEDB11DFA8D841BDEFBFCEF09244F104056E545E7252E6706B02C765
                                                                            APIs
                                                                            • GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: LocalTime
                                                                            • String ID: | $%02i:%02i:%02i:%03i
                                                                            • API String ID: 481472006-2430845779
                                                                            • Opcode ID: 4d6ed76d2c0007f2ef8e18d25abc2b2ad824726885c52fffdea772383ef611f4
                                                                            • Instruction ID: b0c371a91d376d28eb23a1cf2c2b6b2589463c7c7bf84255da33bc44f247512a
                                                                            • Opcode Fuzzy Hash: 4d6ed76d2c0007f2ef8e18d25abc2b2ad824726885c52fffdea772383ef611f4
                                                                            • Instruction Fuzzy Hash: 361181714082055AC304EB62D8419BFB3E9AB44348F50093FF895A21E1EF3CDA49C65A
                                                                            APIs
                                                                            • PathFileExistsW.SHLWAPI(00000000), ref: 0041AD3C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ExistsFilePath
                                                                            • String ID: alarm.wav$hYG
                                                                            • API String ID: 1174141254-2782910960
                                                                            • Opcode ID: 8f2be5ac4152d2520653ca743241efce0c72842608036363fa04a495ef4d0cce
                                                                            • Instruction ID: 1ebdaa4a32a078914063a8122a991a3a49773bb3edac1861de613ef54c78e1f6
                                                                            • Opcode Fuzzy Hash: 8f2be5ac4152d2520653ca743241efce0c72842608036363fa04a495ef4d0cce
                                                                            • Instruction Fuzzy Hash: 7A01F5B064460156C604F37698167EE37464B80319F00447FF68A266E2EFBC9D99C68F
                                                                            APIs
                                                                              • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B172
                                                                              • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                                                                              • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                            • CloseHandle.KERNEL32(?), ref: 0040B0B4
                                                                            • UnhookWindowsHookEx.USER32 ref: 0040B0C7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                                            • String ID: Online Keylogger Stopped
                                                                            • API String ID: 1623830855-1496645233
                                                                            • Opcode ID: d2165033513dcf71b3ac2fd0adae2b36f4a3385a09ded61426f46b30c38066df
                                                                            • Instruction ID: 2e372e3e3892c4e8816e9c8053feed756abc81e7e35a03d4dadb391bbfa0e77d
                                                                            • Opcode Fuzzy Hash: d2165033513dcf71b3ac2fd0adae2b36f4a3385a09ded61426f46b30c38066df
                                                                            • Instruction Fuzzy Hash: 0101F5306002049BD7217B35C80B3BF7BA59B41305F40007FE642226D2EBB91845D7DE
                                                                            APIs
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 10002903
                                                                              • Part of subcall function 100035D2: RaiseException.KERNEL32(?,?,?,10002925,00000000,00000000,00000000,?,?,?,?,?,10002925,?,100121B8), ref: 10003632
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 10002920
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3739273614.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000006.00000002.3739254455.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3739273614.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_10000000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: Exception@8Throw$ExceptionRaise
                                                                            • String ID: Unknown exception
                                                                            • API String ID: 3476068407-410509341
                                                                            • Opcode ID: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                                                                            • Instruction ID: 696891806b75a506f07e96a947ab79166ff1ea0d2f17bc9dac180a151cc952bd
                                                                            • Opcode Fuzzy Hash: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                                                                            • Instruction Fuzzy Hash: 2BF0A47890420D77AB04E6E5EC4599D77ACDB006D0F508161FD1496499EF31FA658690
                                                                            APIs
                                                                              • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                              • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                              • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                              • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                            • _abort.LIBCMT ref: 0044F0A9
                                                                            • _free.LIBCMT ref: 0044F0DD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLast_abort_free
                                                                            • String ID: @5L
                                                                            • API String ID: 289325740-1384160223
                                                                            • Opcode ID: 2e9ada046b615cce909465303d253cbb0255e834f3ab9ea9ae3315e12a655f22
                                                                            • Instruction ID: 2af8ca7d7d9da888dd2a293bb18e2fdfe9fbdc3dbac3c8495f7aa1b7b8b1e2f7
                                                                            • Opcode Fuzzy Hash: 2e9ada046b615cce909465303d253cbb0255e834f3ab9ea9ae3315e12a655f22
                                                                            • Instruction Fuzzy Hash: F2010871D01A218FEB30AF6A840125EB7A0BF44715B15422FE52863352CB7C6D46CFCE
                                                                            APIs
                                                                            • waveInPrepareHeader.WINMM(004CE1C0,00000020,?,?,00476B50,00474EE0,?,00000000,00401A15), ref: 00401849
                                                                            • waveInAddBuffer.WINMM(004CE1C0,00000020,?,00000000,00401A15), ref: 0040185F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: wave$BufferHeaderPrepare
                                                                            • String ID: XMG
                                                                            • API String ID: 2315374483-813777761
                                                                            • Opcode ID: db4cc151110a5f9a71eb5ce2d7546914e9eb517e880c4322ad0588f055fadbe6
                                                                            • Instruction ID: 6f1d19605e244f5f119b09d66236675289974365e05be472c2159163c6862827
                                                                            • Opcode Fuzzy Hash: db4cc151110a5f9a71eb5ce2d7546914e9eb517e880c4322ad0588f055fadbe6
                                                                            • Instruction Fuzzy Hash: D3016D71700301AFD7209F75EC48969BBA9FB89355701413AF409D3762EB759C90CBA8
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _free
                                                                            • String ID: @ L
                                                                            • API String ID: 269201875-1698004427
                                                                            • Opcode ID: 061f1d377262398e84625751e00800f7b3b9231d747b7f71bcbf8f837b64f860
                                                                            • Instruction ID: ffc8389238c956ab6c1ca4f2b01b58cd1871601a5e35f3520dab429f03a8b914
                                                                            • Opcode Fuzzy Hash: 061f1d377262398e84625751e00800f7b3b9231d747b7f71bcbf8f837b64f860
                                                                            • Instruction Fuzzy Hash: 7DE0E592A0182014F6717A3F6C0575B0545CBC2B7FF11833BF538861C1CFAC4A46519E
                                                                            APIs
                                                                            • IsValidLocale.KERNEL32(00000000,JD,00000000,00000001,?,?,00444AEA,?,?,004444CA,?,00000004), ref: 00448B32
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: LocaleValid
                                                                            • String ID: IsValidLocaleName$JD
                                                                            • API String ID: 1901932003-2234456777
                                                                            • Opcode ID: 98bf4732c76f9d0cbfb8c103c3b900cf5be1bffc9926f7dc5154a94851103fac
                                                                            • Instruction ID: c43517d2c5aad0833927174c53c021eab8a1ac695cd7bc198788f3b2bcf9e263
                                                                            • Opcode Fuzzy Hash: 98bf4732c76f9d0cbfb8c103c3b900cf5be1bffc9926f7dc5154a94851103fac
                                                                            • Instruction Fuzzy Hash: D6F05230A80308F7DB106B60DC06FAEBF58CB04B52F10017EFD046B291CE786E05929E
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _free
                                                                            • String ID: $G
                                                                            • API String ID: 269201875-4251033865
                                                                            • Opcode ID: 0ad43b1214ad8572508d9786c92e0b088e9d3dbafa2474dd36ac496255489d68
                                                                            • Instruction ID: d76a88c3c7e0b504eff74fb84b9f6db8507cba8af1ea4ea387731c34734dfbbf
                                                                            • Opcode Fuzzy Hash: 0ad43b1214ad8572508d9786c92e0b088e9d3dbafa2474dd36ac496255489d68
                                                                            • Instruction Fuzzy Hash: AAE0E562A0182040F675BA3F2D05B9B49C5DB8173BF11433BF538861C1DFAC4A4251AE
                                                                            APIs
                                                                            • GetKeyState.USER32(00000011), ref: 0040B64B
                                                                              • Part of subcall function 0040A3E0: GetForegroundWindow.USER32(?,?,00000000), ref: 0040A416
                                                                              • Part of subcall function 0040A3E0: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A422
                                                                              • Part of subcall function 0040A3E0: GetKeyboardLayout.USER32(00000000), ref: 0040A429
                                                                              • Part of subcall function 0040A3E0: GetKeyState.USER32(00000010), ref: 0040A433
                                                                              • Part of subcall function 0040A3E0: GetKeyboardState.USER32(?,?,00000000), ref: 0040A43E
                                                                              • Part of subcall function 0040A3E0: ToUnicodeEx.USER32(00000054,?,?,?,00000010,00000000,00000000), ref: 0040A461
                                                                              • Part of subcall function 0040A3E0: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4C1
                                                                              • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                                                            • String ID: [AltL]$[AltR]
                                                                            • API String ID: 2738857842-2658077756
                                                                            • Opcode ID: ebf392733fa6af1cef2b299d24dcfaafd055ccf9a66db9e14e7d9e277e57d489
                                                                            • Instruction ID: e48b288e44f9d4c6b211653e2fe3bcc76c2b66b59b43e84e4aaf588e4500f4a3
                                                                            • Opcode Fuzzy Hash: ebf392733fa6af1cef2b299d24dcfaafd055ccf9a66db9e14e7d9e277e57d489
                                                                            • Instruction Fuzzy Hash: 3BE0652134021052C828323E592F6BE2D51C742754B86057FF9826B6C5DABF4D1542CF
                                                                            APIs
                                                                            • GetOEMCP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED17
                                                                            • GetACP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED2E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: uD
                                                                            • API String ID: 0-2547262877
                                                                            • Opcode ID: c5b08800a69d4838b4f5beafbc063674321feb547ffb76a205f46ddd03b66443
                                                                            • Instruction ID: 19c10458df6b4aed5d20bc802b22671fd2b069e30d3a1616a3713fc20edc201d
                                                                            • Opcode Fuzzy Hash: c5b08800a69d4838b4f5beafbc063674321feb547ffb76a205f46ddd03b66443
                                                                            • Instruction Fuzzy Hash: A5F0C871800105CBEB20DB55DC897697771BF11335F144755E4394A6E2C7B98C81CF49
                                                                            APIs
                                                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161A8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ExecuteShell
                                                                            • String ID: !D@$open
                                                                            • API String ID: 587946157-1586967515
                                                                            • Opcode ID: 94ae01d4d8b7264207e9bd3f4e7ba97e74bef168960cfc99b3f8e3eceb9b28ff
                                                                            • Instruction ID: 73504a7432a82bf20c2cd712858cac99996ed9f8eaf32da6c0f13d1c3fa6c831
                                                                            • Opcode Fuzzy Hash: 94ae01d4d8b7264207e9bd3f4e7ba97e74bef168960cfc99b3f8e3eceb9b28ff
                                                                            • Instruction Fuzzy Hash: 2FE0ED712483059AD614EA72DC91AFE7358AB54755F40083FF506514E2EE3C5849C65A
                                                                            APIs
                                                                            • GetKeyState.USER32(00000012), ref: 0040B6A5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: State
                                                                            • String ID: [CtrlL]$[CtrlR]
                                                                            • API String ID: 1649606143-2446555240
                                                                            • Opcode ID: f934f2a7f97c34cec8605a65b064942ce57b78f2774506a061fea1d29b3ee07f
                                                                            • Instruction ID: bec5627f59812d2efb235ad4bfa8f6d19d2d97b3e0140e65676d9d4505e8418d
                                                                            • Opcode Fuzzy Hash: f934f2a7f97c34cec8605a65b064942ce57b78f2774506a061fea1d29b3ee07f
                                                                            • Instruction Fuzzy Hash: 6FE04F2160021052C524363D5A1E67D2911CB52754B42096FF882A76CADEBF891543CF
                                                                            APIs
                                                                              • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                                            • __Init_thread_footer.LIBCMT ref: 00410F29
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Init_thread_footer__onexit
                                                                            • String ID: ,kG$0kG
                                                                            • API String ID: 1881088180-2015055088
                                                                            • Opcode ID: f9f143b1e95ac96eb86707cb7474d167dbc7ad60067a617d51a8135112e2f0db
                                                                            • Instruction ID: c595ded0a674a2b9ccc74dbc71d20adb946c68f5a758ea4f5ad5526f3cc50642
                                                                            • Opcode Fuzzy Hash: f9f143b1e95ac96eb86707cb7474d167dbc7ad60067a617d51a8135112e2f0db
                                                                            • Instruction Fuzzy Hash: 35E0D8312149208EC214A32995829C93791DB4E335B61412BF414D72D5CBAEB8C1CA1D
                                                                            APIs
                                                                            • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040D144,00000000,004752D8,004752F0,?,pth_unenc), ref: 00413A31
                                                                            • RegDeleteValueW.ADVAPI32(?,?,?,pth_unenc), ref: 00413A45
                                                                            Strings
                                                                            • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A2F
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: DeleteOpenValue
                                                                            • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                                            • API String ID: 2654517830-1051519024
                                                                            • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                                            • Instruction ID: 6fb421a43559def270d35797bbb86f7c8bc210cd52a17bc53693ea6618a40a87
                                                                            • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                                            • Instruction Fuzzy Hash: 99E0C23124420CFBDF104F71DD06FFA376CDB01F42F1006A5BA0692091C626DF049668
                                                                            APIs
                                                                            • TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                                                                            • WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ObjectProcessSingleTerminateWait
                                                                            • String ID: pth_unenc
                                                                            • API String ID: 1872346434-4028850238
                                                                            • Opcode ID: 1b0d5640518fcde21729cf1b02f36aec3fd37732ecf9f275e44c4103a8157302
                                                                            • Instruction ID: 1c2a9d3d993a2aa40768a62e13ec0bdc830226799852dc8a6b6faba0c59f1205
                                                                            • Opcode Fuzzy Hash: 1b0d5640518fcde21729cf1b02f36aec3fd37732ecf9f275e44c4103a8157302
                                                                            • Instruction Fuzzy Hash: 2FD01234189312FFD7350F60EE4DB043B98A705362F140265F428512F1C7A58994EA59
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CountInfoInputLastTick
                                                                            • String ID: NG
                                                                            • API String ID: 3478931382-1651712548
                                                                            • Opcode ID: 1072e3c2261f103fc32e137a75d3669dd2f4511b29ca1c5cc6daf9e0edaf2e7e
                                                                            • Instruction ID: 91b37e9d9b7f8f393223e5bf0be67cbbeb1ccf95644ad96dbec1e326022f3834
                                                                            • Opcode Fuzzy Hash: 1072e3c2261f103fc32e137a75d3669dd2f4511b29ca1c5cc6daf9e0edaf2e7e
                                                                            • Instruction Fuzzy Hash: 84D0C97180060CABDB04AFA5EC4D99DBBBCEB05212F1042A5E84992210DA71AA548A95
                                                                            APIs
                                                                            • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D55), ref: 00440D27
                                                                            • GetLastError.KERNEL32 ref: 00440D35
                                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440D90
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide$ErrorLast
                                                                            • String ID:
                                                                            • API String ID: 1717984340-0
                                                                            • Opcode ID: 06151d672a34678faa0f1c8d5979b725e0733317c82078799b35041d461e39d5
                                                                            • Instruction ID: f204e272a103731937cf510deb2d9f687334ef06d731906aa630a644c7418207
                                                                            • Opcode Fuzzy Hash: 06151d672a34678faa0f1c8d5979b725e0733317c82078799b35041d461e39d5
                                                                            • Instruction Fuzzy Hash: BA411871A00206EFEF218FA5C8447AB7BA5EF45310F10816BFA549B3A1DB38AD25C759
                                                                            APIs
                                                                            • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411B8C
                                                                            • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411C58
                                                                            • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411C7A
                                                                            • SetLastError.KERNEL32(0000007E,00411EF0), ref: 00411C91
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3736459250.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000006.00000002.3736330968.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736612366.0000000000459000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000471000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736689876.0000000000474000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3736802807.0000000000478000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLastRead
                                                                            • String ID:
                                                                            • API String ID: 4100373531-0
                                                                            • Opcode ID: 46f42941f51e653cdae40cd00269a703bf4e12df5cc4a1911c605fdb7767d4e6
                                                                            • Instruction ID: 277f4bdee2933866d2d1c697a3b04f0a6a13197b354a533a519a822f1f8833ca
                                                                            • Opcode Fuzzy Hash: 46f42941f51e653cdae40cd00269a703bf4e12df5cc4a1911c605fdb7767d4e6
                                                                            • Instruction Fuzzy Hash: 37419C75244305DFE7248F18DC84BA7B3E8FB48711F00082EEA8A87661F739E845CB99

                                                                            Execution Graph

                                                                            Execution Coverage:6.2%
                                                                            Dynamic/Decrypted Code Coverage:9.2%
                                                                            Signature Coverage:1.3%
                                                                            Total number of Nodes:2000
                                                                            Total number of Limit Nodes:79
                                                                            execution_graph 37631 44dea5 37632 44deb5 FreeLibrary 37631->37632 37633 44dec3 37631->37633 37632->37633 39945 4147f3 39948 414561 39945->39948 39947 414813 39949 41456d 39948->39949 39950 41457f GetPrivateProfileIntW 39948->39950 39953 4143f1 memset _itow WritePrivateProfileStringW 39949->39953 39950->39947 39952 41457a 39952->39947 39953->39952 37634 4287c1 37635 4287d2 37634->37635 37638 429ac1 37634->37638 37639 428818 37635->37639 37640 42881f 37635->37640 37650 425711 37635->37650 37636 4259da 37697 416760 11 API calls 37636->37697 37649 425ad6 37638->37649 37704 415c56 11 API calls 37638->37704 37671 42013a 37639->37671 37699 420244 97 API calls 37640->37699 37642 4260dd 37698 424251 120 API calls 37642->37698 37645 4259c2 37645->37649 37691 415c56 11 API calls 37645->37691 37650->37636 37650->37638 37650->37645 37653 429a4d 37650->37653 37656 422aeb memset memcpy memcpy 37650->37656 37660 4260a1 37650->37660 37668 425a38 37650->37668 37687 4227f0 memset memcpy 37650->37687 37688 422b84 15 API calls 37650->37688 37689 422b5d memset memcpy memcpy 37650->37689 37690 422640 13 API calls 37650->37690 37692 4241fc 11 API calls 37650->37692 37693 42413a 90 API calls 37650->37693 37654 429a66 37653->37654 37655 429a9b 37653->37655 37700 415c56 11 API calls 37654->37700 37659 429a96 37655->37659 37702 416760 11 API calls 37655->37702 37656->37650 37703 424251 120 API calls 37659->37703 37696 415c56 11 API calls 37660->37696 37662 429a7a 37701 416760 11 API calls 37662->37701 37668->37645 37694 422640 13 API calls 37668->37694 37695 4226e0 12 API calls 37668->37695 37672 42014c 37671->37672 37675 420151 37671->37675 37714 41e466 97 API calls 37672->37714 37674 420162 37674->37650 37675->37674 37676 4201b3 37675->37676 37677 420229 37675->37677 37678 4201b8 37676->37678 37679 4201dc 37676->37679 37677->37674 37680 41fd5e 86 API calls 37677->37680 37705 41fbdb 37678->37705 37679->37674 37683 4201ff 37679->37683 37711 41fc4c 37679->37711 37680->37674 37683->37674 37686 42013a 97 API calls 37683->37686 37686->37674 37687->37650 37688->37650 37689->37650 37690->37650 37691->37636 37692->37650 37693->37650 37694->37668 37695->37668 37696->37636 37697->37642 37698->37649 37699->37650 37700->37662 37701->37659 37702->37659 37703->37638 37704->37636 37706 41fbf1 37705->37706 37707 41fbf8 37705->37707 37710 41fc39 37706->37710 37729 4446ce 11 API calls 37706->37729 37719 41ee26 37707->37719 37710->37674 37715 41fd5e 37710->37715 37712 41ee6b 86 API calls 37711->37712 37713 41fc5d 37712->37713 37713->37679 37714->37675 37718 41fd65 37715->37718 37716 41fdab 37716->37674 37717 41fbdb 86 API calls 37717->37718 37718->37716 37718->37717 37720 41ee41 37719->37720 37721 41ee32 37719->37721 37730 41edad 37720->37730 37733 4446ce 11 API calls 37721->37733 37724 41ee3c 37724->37706 37727 41ee58 37727->37724 37735 41ee6b 37727->37735 37729->37710 37739 41be52 37730->37739 37733->37724 37734 41eb85 11 API calls 37734->37727 37736 41ee70 37735->37736 37737 41ee78 37735->37737 37792 41bf99 86 API calls 37736->37792 37737->37724 37740 41be6f 37739->37740 37741 41be5f 37739->37741 37746 41be8c 37740->37746 37771 418c63 memset memset 37740->37771 37770 4446ce 11 API calls 37741->37770 37743 41be69 37743->37724 37743->37734 37746->37743 37747 41bf3a 37746->37747 37749 41bed1 37746->37749 37751 41bee7 37746->37751 37774 4446ce 11 API calls 37747->37774 37750 41bef0 37749->37750 37753 41bee2 37749->37753 37750->37751 37752 41bf01 37750->37752 37751->37743 37775 41a453 86 API calls 37751->37775 37754 41bf24 memset 37752->37754 37756 41bf14 37752->37756 37772 418a6d memset memcpy memset 37752->37772 37760 41ac13 37753->37760 37754->37743 37773 41a223 memset memcpy memset 37756->37773 37759 41bf20 37759->37754 37761 41ac3f memset 37760->37761 37762 41ac52 37760->37762 37767 41acd9 37761->37767 37764 41ac6a 37762->37764 37776 41dc14 19 API calls 37762->37776 37765 41aca1 37764->37765 37777 41519d 37764->37777 37765->37767 37768 41acc0 memset 37765->37768 37769 41accd memcpy 37765->37769 37767->37751 37768->37767 37769->37767 37770->37743 37771->37746 37772->37756 37773->37759 37774->37751 37776->37764 37780 4175ed 37777->37780 37788 417570 SetFilePointer 37780->37788 37783 41760a ReadFile 37784 417637 37783->37784 37785 417627 GetLastError 37783->37785 37786 4151b3 37784->37786 37787 41763e memset 37784->37787 37785->37786 37786->37765 37787->37786 37789 4175b2 37788->37789 37790 41759c GetLastError 37788->37790 37789->37783 37789->37786 37790->37789 37791 4175a8 GetLastError 37790->37791 37791->37789 37792->37737 39954 44def7 39955 44df07 39954->39955 39956 44df00 ??3@YAXPAX 39954->39956 39957 44df17 39955->39957 39958 44df10 ??3@YAXPAX 39955->39958 39956->39955 39959 44df27 39957->39959 39960 44df20 ??3@YAXPAX 39957->39960 39958->39957 39961 44df37 39959->39961 39962 44df30 ??3@YAXPAX 39959->39962 39960->39959 39962->39961 37793 417bc5 37794 417c61 37793->37794 37795 417bda 37793->37795 37795->37794 37796 417bf6 UnmapViewOfFile CloseHandle 37795->37796 37798 417c2c 37795->37798 37800 4175b7 37795->37800 37796->37795 37796->37796 37798->37795 37805 41851e 20 API calls 37798->37805 37801 4175d6 CloseHandle 37800->37801 37802 4175c8 37801->37802 37803 4175df 37801->37803 37802->37803 37804 4175ce Sleep 37802->37804 37803->37795 37804->37801 37805->37798 37806 4152c7 malloc 37807 4152ef 37806->37807 37809 4152e2 37806->37809 37810 416760 11 API calls 37807->37810 37810->37809 39963 4148b6 FindResourceW 39964 4148cf SizeofResource 39963->39964 39967 4148f9 39963->39967 39965 4148e0 LoadResource 39964->39965 39964->39967 39966 4148ee LockResource 39965->39966 39965->39967 39966->39967 37811 415308 free 39968 441b3f 39978 43a9f6 39968->39978 39970 441b61 40151 4386af memset 39970->40151 39972 44189a 39973 442bd4 39972->39973 39974 4418e2 39972->39974 39975 4418ea 39973->39975 40153 441409 memset 39973->40153 39974->39975 40152 4414a9 12 API calls 39974->40152 39979 43aa20 39978->39979 39980 43aadf 39978->39980 39979->39980 39981 43aa34 memset 39979->39981 39980->39970 39982 43aa56 39981->39982 39983 43aa4d 39981->39983 40154 43a6e7 39982->40154 40162 42c02e memset 39983->40162 39988 43aad3 40164 4169a7 11 API calls 39988->40164 39989 43aaae 39989->39980 39989->39988 40004 43aae5 39989->40004 39991 43ac18 39993 43ac47 39991->39993 40166 42bbd5 memcpy memcpy memcpy memset memcpy 39991->40166 39994 43aca8 39993->39994 40167 438eed 16 API calls 39993->40167 39998 43acd5 39994->39998 40169 4233ae 11 API calls 39994->40169 39997 43ac87 40168 4233c5 16 API calls 39997->40168 40170 423426 11 API calls 39998->40170 40002 43ace1 40171 439811 163 API calls 40002->40171 40003 43a9f6 161 API calls 40003->40004 40004->39980 40004->39991 40004->40003 40165 439bbb 22 API calls 40004->40165 40006 43acfd 40012 43ad2c 40006->40012 40172 438eed 16 API calls 40006->40172 40008 43ad19 40173 4233c5 16 API calls 40008->40173 40010 43ad58 40174 44081d 163 API calls 40010->40174 40012->40010 40014 43add9 40012->40014 40014->40014 40178 423426 11 API calls 40014->40178 40015 43ae3a memset 40016 43ae73 40015->40016 40179 42e1c0 147 API calls 40016->40179 40017 43adab 40176 438c4e 163 API calls 40017->40176 40019 43ad6c 40019->39980 40019->40017 40175 42370b memset memcpy memset 40019->40175 40021 43ae96 40180 42e1c0 147 API calls 40021->40180 40023 43adcc 40177 440f84 12 API calls 40023->40177 40026 43aea8 40027 43aec1 40026->40027 40181 42e199 147 API calls 40026->40181 40029 43af00 40027->40029 40182 42e1c0 147 API calls 40027->40182 40029->39980 40032 43af1a 40029->40032 40033 43b3d9 40029->40033 40183 438eed 16 API calls 40032->40183 40038 43b3f6 40033->40038 40045 43b4c8 40033->40045 40035 43b60f 40035->39980 40242 4393a5 17 API calls 40035->40242 40036 43af2f 40184 4233c5 16 API calls 40036->40184 40224 432878 12 API calls 40038->40224 40040 43af51 40185 423426 11 API calls 40040->40185 40043 43af7d 40186 423426 11 API calls 40043->40186 40044 43b4f2 40231 43a76c 21 API calls 40044->40231 40045->40044 40230 42bbd5 memcpy memcpy memcpy memset memcpy 40045->40230 40049 43b529 40232 44081d 163 API calls 40049->40232 40050 43b428 40078 43b462 40050->40078 40225 432b60 16 API calls 40050->40225 40051 43af94 40187 423330 11 API calls 40051->40187 40055 43b47e 40058 43b497 40055->40058 40227 42374a memcpy memset memcpy memcpy memcpy 40055->40227 40056 43b544 40066 43b55c 40056->40066 40233 42c02e memset 40056->40233 40057 43afca 40188 423330 11 API calls 40057->40188 40228 4233ae 11 API calls 40058->40228 40063 43afdb 40189 4233ae 11 API calls 40063->40189 40065 43b4b1 40229 423399 11 API calls 40065->40229 40234 43a87a 163 API calls 40066->40234 40068 43b56c 40071 43b58a 40068->40071 40235 423330 11 API calls 40068->40235 40070 43afee 40190 44081d 163 API calls 40070->40190 40236 440f84 12 API calls 40071->40236 40073 43b4c1 40238 42db80 163 API calls 40073->40238 40077 43b592 40237 43a82f 16 API calls 40077->40237 40226 423330 11 API calls 40078->40226 40081 43b5b4 40239 438c4e 163 API calls 40081->40239 40083 43b5cf 40240 42c02e memset 40083->40240 40085 43b005 40085->39980 40090 43b01f 40085->40090 40191 42d836 163 API calls 40085->40191 40086 43b1ef 40201 4233c5 16 API calls 40086->40201 40088 43b212 40202 423330 11 API calls 40088->40202 40090->40086 40199 423330 11 API calls 40090->40199 40200 42d71d 163 API calls 40090->40200 40092 43add4 40092->40035 40241 438f86 16 API calls 40092->40241 40095 43b087 40192 4233ae 11 API calls 40095->40192 40096 43b22a 40203 42ccb5 11 API calls 40096->40203 40099 43b10f 40195 423330 11 API calls 40099->40195 40100 43b23f 40204 4233ae 11 API calls 40100->40204 40102 43b257 40205 4233ae 11 API calls 40102->40205 40106 43b129 40196 4233ae 11 API calls 40106->40196 40107 43b26e 40206 4233ae 11 API calls 40107->40206 40109 43b09a 40109->40099 40193 42cc15 19 API calls 40109->40193 40194 4233ae 11 API calls 40109->40194 40111 43b282 40207 43a87a 163 API calls 40111->40207 40113 43b13c 40197 440f84 12 API calls 40113->40197 40115 43b29d 40208 423330 11 API calls 40115->40208 40118 43b15f 40198 4233ae 11 API calls 40118->40198 40119 43b2af 40121 43b2b8 40119->40121 40122 43b2ce 40119->40122 40209 4233ae 11 API calls 40121->40209 40210 440f84 12 API calls 40122->40210 40125 43b2c9 40212 4233ae 11 API calls 40125->40212 40126 43b2da 40211 42370b memset memcpy memset 40126->40211 40129 43b2f9 40213 423330 11 API calls 40129->40213 40131 43b30b 40214 423330 11 API calls 40131->40214 40133 43b325 40215 423399 11 API calls 40133->40215 40135 43b332 40216 4233ae 11 API calls 40135->40216 40137 43b354 40217 423399 11 API calls 40137->40217 40139 43b364 40218 43a82f 16 API calls 40139->40218 40141 43b370 40219 42db80 163 API calls 40141->40219 40143 43b380 40220 438c4e 163 API calls 40143->40220 40145 43b39e 40221 423399 11 API calls 40145->40221 40147 43b3ae 40222 43a76c 21 API calls 40147->40222 40149 43b3c3 40223 423399 11 API calls 40149->40223 40151->39972 40152->39975 40153->39973 40155 43a6f5 40154->40155 40161 43a765 40154->40161 40155->40161 40243 42a115 40155->40243 40159 43a73d 40160 42a115 147 API calls 40159->40160 40159->40161 40160->40161 40161->39980 40163 4397fd memset 40161->40163 40162->39982 40163->39989 40164->39980 40165->40004 40166->39993 40167->39997 40168->39994 40169->39998 40170->40002 40171->40006 40172->40008 40173->40012 40174->40019 40175->40017 40176->40023 40177->40092 40178->40015 40179->40021 40180->40026 40181->40027 40182->40027 40183->40036 40184->40040 40185->40043 40186->40051 40187->40057 40188->40063 40189->40070 40190->40085 40191->40095 40192->40109 40193->40109 40194->40109 40195->40106 40196->40113 40197->40118 40198->40090 40199->40090 40200->40090 40201->40088 40202->40096 40203->40100 40204->40102 40205->40107 40206->40111 40207->40115 40208->40119 40209->40125 40210->40126 40211->40125 40212->40129 40213->40131 40214->40133 40215->40135 40216->40137 40217->40139 40218->40141 40219->40143 40220->40145 40221->40147 40222->40149 40223->40092 40224->40050 40225->40078 40226->40055 40227->40058 40228->40065 40229->40073 40230->40044 40231->40049 40232->40056 40233->40066 40234->40068 40235->40071 40236->40077 40237->40073 40238->40081 40239->40083 40240->40092 40241->40035 40242->39980 40244 42a175 40243->40244 40246 42a122 40243->40246 40244->40161 40249 42b13b 147 API calls 40244->40249 40246->40244 40247 42a115 147 API calls 40246->40247 40250 43a174 40246->40250 40274 42a0a8 147 API calls 40246->40274 40247->40246 40249->40159 40264 43a196 40250->40264 40265 43a19e 40250->40265 40251 43a306 40251->40264 40290 4388c4 14 API calls 40251->40290 40254 42a115 147 API calls 40254->40265 40255 415a91 memset 40255->40265 40256 43a642 40256->40264 40294 4169a7 11 API calls 40256->40294 40260 43a635 40293 42c02e memset 40260->40293 40264->40246 40265->40251 40265->40254 40265->40255 40265->40264 40275 42ff8c 40265->40275 40283 4165ff 40265->40283 40286 439504 13 API calls 40265->40286 40287 4312d0 147 API calls 40265->40287 40288 42be4c memcpy memcpy memcpy memset memcpy 40265->40288 40289 43a121 11 API calls 40265->40289 40267 43a325 40267->40256 40267->40260 40267->40264 40268 4169a7 11 API calls 40267->40268 40269 42b5b5 memset memcpy 40267->40269 40270 42bf4c 14 API calls 40267->40270 40273 4165ff 11 API calls 40267->40273 40291 42b63e 14 API calls 40267->40291 40292 42bfcf memcpy 40267->40292 40268->40267 40269->40267 40270->40267 40273->40267 40274->40246 40295 43817e 40275->40295 40277 42ff99 40278 42ffe3 40277->40278 40279 42ffd0 40277->40279 40282 42ff9d 40277->40282 40300 4169a7 11 API calls 40278->40300 40299 4169a7 11 API calls 40279->40299 40282->40265 40284 4165a0 11 API calls 40283->40284 40285 41660d 40284->40285 40285->40265 40286->40265 40287->40265 40288->40265 40289->40265 40290->40267 40291->40267 40292->40267 40293->40256 40294->40264 40296 438187 40295->40296 40298 438192 40295->40298 40301 4380f6 40296->40301 40298->40277 40299->40282 40300->40282 40303 43811f 40301->40303 40302 438164 40302->40298 40303->40302 40305 4300e8 3 API calls 40303->40305 40306 437e5e 40303->40306 40305->40303 40329 437d3c 40306->40329 40308 437eb3 40308->40303 40309 437ea9 40309->40308 40315 437f22 40309->40315 40344 41f432 40309->40344 40312 437f06 40391 415c56 11 API calls 40312->40391 40314 437f95 40392 415c56 11 API calls 40314->40392 40316 437f7f 40315->40316 40317 432d4e 3 API calls 40315->40317 40316->40314 40319 43802b 40316->40319 40317->40316 40320 4165ff 11 API calls 40319->40320 40321 438054 40320->40321 40355 437371 40321->40355 40324 43806b 40325 438094 40324->40325 40393 42f50e 138 API calls 40324->40393 40327 437fa3 40325->40327 40328 4300e8 3 API calls 40325->40328 40327->40308 40394 41f638 104 API calls 40327->40394 40328->40327 40330 437d69 40329->40330 40333 437d80 40329->40333 40395 437ccb 11 API calls 40330->40395 40332 437d76 40332->40309 40333->40332 40334 437da3 40333->40334 40335 437d90 40333->40335 40337 438460 134 API calls 40334->40337 40335->40332 40399 437ccb 11 API calls 40335->40399 40340 437dcb 40337->40340 40339 437de8 40398 424f26 123 API calls 40339->40398 40340->40339 40396 444283 13 API calls 40340->40396 40342 437dfc 40397 437ccb 11 API calls 40342->40397 40345 41f54d 40344->40345 40351 41f44f 40344->40351 40346 41f466 40345->40346 40429 41c635 memset memset 40345->40429 40346->40312 40346->40315 40351->40346 40353 41f50b 40351->40353 40400 41f1a5 40351->40400 40425 41c06f memcmp 40351->40425 40426 41f3b1 90 API calls 40351->40426 40427 41f398 86 API calls 40351->40427 40353->40345 40353->40346 40428 41c295 86 API calls 40353->40428 40356 41703f 11 API calls 40355->40356 40357 437399 40356->40357 40358 43739d 40357->40358 40361 4373ac 40357->40361 40430 4446ea 11 API calls 40358->40430 40360 4373a7 40360->40324 40362 416935 16 API calls 40361->40362 40363 4373ca 40362->40363 40365 438460 134 API calls 40363->40365 40369 4251c4 137 API calls 40363->40369 40373 415a91 memset 40363->40373 40376 43758f 40363->40376 40388 437584 40363->40388 40390 437d3c 135 API calls 40363->40390 40431 425433 13 API calls 40363->40431 40432 425413 17 API calls 40363->40432 40433 42533e 16 API calls 40363->40433 40434 42538f 16 API calls 40363->40434 40435 42453e 123 API calls 40363->40435 40364 4375bc 40367 415c7d 16 API calls 40364->40367 40365->40363 40368 4375d2 40367->40368 40368->40360 40370 4442e6 11 API calls 40368->40370 40369->40363 40371 4375e2 40370->40371 40371->40360 40438 444283 13 API calls 40371->40438 40373->40363 40436 42453e 123 API calls 40376->40436 40377 4375f4 40382 437620 40377->40382 40383 43760b 40377->40383 40381 43759f 40384 416935 16 API calls 40381->40384 40386 416935 16 API calls 40382->40386 40439 444283 13 API calls 40383->40439 40384->40388 40386->40360 40388->40364 40437 42453e 123 API calls 40388->40437 40389 437612 memcpy 40389->40360 40390->40363 40391->40308 40392->40327 40393->40325 40394->40308 40395->40332 40396->40342 40397->40339 40398->40332 40399->40332 40401 41bc3b 101 API calls 40400->40401 40402 41f1b4 40401->40402 40403 41edad 86 API calls 40402->40403 40410 41f282 40402->40410 40404 41f1cb 40403->40404 40405 41f1f5 memcmp 40404->40405 40406 41f20e 40404->40406 40404->40410 40405->40406 40407 41f21b memcmp 40406->40407 40406->40410 40408 41f326 40407->40408 40411 41f23d 40407->40411 40409 41ee6b 86 API calls 40408->40409 40408->40410 40409->40410 40410->40351 40411->40408 40412 41f28e memcmp 40411->40412 40414 41c8df 56 API calls 40411->40414 40412->40408 40413 41f2a9 40412->40413 40413->40408 40416 41f308 40413->40416 40417 41f2d8 40413->40417 40415 41f269 40414->40415 40415->40408 40418 41f287 40415->40418 40419 41f27a 40415->40419 40416->40408 40423 4446ce 11 API calls 40416->40423 40420 41ee6b 86 API calls 40417->40420 40418->40412 40421 41ee6b 86 API calls 40419->40421 40422 41f2e0 40420->40422 40421->40410 40424 41b1ca memset 40422->40424 40423->40408 40424->40410 40425->40351 40426->40351 40427->40351 40428->40345 40429->40346 40430->40360 40431->40363 40432->40363 40433->40363 40434->40363 40435->40363 40436->40381 40437->40364 40438->40377 40439->40389 37812 41276d 37813 41277d 37812->37813 37855 4044a4 LoadLibraryW 37813->37855 37815 412785 37816 412789 37815->37816 37863 414b81 37815->37863 37819 4127c8 37869 412465 memset ??2@YAPAXI 37819->37869 37821 4127ea 37881 40ac21 37821->37881 37826 412813 37899 40dd07 memset 37826->37899 37827 412827 37904 40db69 memset 37827->37904 37830 412822 37925 4125b6 ??3@YAXPAX 37830->37925 37832 40ada2 _wcsicmp 37834 41283d 37832->37834 37834->37830 37837 412863 CoInitialize 37834->37837 37909 41268e 37834->37909 37929 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37837->37929 37840 41296f 37931 40b633 37840->37931 37842 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37847 412957 CoUninitialize 37842->37847 37852 4128ca 37842->37852 37847->37830 37848 4128d0 TranslateAcceleratorW 37849 412941 GetMessageW 37848->37849 37848->37852 37849->37847 37849->37848 37850 412909 IsDialogMessageW 37850->37849 37850->37852 37851 4128fd IsDialogMessageW 37851->37849 37851->37850 37852->37848 37852->37850 37852->37851 37853 41292b TranslateMessage DispatchMessageW 37852->37853 37854 41291f IsDialogMessageW 37852->37854 37853->37849 37854->37849 37854->37853 37856 4044f7 37855->37856 37857 4044cf GetProcAddress 37855->37857 37861 404507 MessageBoxW 37856->37861 37862 40451e 37856->37862 37858 4044e8 FreeLibrary 37857->37858 37859 4044df 37857->37859 37858->37856 37860 4044f3 37858->37860 37859->37858 37860->37856 37861->37815 37862->37815 37864 414b8a 37863->37864 37865 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37863->37865 37935 40a804 memset 37864->37935 37865->37819 37868 414b9e GetProcAddress 37868->37865 37870 4124e0 37869->37870 37871 412505 ??2@YAPAXI 37870->37871 37872 41251c 37871->37872 37877 412521 37871->37877 37957 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37872->37957 37946 444722 37877->37946 37880 41259b wcscpy 37880->37821 37962 40b1ab free free 37881->37962 37883 40ad76 37963 40aa04 37883->37963 37886 40a9ce malloc memcpy free free 37889 40ac5c 37886->37889 37887 40ad4b 37887->37883 37975 40a9ce 37887->37975 37889->37883 37889->37886 37889->37887 37890 40ace7 free 37889->37890 37966 40a8d0 7 API calls 37889->37966 37967 4099f4 37889->37967 37890->37889 37895 40ada2 37896 40adc9 37895->37896 37897 40adaa 37895->37897 37896->37826 37896->37827 37897->37896 37898 40adb3 _wcsicmp 37897->37898 37898->37896 37898->37897 37981 40dce0 37899->37981 37901 40dd3a GetModuleHandleW 37986 40dba7 37901->37986 37905 40dce0 3 API calls 37904->37905 37906 40db99 37905->37906 38058 40dae1 37906->38058 38072 402f3a 37909->38072 37911 412766 37911->37830 37911->37837 37912 4126d3 _wcsicmp 37913 4126a8 37912->37913 37913->37911 37913->37912 37915 41270a 37913->37915 38107 4125f8 7 API calls 37913->38107 37915->37911 38075 411ac5 37915->38075 37926 4125da 37925->37926 37927 4125f0 37926->37927 37928 4125e6 DeleteObject 37926->37928 37930 40b1ab free free 37927->37930 37928->37927 37929->37842 37930->37840 37932 40b640 37931->37932 37933 40b639 free 37931->37933 37934 40b1ab free free 37932->37934 37933->37932 37934->37816 37936 40a83b GetSystemDirectoryW 37935->37936 37937 40a84c wcscpy 37935->37937 37936->37937 37942 409719 wcslen 37937->37942 37940 40a881 LoadLibraryW 37941 40a886 37940->37941 37941->37865 37941->37868 37943 409724 37942->37943 37944 409739 wcscat LoadLibraryW 37942->37944 37943->37944 37945 40972c wcscat 37943->37945 37944->37940 37944->37941 37945->37944 37947 444732 37946->37947 37948 444728 DeleteObject 37946->37948 37958 409cc3 37947->37958 37948->37947 37950 412551 37951 4010f9 37950->37951 37952 401130 37951->37952 37953 401134 GetModuleHandleW LoadIconW 37952->37953 37954 401107 wcsncat 37952->37954 37955 40a7be 37953->37955 37954->37952 37956 40a7d2 37955->37956 37956->37880 37956->37956 37957->37877 37961 409bfd memset wcscpy 37958->37961 37960 409cdb CreateFontIndirectW 37960->37950 37961->37960 37962->37889 37964 40aa14 37963->37964 37965 40aa0a free 37963->37965 37964->37895 37965->37964 37966->37889 37968 409a41 37967->37968 37969 4099fb malloc 37967->37969 37968->37889 37971 409a37 37969->37971 37972 409a1c 37969->37972 37971->37889 37973 409a30 free 37972->37973 37974 409a20 memcpy 37972->37974 37973->37971 37974->37973 37976 40a9e7 37975->37976 37977 40a9dc free 37975->37977 37978 4099f4 3 API calls 37976->37978 37979 40a9f2 37977->37979 37978->37979 37980 40a8d0 7 API calls 37979->37980 37980->37883 38005 409bca GetModuleFileNameW 37981->38005 37983 40dce6 wcsrchr 37984 40dcf5 37983->37984 37985 40dcf9 wcscat 37983->37985 37984->37985 37985->37901 38006 44db70 37986->38006 37990 40dbfd 38009 4447d9 37990->38009 37993 40dc34 wcscpy wcscpy 38035 40d6f5 37993->38035 37994 40dc1f wcscpy 37994->37993 37997 40d6f5 3 API calls 37998 40dc73 37997->37998 37999 40d6f5 3 API calls 37998->37999 38000 40dc89 37999->38000 38001 40d6f5 3 API calls 38000->38001 38002 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 38001->38002 38041 40da80 38002->38041 38005->37983 38007 40dbb4 memset memset 38006->38007 38008 409bca GetModuleFileNameW 38007->38008 38008->37990 38010 4447f4 38009->38010 38011 40dc1b 38010->38011 38012 444807 ??2@YAPAXI 38010->38012 38011->37993 38011->37994 38013 44481f 38012->38013 38014 444873 _snwprintf 38013->38014 38015 4448ab wcscpy 38013->38015 38048 44474a 8 API calls 38014->38048 38017 4448bb 38015->38017 38049 44474a 8 API calls 38017->38049 38018 4448a7 38018->38015 38018->38017 38020 4448cd 38050 44474a 8 API calls 38020->38050 38022 4448e2 38051 44474a 8 API calls 38022->38051 38024 4448f7 38052 44474a 8 API calls 38024->38052 38026 44490c 38053 44474a 8 API calls 38026->38053 38028 444921 38054 44474a 8 API calls 38028->38054 38030 444936 38055 44474a 8 API calls 38030->38055 38032 44494b 38056 44474a 8 API calls 38032->38056 38034 444960 ??3@YAXPAX 38034->38011 38036 44db70 38035->38036 38037 40d702 memset GetPrivateProfileStringW 38036->38037 38038 40d752 38037->38038 38039 40d75c WritePrivateProfileStringW 38037->38039 38038->38039 38040 40d758 38038->38040 38039->38040 38040->37997 38042 44db70 38041->38042 38043 40da8d memset 38042->38043 38044 40daac LoadStringW 38043->38044 38047 40dac6 38044->38047 38046 40dade 38046->37830 38047->38044 38047->38046 38057 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 38047->38057 38048->38018 38049->38020 38050->38022 38051->38024 38052->38026 38053->38028 38054->38030 38055->38032 38056->38034 38057->38047 38068 409b98 GetFileAttributesW 38058->38068 38060 40daea 38061 40daef wcscpy wcscpy GetPrivateProfileIntW 38060->38061 38067 40db63 38060->38067 38069 40d65d GetPrivateProfileStringW 38061->38069 38063 40db3e 38070 40d65d GetPrivateProfileStringW 38063->38070 38065 40db4f 38071 40d65d GetPrivateProfileStringW 38065->38071 38067->37832 38068->38060 38069->38063 38070->38065 38071->38067 38108 40eaff 38072->38108 38076 411ae2 memset 38075->38076 38077 411b8f 38075->38077 38148 409bca GetModuleFileNameW 38076->38148 38089 411a8b 38077->38089 38079 411b0a wcsrchr 38080 411b22 wcscat 38079->38080 38081 411b1f 38079->38081 38149 414770 wcscpy wcscpy wcscpy CreateFileW CloseHandle 38080->38149 38081->38080 38083 411b67 38150 402afb 38083->38150 38087 411b7f 38206 40ea13 SendMessageW memset SendMessageW 38087->38206 38090 402afb 27 API calls 38089->38090 38091 411ac0 38090->38091 38092 4110dc 38091->38092 38093 41113e 38092->38093 38098 4110f0 38092->38098 38231 40969c LoadCursorW SetCursor 38093->38231 38095 411143 38232 4032b4 38095->38232 38250 40b1ab free free 38095->38250 38251 444a54 38095->38251 38096 4110f7 _wcsicmp 38096->38098 38097 411157 38099 40ada2 _wcsicmp 38097->38099 38098->38093 38098->38096 38254 410c46 10 API calls 38098->38254 38102 411167 38099->38102 38100 4111af 38102->38100 38103 4111a6 qsort 38102->38103 38103->38100 38107->37913 38109 40eb10 38108->38109 38121 40e8e0 38109->38121 38112 40eb6c memcpy memcpy 38113 40ebb7 38112->38113 38113->38112 38114 40ebf2 ??2@YAPAXI ??2@YAPAXI 38113->38114 38116 40d134 16 API calls 38113->38116 38115 40ec65 38114->38115 38117 40ec2e ??2@YAPAXI 38114->38117 38131 40ea7f 38115->38131 38116->38113 38117->38115 38120 402f49 38120->37913 38122 40e8f2 38121->38122 38123 40e8eb ??3@YAXPAX 38121->38123 38124 40e900 38122->38124 38125 40e8f9 ??3@YAXPAX 38122->38125 38123->38122 38126 40e911 38124->38126 38127 40e90a ??3@YAXPAX 38124->38127 38125->38124 38128 40e931 ??2@YAPAXI ??2@YAPAXI 38126->38128 38129 40e921 ??3@YAXPAX 38126->38129 38130 40e92a ??3@YAXPAX 38126->38130 38127->38126 38128->38112 38129->38130 38130->38128 38132 40aa04 free 38131->38132 38133 40ea88 38132->38133 38134 40aa04 free 38133->38134 38135 40ea90 38134->38135 38136 40aa04 free 38135->38136 38137 40ea98 38136->38137 38138 40aa04 free 38137->38138 38139 40eaa0 38138->38139 38140 40a9ce 4 API calls 38139->38140 38141 40eab3 38140->38141 38142 40a9ce 4 API calls 38141->38142 38143 40eabd 38142->38143 38144 40a9ce 4 API calls 38143->38144 38145 40eac7 38144->38145 38146 40a9ce 4 API calls 38145->38146 38147 40ead1 38146->38147 38147->38120 38148->38079 38149->38083 38207 40b2cc 38150->38207 38152 402b0a 38153 40b2cc 27 API calls 38152->38153 38154 402b23 38153->38154 38155 40b2cc 27 API calls 38154->38155 38156 402b3a 38155->38156 38157 40b2cc 27 API calls 38156->38157 38158 402b54 38157->38158 38159 40b2cc 27 API calls 38158->38159 38160 402b6b 38159->38160 38161 40b2cc 27 API calls 38160->38161 38162 402b82 38161->38162 38163 40b2cc 27 API calls 38162->38163 38164 402b99 38163->38164 38165 40b2cc 27 API calls 38164->38165 38166 402bb0 38165->38166 38167 40b2cc 27 API calls 38166->38167 38168 402bc7 38167->38168 38169 40b2cc 27 API calls 38168->38169 38170 402bde 38169->38170 38171 40b2cc 27 API calls 38170->38171 38172 402bf5 38171->38172 38173 40b2cc 27 API calls 38172->38173 38174 402c0c 38173->38174 38175 40b2cc 27 API calls 38174->38175 38176 402c23 38175->38176 38177 40b2cc 27 API calls 38176->38177 38178 402c3a 38177->38178 38179 40b2cc 27 API calls 38178->38179 38180 402c51 38179->38180 38181 40b2cc 27 API calls 38180->38181 38182 402c68 38181->38182 38183 40b2cc 27 API calls 38182->38183 38184 402c7f 38183->38184 38185 40b2cc 27 API calls 38184->38185 38186 402c99 38185->38186 38187 40b2cc 27 API calls 38186->38187 38188 402cb3 38187->38188 38189 40b2cc 27 API calls 38188->38189 38190 402cd5 38189->38190 38191 40b2cc 27 API calls 38190->38191 38192 402cf0 38191->38192 38193 40b2cc 27 API calls 38192->38193 38194 402d0b 38193->38194 38195 40b2cc 27 API calls 38194->38195 38196 402d26 38195->38196 38197 40b2cc 27 API calls 38196->38197 38198 402d3e 38197->38198 38199 40b2cc 27 API calls 38198->38199 38200 402d59 38199->38200 38201 40b2cc 27 API calls 38200->38201 38202 402d78 38201->38202 38203 40b2cc 27 API calls 38202->38203 38204 402d93 38203->38204 38205 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38204->38205 38205->38087 38206->38077 38210 40b58d 38207->38210 38209 40b2d1 38209->38152 38211 40b5a4 GetModuleHandleW FindResourceW 38210->38211 38212 40b62e 38210->38212 38213 40b5c2 LoadResource 38211->38213 38215 40b5e7 38211->38215 38212->38209 38214 40b5d0 SizeofResource LockResource 38213->38214 38213->38215 38214->38215 38215->38212 38223 40afcf 38215->38223 38217 40b608 memcpy 38226 40b4d3 memcpy 38217->38226 38219 40b61e 38227 40b3c1 18 API calls 38219->38227 38221 40b626 38228 40b04b 38221->38228 38224 40b04b ??3@YAXPAX 38223->38224 38225 40afd7 ??2@YAPAXI 38224->38225 38225->38217 38226->38219 38227->38221 38229 40b051 ??3@YAXPAX 38228->38229 38230 40b05f 38228->38230 38229->38230 38230->38212 38231->38095 38233 4032c4 38232->38233 38234 40b633 free 38233->38234 38235 403316 38234->38235 38255 44553b 38235->38255 38239 403480 38453 40368c 15 API calls 38239->38453 38241 403489 38242 40b633 free 38241->38242 38244 403495 38242->38244 38243 40333c 38243->38239 38245 4033a9 memset memcpy 38243->38245 38246 4033ec wcscmp 38243->38246 38451 4028e7 11 API calls 38243->38451 38452 40f508 6 API calls 38243->38452 38244->38097 38245->38243 38245->38246 38246->38243 38249 403421 _wcsicmp 38249->38243 38250->38097 38252 444a64 FreeLibrary 38251->38252 38253 444a83 38251->38253 38252->38253 38253->38097 38254->38098 38256 445548 38255->38256 38257 445599 38256->38257 38454 40c768 38256->38454 38258 4455a8 memset 38257->38258 38265 4457f2 38257->38265 38537 403988 38258->38537 38268 445854 38265->38268 38639 403e2d memset memset memset memset memset 38265->38639 38266 4455e5 38277 445672 38266->38277 38282 44560f 38266->38282 38267 4458bb memset memset 38270 414c2e 17 API calls 38267->38270 38321 4458aa 38268->38321 38662 403c9c memset memset memset memset memset 38268->38662 38273 4458f9 38270->38273 38272 44595e memset memset 38280 414c2e 17 API calls 38272->38280 38281 40b2cc 27 API calls 38273->38281 38275 44558c 38521 444b06 38275->38521 38276 44557a 38276->38275 38735 4136c0 CoTaskMemFree 38276->38735 38548 403fbe memset memset memset memset memset 38277->38548 38278 445a00 memset memset 38685 414c2e 38278->38685 38279 445b22 38285 445bca 38279->38285 38286 445b38 memset memset memset 38279->38286 38290 44599c 38280->38290 38292 445909 38281->38292 38294 4087b3 338 API calls 38282->38294 38284 445849 38751 40b1ab free free 38284->38751 38293 445c8b memset memset 38285->38293 38359 445cf0 38285->38359 38297 445bd4 38286->38297 38298 445b98 38286->38298 38291 40b2cc 27 API calls 38290->38291 38305 4459ac 38291->38305 38302 409d1f 6 API calls 38292->38302 38306 414c2e 17 API calls 38293->38306 38303 445621 38294->38303 38295 44589f 38752 40b1ab free free 38295->38752 38296 445585 38736 41366b FreeLibrary 38296->38736 38312 414c2e 17 API calls 38297->38312 38298->38297 38308 445ba2 38298->38308 38301 403335 38450 4452e5 45 API calls 38301->38450 38316 445919 38302->38316 38737 4454bf 20 API calls 38303->38737 38304 445823 38304->38284 38326 4087b3 338 API calls 38304->38326 38317 409d1f 6 API calls 38305->38317 38318 445cc9 38306->38318 38824 4099c6 wcslen 38308->38824 38309 4456b2 38739 40b1ab free free 38309->38739 38311 40b2cc 27 API calls 38322 445a4f 38311->38322 38313 445be2 38312->38313 38324 40b2cc 27 API calls 38313->38324 38314 445d3d 38344 40b2cc 27 API calls 38314->38344 38315 445d88 memset memset memset 38327 414c2e 17 API calls 38315->38327 38753 409b98 GetFileAttributesW 38316->38753 38328 4459bc 38317->38328 38329 409d1f 6 API calls 38318->38329 38319 445879 38319->38295 38340 4087b3 338 API calls 38319->38340 38321->38267 38345 44594a 38321->38345 38701 409d1f wcslen wcslen 38322->38701 38334 445bf3 38324->38334 38326->38304 38337 445dde 38327->38337 38820 409b98 GetFileAttributesW 38328->38820 38339 445ce1 38329->38339 38330 445bb3 38827 445403 memset 38330->38827 38331 445680 38331->38309 38571 4087b3 memset 38331->38571 38343 409d1f 6 API calls 38334->38343 38335 445928 38335->38345 38754 40b6ef 38335->38754 38346 40b2cc 27 API calls 38337->38346 38844 409b98 GetFileAttributesW 38339->38844 38340->38319 38342 40b2cc 27 API calls 38351 445a94 38342->38351 38353 445c07 38343->38353 38354 445d54 _wcsicmp 38344->38354 38345->38272 38358 4459ed 38345->38358 38357 445def 38346->38357 38347 4459cb 38347->38358 38367 40b6ef 253 API calls 38347->38367 38706 40ae18 38351->38706 38352 44566d 38352->38265 38622 413d4c 38352->38622 38363 445389 259 API calls 38353->38363 38364 445d71 38354->38364 38427 445d67 38354->38427 38356 445665 38738 40b1ab free free 38356->38738 38365 409d1f 6 API calls 38357->38365 38358->38278 38358->38279 38359->38301 38359->38314 38359->38315 38360 445389 259 API calls 38360->38285 38369 445c17 38363->38369 38845 445093 23 API calls 38364->38845 38372 445e03 38365->38372 38367->38358 38368 4456d8 38374 40b2cc 27 API calls 38368->38374 38375 40b2cc 27 API calls 38369->38375 38371 44563c 38371->38356 38377 4087b3 338 API calls 38371->38377 38846 409b98 GetFileAttributesW 38372->38846 38373 40b6ef 253 API calls 38373->38301 38379 4456e2 38374->38379 38380 445c23 38375->38380 38376 445d83 38376->38301 38377->38371 38740 413fa6 _wcsicmp _wcsicmp 38379->38740 38384 409d1f 6 API calls 38380->38384 38382 445e12 38388 445e6b 38382->38388 38395 40b2cc 27 API calls 38382->38395 38386 445c37 38384->38386 38385 4456eb 38391 4456fd memset memset memset memset 38385->38391 38392 4457ea 38385->38392 38393 445389 259 API calls 38386->38393 38387 445b17 38821 40aebe 38387->38821 38848 445093 23 API calls 38388->38848 38741 409c70 wcscpy wcsrchr 38391->38741 38744 413d29 38392->38744 38398 445c47 38393->38398 38399 445e33 38395->38399 38396 445e7e 38401 445f67 38396->38401 38404 40b2cc 27 API calls 38398->38404 38405 409d1f 6 API calls 38399->38405 38410 40b2cc 27 API calls 38401->38410 38402 445ab2 memset 38406 40b2cc 27 API calls 38402->38406 38408 445c53 38404->38408 38409 445e47 38405->38409 38411 445aa1 38406->38411 38407 409c70 2 API calls 38412 44577e 38407->38412 38413 409d1f 6 API calls 38408->38413 38847 409b98 GetFileAttributesW 38409->38847 38415 445f73 38410->38415 38411->38387 38411->38402 38416 409d1f 6 API calls 38411->38416 38713 40add4 38411->38713 38718 445389 38411->38718 38727 40ae51 38411->38727 38417 409c70 2 API calls 38412->38417 38418 445c67 38413->38418 38420 409d1f 6 API calls 38415->38420 38416->38411 38421 44578d 38417->38421 38422 445389 259 API calls 38418->38422 38419 445e56 38419->38388 38425 445e83 memset 38419->38425 38423 445f87 38420->38423 38421->38392 38429 40b2cc 27 API calls 38421->38429 38422->38285 38851 409b98 GetFileAttributesW 38423->38851 38428 40b2cc 27 API calls 38425->38428 38427->38301 38427->38373 38430 445eab 38428->38430 38431 4457a8 38429->38431 38432 409d1f 6 API calls 38430->38432 38433 409d1f 6 API calls 38431->38433 38434 445ebf 38432->38434 38435 4457b8 38433->38435 38436 40ae18 9 API calls 38434->38436 38743 409b98 GetFileAttributesW 38435->38743 38446 445ef5 38436->38446 38438 4457c7 38438->38392 38440 4087b3 338 API calls 38438->38440 38439 40ae51 9 API calls 38439->38446 38440->38392 38441 445f5c 38443 40aebe FindClose 38441->38443 38442 40add4 2 API calls 38442->38446 38443->38401 38444 40b2cc 27 API calls 38444->38446 38445 409d1f 6 API calls 38445->38446 38446->38439 38446->38441 38446->38442 38446->38444 38446->38445 38448 445f3a 38446->38448 38849 409b98 GetFileAttributesW 38446->38849 38850 445093 23 API calls 38448->38850 38450->38243 38451->38249 38452->38243 38453->38241 38455 40c775 38454->38455 38852 40b1ab free free 38455->38852 38457 40c788 38853 40b1ab free free 38457->38853 38459 40c790 38854 40b1ab free free 38459->38854 38461 40c798 38462 40aa04 free 38461->38462 38463 40c7a0 38462->38463 38855 40c274 memset 38463->38855 38468 40a8ab 9 API calls 38469 40c7c3 38468->38469 38470 40a8ab 9 API calls 38469->38470 38471 40c7d0 38470->38471 38884 40c3c3 38471->38884 38475 40c877 38484 40bdb0 38475->38484 38476 40c86c 38926 4053fe 39 API calls 38476->38926 38477 40c7e5 38477->38475 38477->38476 38483 40c634 50 API calls 38477->38483 38909 40a706 38477->38909 38483->38477 39186 404363 38484->39186 38487 40bf5d 39206 40440c 38487->39206 38488 40bdee 38488->38487 38492 40b2cc 27 API calls 38488->38492 38489 40bddf CredEnumerateW 38489->38488 38493 40be02 wcslen 38492->38493 38493->38487 38500 40be1e 38493->38500 38494 40be26 wcsncmp 38494->38500 38497 40be7d memset 38498 40bea7 memcpy 38497->38498 38497->38500 38499 40bf11 wcschr 38498->38499 38498->38500 38499->38500 38500->38487 38500->38494 38500->38497 38500->38498 38500->38499 38501 40b2cc 27 API calls 38500->38501 38503 40bf43 LocalFree 38500->38503 39209 40bd5d 28 API calls 38500->39209 39210 404423 38500->39210 38502 40bef6 _wcsnicmp 38501->38502 38502->38499 38502->38500 38503->38500 38504 4135f7 39225 4135e0 38504->39225 38507 40b2cc 27 API calls 38508 41360d 38507->38508 38509 40a804 8 API calls 38508->38509 38510 413613 38509->38510 38511 41361b 38510->38511 38512 41363e 38510->38512 38513 40b273 27 API calls 38511->38513 38514 4135e0 FreeLibrary 38512->38514 38515 413625 GetProcAddress 38513->38515 38516 413643 38514->38516 38515->38512 38517 413648 38515->38517 38516->38276 38518 413658 38517->38518 38519 4135e0 FreeLibrary 38517->38519 38518->38276 38520 413666 38519->38520 38520->38276 39228 4449b9 38521->39228 38524 444c1f 38524->38257 38525 4449b9 42 API calls 38527 444b4b 38525->38527 38526 444c15 38529 4449b9 42 API calls 38526->38529 38527->38526 39249 444972 GetVersionExW 38527->39249 38529->38524 38530 444b99 memcmp 38535 444b8c 38530->38535 38531 444c0b 39253 444a85 42 API calls 38531->39253 38535->38530 38535->38531 39250 444aa5 42 API calls 38535->39250 39251 40a7a0 GetVersionExW 38535->39251 39252 444a85 42 API calls 38535->39252 38538 40399d 38537->38538 39254 403a16 38538->39254 38540 403a09 39268 40b1ab free free 38540->39268 38542 403a12 wcsrchr 38542->38266 38543 4039a3 38543->38540 38546 4039f4 38543->38546 39265 40a02c CreateFileW 38543->39265 38546->38540 38547 4099c6 2 API calls 38546->38547 38547->38540 38549 414c2e 17 API calls 38548->38549 38550 404048 38549->38550 38551 414c2e 17 API calls 38550->38551 38552 404056 38551->38552 38553 409d1f 6 API calls 38552->38553 38554 404073 38553->38554 38555 409d1f 6 API calls 38554->38555 38556 40408e 38555->38556 38557 409d1f 6 API calls 38556->38557 38558 4040a6 38557->38558 38559 403af5 20 API calls 38558->38559 38560 4040ba 38559->38560 38561 403af5 20 API calls 38560->38561 38562 4040cb 38561->38562 39295 40414f memset 38562->39295 38564 404140 39309 40b1ab free free 38564->39309 38565 4040ec memset 38569 4040e0 38565->38569 38567 404148 38567->38331 38568 4099c6 2 API calls 38568->38569 38569->38564 38569->38565 38569->38568 38570 40a8ab 9 API calls 38569->38570 38570->38569 39322 40a6e6 WideCharToMultiByte 38571->39322 38573 4087ed 39323 4095d9 memset 38573->39323 38576 408809 memset memset memset memset memset 38577 40b2cc 27 API calls 38576->38577 38578 4088a1 38577->38578 38579 409d1f 6 API calls 38578->38579 38580 4088b1 38579->38580 38581 40b2cc 27 API calls 38580->38581 38582 4088c0 38581->38582 38583 409d1f 6 API calls 38582->38583 38584 4088d0 38583->38584 38585 40b2cc 27 API calls 38584->38585 38586 4088df 38585->38586 38587 409d1f 6 API calls 38586->38587 38588 4088ef 38587->38588 38589 40b2cc 27 API calls 38588->38589 38590 4088fe 38589->38590 38591 409d1f 6 API calls 38590->38591 38592 40890e 38591->38592 38593 40b2cc 27 API calls 38592->38593 38594 40891d 38593->38594 38595 409d1f 6 API calls 38594->38595 38596 40892d 38595->38596 39342 409b98 GetFileAttributesW 38596->39342 38598 40893e 38599 408943 38598->38599 38600 408958 38598->38600 39343 407fdf 75 API calls 38599->39343 39344 409b98 GetFileAttributesW 38600->39344 38603 408953 38603->38331 38604 408964 38623 40b633 free 38622->38623 38624 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38623->38624 38625 413f00 Process32NextW 38624->38625 38626 413da5 OpenProcess 38625->38626 38627 413f17 CloseHandle 38625->38627 38628 413eb0 38626->38628 38629 413df3 memset 38626->38629 38627->38368 38628->38625 38631 413ebf free 38628->38631 38632 4099f4 3 API calls 38628->38632 39766 413f27 38629->39766 38631->38628 38632->38628 38633 413e1f 38634 413e37 GetModuleHandleW 38633->38634 39771 413959 38633->39771 39787 413ca4 38633->39787 38634->38633 38636 413e46 GetProcAddress 38634->38636 38636->38633 38638 413ea2 CloseHandle 38638->38628 38640 414c2e 17 API calls 38639->38640 38641 403eb7 38640->38641 38642 414c2e 17 API calls 38641->38642 38643 403ec5 38642->38643 38644 409d1f 6 API calls 38643->38644 38645 403ee2 38644->38645 38646 409d1f 6 API calls 38645->38646 38647 403efd 38646->38647 38648 409d1f 6 API calls 38647->38648 38649 403f15 38648->38649 38650 403af5 20 API calls 38649->38650 38651 403f29 38650->38651 38652 403af5 20 API calls 38651->38652 38653 403f3a 38652->38653 38654 40414f 33 API calls 38653->38654 38660 403f4f 38654->38660 38655 403faf 39801 40b1ab free free 38655->39801 38657 403f5b memset 38657->38660 38658 403fb7 38658->38304 38659 4099c6 2 API calls 38659->38660 38660->38655 38660->38657 38660->38659 38661 40a8ab 9 API calls 38660->38661 38661->38660 38663 414c2e 17 API calls 38662->38663 38664 403d26 38663->38664 38665 414c2e 17 API calls 38664->38665 38666 403d34 38665->38666 38667 409d1f 6 API calls 38666->38667 38668 403d51 38667->38668 38669 409d1f 6 API calls 38668->38669 38670 403d6c 38669->38670 38671 409d1f 6 API calls 38670->38671 38672 403d84 38671->38672 38673 403af5 20 API calls 38672->38673 38674 403d98 38673->38674 38675 403af5 20 API calls 38674->38675 38676 403da9 38675->38676 38677 40414f 33 API calls 38676->38677 38678 403dbe 38677->38678 38679 403e1e 38678->38679 38681 403dca memset 38678->38681 38683 4099c6 2 API calls 38678->38683 38684 40a8ab 9 API calls 38678->38684 39802 40b1ab free free 38679->39802 38681->38678 38682 403e26 38682->38319 38683->38678 38684->38678 38686 414b81 9 API calls 38685->38686 38688 414c40 38686->38688 38687 414c73 memset 38690 414c94 38687->38690 38688->38687 39803 409cea 38688->39803 39806 414592 RegOpenKeyExW 38690->39806 38693 414c64 SHGetSpecialFolderPathW 38695 414d0b 38693->38695 38694 414cc1 38696 414cf4 wcscpy 38694->38696 39807 414bb0 wcscpy 38694->39807 38695->38311 38696->38695 38698 414cd2 39808 4145ac RegQueryValueExW 38698->39808 38700 414ce9 RegCloseKey 38700->38696 38702 409d62 38701->38702 38703 409d43 wcscpy 38701->38703 38702->38342 38704 409719 2 API calls 38703->38704 38705 409d51 wcscat 38704->38705 38705->38702 38707 40aebe FindClose 38706->38707 38708 40ae21 38707->38708 38709 4099c6 2 API calls 38708->38709 38710 40ae35 38709->38710 38711 409d1f 6 API calls 38710->38711 38712 40ae49 38711->38712 38712->38411 38714 40ade0 38713->38714 38717 40ae0f 38713->38717 38715 40ade7 wcscmp 38714->38715 38714->38717 38716 40adfe wcscmp 38715->38716 38715->38717 38716->38717 38717->38411 38719 40ae18 9 API calls 38718->38719 38724 4453c4 38719->38724 38720 40ae51 9 API calls 38720->38724 38721 4453f3 38723 40aebe FindClose 38721->38723 38722 40add4 2 API calls 38722->38724 38725 4453fe 38723->38725 38724->38720 38724->38721 38724->38722 38726 445403 254 API calls 38724->38726 38725->38411 38726->38724 38728 40ae7b FindNextFileW 38727->38728 38729 40ae5c FindFirstFileW 38727->38729 38730 40ae94 38728->38730 38731 40ae8f 38728->38731 38729->38730 38733 40aeb6 38730->38733 38734 409d1f 6 API calls 38730->38734 38732 40aebe FindClose 38731->38732 38732->38730 38733->38411 38734->38733 38735->38296 38736->38275 38737->38371 38738->38352 38739->38352 38740->38385 38742 409c89 38741->38742 38742->38407 38743->38438 38745 413d39 38744->38745 38746 413d2f FreeLibrary 38744->38746 38747 40b633 free 38745->38747 38746->38745 38748 413d42 38747->38748 38749 40b633 free 38748->38749 38750 413d4a 38749->38750 38750->38265 38751->38268 38752->38321 38753->38335 38755 44db70 38754->38755 38756 40b6fc memset 38755->38756 38757 409c70 2 API calls 38756->38757 38758 40b732 wcsrchr 38757->38758 38759 40b743 38758->38759 38760 40b746 memset 38758->38760 38759->38760 38761 40b2cc 27 API calls 38760->38761 38762 40b76f 38761->38762 38763 409d1f 6 API calls 38762->38763 38764 40b783 38763->38764 39809 409b98 GetFileAttributesW 38764->39809 38766 40b792 38767 40b7c2 38766->38767 38768 409c70 2 API calls 38766->38768 39810 40bb98 38767->39810 38770 40b7a5 38768->38770 38772 40b2cc 27 API calls 38770->38772 38776 40b7b2 38772->38776 38773 40b837 CloseHandle 38775 40b83e memset 38773->38775 38774 40b817 38777 409a45 3 API calls 38774->38777 39843 40a6e6 WideCharToMultiByte 38775->39843 38779 409d1f 6 API calls 38776->38779 38780 40b827 CopyFileW 38777->38780 38779->38767 38780->38775 38781 40b866 38782 444432 121 API calls 38781->38782 38784 40b879 38782->38784 38783 40bad5 38786 40baeb 38783->38786 38787 40bade DeleteFileW 38783->38787 38784->38783 38785 40b273 27 API calls 38784->38785 38788 40b89a 38785->38788 38789 40b04b ??3@YAXPAX 38786->38789 38787->38786 38790 438552 134 API calls 38788->38790 38791 40baf3 38789->38791 38792 40b8a4 38790->38792 38791->38345 38793 40bacd 38792->38793 38795 4251c4 137 API calls 38792->38795 38794 443d90 111 API calls 38793->38794 38794->38783 38818 40b8b8 38795->38818 38796 40bac6 39853 424f26 123 API calls 38796->39853 38797 40b8bd memset 39844 425413 17 API calls 38797->39844 38800 425413 17 API calls 38800->38818 38803 40a71b MultiByteToWideChar 38803->38818 38804 40a734 MultiByteToWideChar 38804->38818 38807 40b9b5 memcmp 38807->38818 38808 4099c6 2 API calls 38808->38818 38809 404423 38 API calls 38809->38818 38812 40bb3e memset memcpy 39854 40a734 MultiByteToWideChar 38812->39854 38813 4251c4 137 API calls 38813->38818 38815 40bb88 LocalFree 38815->38818 38818->38796 38818->38797 38818->38800 38818->38803 38818->38804 38818->38807 38818->38808 38818->38809 38818->38812 38818->38813 38819 40ba5f memcmp 38818->38819 39845 4253ef 16 API calls 38818->39845 39846 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38818->39846 39847 4253af 17 API calls 38818->39847 39848 4253cf 17 API calls 38818->39848 39849 447280 memset 38818->39849 39850 447960 memset memcpy memcpy memcpy 38818->39850 39851 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38818->39851 39852 447920 memcpy memcpy memcpy 38818->39852 38819->38818 38820->38347 38822 40aed1 38821->38822 38823 40aec7 FindClose 38821->38823 38822->38279 38823->38822 38825 4099d7 38824->38825 38826 4099da memcpy 38824->38826 38825->38826 38826->38330 38828 40b2cc 27 API calls 38827->38828 38829 44543f 38828->38829 38830 409d1f 6 API calls 38829->38830 38831 44544f 38830->38831 39943 409b98 GetFileAttributesW 38831->39943 38833 44545e 38834 445476 38833->38834 38835 40b6ef 253 API calls 38833->38835 38836 40b2cc 27 API calls 38834->38836 38835->38834 38837 445482 38836->38837 38838 409d1f 6 API calls 38837->38838 38839 445492 38838->38839 39944 409b98 GetFileAttributesW 38839->39944 38841 4454a1 38842 4454b9 38841->38842 38843 40b6ef 253 API calls 38841->38843 38842->38360 38843->38842 38844->38359 38845->38376 38846->38382 38847->38419 38848->38396 38849->38446 38850->38446 38851->38427 38852->38457 38853->38459 38854->38461 38856 414c2e 17 API calls 38855->38856 38857 40c2ae 38856->38857 38927 40c1d3 38857->38927 38862 40c3be 38879 40a8ab 38862->38879 38863 40afcf 2 API calls 38864 40c2fd FindFirstUrlCacheEntryW 38863->38864 38865 40c3b6 38864->38865 38866 40c31e wcschr 38864->38866 38867 40b04b ??3@YAXPAX 38865->38867 38868 40c331 38866->38868 38869 40c35e FindNextUrlCacheEntryW 38866->38869 38867->38862 38871 40a8ab 9 API calls 38868->38871 38869->38866 38870 40c373 GetLastError 38869->38870 38872 40c3ad FindCloseUrlCache 38870->38872 38873 40c37e 38870->38873 38874 40c33e wcschr 38871->38874 38872->38865 38875 40afcf 2 API calls 38873->38875 38874->38869 38876 40c34f 38874->38876 38877 40c391 FindNextUrlCacheEntryW 38875->38877 38878 40a8ab 9 API calls 38876->38878 38877->38866 38877->38872 38878->38869 39110 40a97a 38879->39110 38882 40a8cc 38882->38468 39116 40b1ab free free 38884->39116 38886 40c3dd 38887 40b2cc 27 API calls 38886->38887 38888 40c3e7 38887->38888 39117 414592 RegOpenKeyExW 38888->39117 38890 40c3f4 38891 40c50e 38890->38891 38892 40c3ff 38890->38892 38906 405337 38891->38906 38893 40a9ce 4 API calls 38892->38893 38894 40c418 memset 38893->38894 39118 40aa1d 38894->39118 38897 40c471 38899 40c47a _wcsupr 38897->38899 38898 40c505 RegCloseKey 38898->38891 39120 40a8d0 7 API calls 38899->39120 38901 40c498 39121 40a8d0 7 API calls 38901->39121 38903 40c4ac memset 38904 40aa1d 38903->38904 38905 40c4e4 RegEnumValueW 38904->38905 38905->38898 38905->38899 39122 405220 38906->39122 38910 4099c6 2 API calls 38909->38910 38911 40a714 _wcslwr 38910->38911 38912 40c634 38911->38912 39179 405361 38912->39179 38915 40c65c wcslen 39182 4053b6 39 API calls 38915->39182 38916 40c71d wcslen 38916->38477 38918 40c677 38919 40c713 38918->38919 39183 40538b 39 API calls 38918->39183 39185 4053df 39 API calls 38919->39185 38922 40c6a5 38922->38919 38923 40c6a9 memset 38922->38923 38924 40c6d3 38923->38924 39184 40c589 44 API calls 38924->39184 38926->38475 38928 40ae18 9 API calls 38927->38928 38934 40c210 38928->38934 38929 40ae51 9 API calls 38929->38934 38930 40c264 38931 40aebe FindClose 38930->38931 38933 40c26f 38931->38933 38932 40add4 2 API calls 38932->38934 38939 40e5ed memset memset 38933->38939 38934->38929 38934->38930 38934->38932 38935 40c231 _wcsicmp 38934->38935 38936 40c1d3 35 API calls 38934->38936 38935->38934 38937 40c248 38935->38937 38936->38934 38952 40c084 22 API calls 38937->38952 38940 414c2e 17 API calls 38939->38940 38941 40e63f 38940->38941 38942 409d1f 6 API calls 38941->38942 38943 40e658 38942->38943 38953 409b98 GetFileAttributesW 38943->38953 38945 40e667 38946 40e680 38945->38946 38947 409d1f 6 API calls 38945->38947 38954 409b98 GetFileAttributesW 38946->38954 38947->38946 38949 40e68f 38950 40c2d8 38949->38950 38955 40e4b2 38949->38955 38950->38862 38950->38863 38952->38934 38953->38945 38954->38949 38976 40e01e 38955->38976 38957 40e593 38958 40e5b0 38957->38958 38959 40e59c DeleteFileW 38957->38959 38960 40b04b ??3@YAXPAX 38958->38960 38959->38958 38962 40e5bb 38960->38962 38961 40e521 38961->38957 38999 40e175 38961->38999 38964 40e5c4 CloseHandle 38962->38964 38965 40e5cc 38962->38965 38964->38965 38967 40b633 free 38965->38967 38966 40e573 38968 40e584 38966->38968 38969 40e57c CloseHandle 38966->38969 38970 40e5db 38967->38970 39042 40b1ab free free 38968->39042 38969->38968 38972 40b633 free 38970->38972 38973 40e5e3 38972->38973 38973->38950 38975 40e540 38975->38966 39019 40e2ab 38975->39019 39043 406214 38976->39043 38979 40e16b 38979->38961 38982 40afcf 2 API calls 38983 40e08d OpenProcess 38982->38983 38984 40e0a4 GetCurrentProcess DuplicateHandle 38983->38984 38988 40e152 38983->38988 38985 40e0d0 GetFileSize 38984->38985 38986 40e14a CloseHandle 38984->38986 39079 409a45 GetTempPathW 38985->39079 38986->38988 38987 40e160 38991 40b04b ??3@YAXPAX 38987->38991 38988->38987 38990 406214 22 API calls 38988->38990 38990->38987 38991->38979 38992 40e0ea 39082 4096dc CreateFileW 38992->39082 38994 40e0f1 CreateFileMappingW 38995 40e140 CloseHandle CloseHandle 38994->38995 38996 40e10b MapViewOfFile 38994->38996 38995->38986 38997 40e13b CloseHandle 38996->38997 38998 40e11f WriteFile UnmapViewOfFile 38996->38998 38997->38995 38998->38997 39000 40e18c 38999->39000 39083 406b90 39000->39083 39003 40e1a7 memset 39009 40e1e8 39003->39009 39004 40e299 39093 4069a3 39004->39093 39010 40e283 39009->39010 39011 40dd50 _wcsicmp 39009->39011 39017 40e244 _snwprintf 39009->39017 39100 406e8f 13 API calls 39009->39100 39101 40742e 8 API calls 39009->39101 39102 40aae3 wcslen wcslen _memicmp 39009->39102 39104 406b53 SetFilePointerEx ReadFile 39009->39104 39012 40e291 39010->39012 39013 40e288 free 39010->39013 39011->39009 39014 40aa04 free 39012->39014 39013->39012 39014->39004 39103 40a8d0 7 API calls 39017->39103 39020 40e2c2 39019->39020 39021 406b90 11 API calls 39020->39021 39022 40e2d3 39021->39022 39023 40e4a0 39022->39023 39028 40e489 39022->39028 39031 40dd50 _wcsicmp 39022->39031 39037 40e3e0 memcpy 39022->39037 39038 40e3fb memcpy 39022->39038 39039 40e3b3 wcschr 39022->39039 39040 40e416 memcpy 39022->39040 39041 40e431 memcpy 39022->39041 39105 406e8f 13 API calls 39022->39105 39106 40dd50 _wcsicmp 39022->39106 39108 40742e 8 API calls 39022->39108 39109 406b53 SetFilePointerEx ReadFile 39022->39109 39024 4069a3 2 API calls 39023->39024 39026 40e4ab 39024->39026 39026->38975 39029 40aa04 free 39028->39029 39030 40e491 39029->39030 39030->39023 39032 40e497 free 39030->39032 39031->39022 39032->39023 39034 40e376 memset 39107 40aa29 6 API calls 39034->39107 39037->39022 39038->39022 39039->39022 39040->39022 39041->39022 39042->38957 39044 406294 CloseHandle 39043->39044 39045 406224 39044->39045 39046 4096c3 CreateFileW 39045->39046 39047 40622d 39046->39047 39048 406281 GetLastError 39047->39048 39049 40a2ef ReadFile 39047->39049 39051 40625a 39048->39051 39050 406244 39049->39050 39050->39048 39052 40624b 39050->39052 39051->38979 39054 40dd85 memset 39051->39054 39052->39051 39053 406777 19 API calls 39052->39053 39053->39051 39055 409bca GetModuleFileNameW 39054->39055 39056 40ddbe CreateFileW 39055->39056 39059 40ddf1 39056->39059 39057 40afcf ??2@YAPAXI ??3@YAXPAX 39057->39059 39058 41352f 9 API calls 39058->39059 39059->39057 39059->39058 39060 40de0b NtQuerySystemInformation 39059->39060 39061 40de3b CloseHandle GetCurrentProcessId 39059->39061 39060->39059 39062 40de54 39061->39062 39063 413d4c 46 API calls 39062->39063 39071 40de88 39063->39071 39064 40e00c 39065 413d29 free FreeLibrary 39064->39065 39066 40e014 39065->39066 39066->38979 39066->38982 39067 40dea9 _wcsicmp 39068 40dee7 OpenProcess 39067->39068 39069 40debd _wcsicmp 39067->39069 39068->39071 39069->39068 39070 40ded0 _wcsicmp 39069->39070 39070->39068 39070->39071 39071->39064 39071->39067 39072 40dfef CloseHandle 39071->39072 39073 40df78 39071->39073 39074 40df23 GetCurrentProcess DuplicateHandle 39071->39074 39077 40df8f CloseHandle 39071->39077 39072->39071 39073->39072 39073->39077 39078 40dfae _wcsicmp 39073->39078 39074->39071 39075 40df4c memset 39074->39075 39076 41352f 9 API calls 39075->39076 39076->39071 39077->39073 39078->39071 39078->39073 39080 409a74 GetTempFileNameW 39079->39080 39081 409a66 GetWindowsDirectoryW 39079->39081 39080->38992 39081->39080 39082->38994 39084 406bd5 39083->39084 39085 406bad 39083->39085 39087 4066bf free malloc memcpy free free 39084->39087 39092 406c0f 39084->39092 39085->39084 39086 406bba _wcsicmp 39085->39086 39086->39084 39086->39085 39088 406be5 39087->39088 39089 40afcf ??2@YAPAXI ??3@YAXPAX 39088->39089 39088->39092 39090 406bff 39089->39090 39091 4068bf SetFilePointerEx memcpy ReadFile ??2@YAPAXI ??3@YAXPAX 39090->39091 39091->39092 39092->39003 39092->39004 39094 4069c4 ??3@YAXPAX 39093->39094 39095 4069af 39094->39095 39096 40b633 free 39095->39096 39097 4069ba 39096->39097 39098 40b04b ??3@YAXPAX 39097->39098 39099 4069c2 39098->39099 39099->38975 39100->39009 39101->39009 39102->39009 39103->39009 39104->39009 39105->39022 39106->39034 39107->39022 39108->39022 39109->39022 39114 40a980 39110->39114 39111 40a8bb 39111->38882 39115 40a8d0 7 API calls 39111->39115 39112 40a995 _wcsicmp 39112->39114 39113 40a99c wcscmp 39113->39114 39114->39111 39114->39112 39114->39113 39115->38882 39116->38886 39117->38890 39119 40aa23 RegEnumValueW 39118->39119 39119->38897 39119->38898 39120->38901 39121->38903 39123 405335 39122->39123 39124 40522a 39122->39124 39123->38477 39125 40b2cc 27 API calls 39124->39125 39126 405234 39125->39126 39127 40a804 8 API calls 39126->39127 39128 40523a 39127->39128 39167 40b273 39128->39167 39130 405248 _mbscpy _mbscat GetProcAddress 39131 40b273 27 API calls 39130->39131 39132 405279 39131->39132 39170 405211 GetProcAddress 39132->39170 39134 405282 39135 40b273 27 API calls 39134->39135 39136 40528f 39135->39136 39171 405211 GetProcAddress 39136->39171 39138 405298 39139 40b273 27 API calls 39138->39139 39140 4052a5 39139->39140 39172 405211 GetProcAddress 39140->39172 39142 4052ae 39143 40b273 27 API calls 39142->39143 39144 4052bb 39143->39144 39173 405211 GetProcAddress 39144->39173 39146 4052c4 39147 40b273 27 API calls 39146->39147 39148 4052d1 39147->39148 39174 405211 GetProcAddress 39148->39174 39150 4052da 39151 40b273 27 API calls 39150->39151 39152 4052e7 39151->39152 39175 405211 GetProcAddress 39152->39175 39154 4052f0 39155 40b273 27 API calls 39154->39155 39156 4052fd 39155->39156 39176 405211 GetProcAddress 39156->39176 39158 405306 39159 40b273 27 API calls 39158->39159 39160 405313 39159->39160 39177 405211 GetProcAddress 39160->39177 39162 40531c 39163 40b273 27 API calls 39162->39163 39164 405329 39163->39164 39178 405211 GetProcAddress 39164->39178 39166 405332 39166->39123 39168 40b58d 27 API calls 39167->39168 39169 40b18c 39168->39169 39169->39130 39170->39134 39171->39138 39172->39142 39173->39146 39174->39150 39175->39154 39176->39158 39177->39162 39178->39166 39180 405220 39 API calls 39179->39180 39181 405369 39180->39181 39181->38915 39181->38916 39182->38918 39183->38922 39184->38919 39185->38916 39187 40440c FreeLibrary 39186->39187 39188 40436d 39187->39188 39189 40a804 8 API calls 39188->39189 39190 404377 39189->39190 39191 404383 39190->39191 39192 404405 39190->39192 39193 40b273 27 API calls 39191->39193 39192->38487 39192->38488 39192->38489 39194 40438d GetProcAddress 39193->39194 39195 40b273 27 API calls 39194->39195 39196 4043a7 GetProcAddress 39195->39196 39197 40b273 27 API calls 39196->39197 39198 4043ba GetProcAddress 39197->39198 39199 40b273 27 API calls 39198->39199 39200 4043ce GetProcAddress 39199->39200 39201 40b273 27 API calls 39200->39201 39202 4043e2 GetProcAddress 39201->39202 39203 4043f1 39202->39203 39204 4043f7 39203->39204 39205 40440c FreeLibrary 39203->39205 39204->39192 39205->39192 39207 404413 FreeLibrary 39206->39207 39208 40441e 39206->39208 39207->39208 39208->38504 39209->38500 39211 40447e 39210->39211 39212 40442e 39210->39212 39213 404485 CryptUnprotectData 39211->39213 39214 40449c 39211->39214 39215 40b2cc 27 API calls 39212->39215 39213->39214 39214->38500 39216 404438 39215->39216 39217 40a804 8 API calls 39216->39217 39218 40443e 39217->39218 39219 404445 39218->39219 39220 404467 39218->39220 39221 40b273 27 API calls 39219->39221 39220->39211 39223 404475 FreeLibrary 39220->39223 39222 40444f GetProcAddress 39221->39222 39222->39220 39224 404460 39222->39224 39223->39211 39224->39220 39226 4135f6 39225->39226 39227 4135eb FreeLibrary 39225->39227 39226->38507 39227->39226 39229 4449c4 39228->39229 39230 444a52 39228->39230 39231 40b2cc 27 API calls 39229->39231 39230->38524 39230->38525 39232 4449cb 39231->39232 39233 40a804 8 API calls 39232->39233 39234 4449d1 39233->39234 39235 40b273 27 API calls 39234->39235 39236 4449dc GetProcAddress 39235->39236 39237 40b273 27 API calls 39236->39237 39238 4449f3 GetProcAddress 39237->39238 39239 40b273 27 API calls 39238->39239 39240 444a04 GetProcAddress 39239->39240 39241 40b273 27 API calls 39240->39241 39242 444a15 GetProcAddress 39241->39242 39243 40b273 27 API calls 39242->39243 39244 444a26 GetProcAddress 39243->39244 39245 40b273 27 API calls 39244->39245 39246 444a37 GetProcAddress 39245->39246 39247 40b273 27 API calls 39246->39247 39248 444a48 GetProcAddress 39247->39248 39248->39230 39249->38535 39250->38535 39251->38535 39252->38535 39253->38526 39255 403a29 39254->39255 39269 403bed memset memset 39255->39269 39257 403ae7 39282 40b1ab free free 39257->39282 39259 403a3f memset 39263 403a2f 39259->39263 39260 403aef 39260->38543 39261 40a8d0 7 API calls 39261->39263 39262 409d1f 6 API calls 39262->39263 39263->39257 39263->39259 39263->39261 39263->39262 39264 409b98 GetFileAttributesW 39263->39264 39264->39263 39266 40a051 GetFileTime CloseHandle 39265->39266 39267 4039ca CompareFileTime 39265->39267 39266->39267 39267->38543 39268->38542 39270 414c2e 17 API calls 39269->39270 39271 403c38 39270->39271 39272 409719 2 API calls 39271->39272 39273 403c3f wcscat 39272->39273 39274 414c2e 17 API calls 39273->39274 39275 403c61 39274->39275 39276 409719 2 API calls 39275->39276 39277 403c68 wcscat 39276->39277 39283 403af5 39277->39283 39280 403af5 20 API calls 39281 403c95 39280->39281 39281->39263 39282->39260 39284 403b02 39283->39284 39285 40ae18 9 API calls 39284->39285 39293 403b37 39285->39293 39286 403bdb 39287 40aebe FindClose 39286->39287 39288 403be6 39287->39288 39288->39280 39289 40ae18 9 API calls 39289->39293 39290 40ae51 9 API calls 39290->39293 39291 40add4 wcscmp wcscmp 39291->39293 39292 40aebe FindClose 39292->39293 39293->39286 39293->39289 39293->39290 39293->39291 39293->39292 39294 40a8d0 7 API calls 39293->39294 39294->39293 39296 409d1f 6 API calls 39295->39296 39297 404190 39296->39297 39310 409b98 GetFileAttributesW 39297->39310 39299 40419c 39300 4041a7 6 API calls 39299->39300 39301 40435c 39299->39301 39302 40424f 39300->39302 39301->38569 39302->39301 39304 40425e memset 39302->39304 39306 409d1f 6 API calls 39302->39306 39307 40a8ab 9 API calls 39302->39307 39311 414842 39302->39311 39304->39302 39305 404296 wcscpy 39304->39305 39305->39302 39306->39302 39308 4042b6 memset memset _snwprintf wcscpy 39307->39308 39308->39302 39309->38567 39310->39299 39314 41443e 39311->39314 39313 414866 39313->39302 39315 41444b 39314->39315 39316 414451 39315->39316 39317 4144a3 GetPrivateProfileStringW 39315->39317 39318 414491 39316->39318 39319 414455 wcschr 39316->39319 39317->39313 39321 414495 WritePrivateProfileStringW 39318->39321 39319->39318 39320 414463 _snwprintf 39319->39320 39320->39321 39321->39313 39322->38573 39324 40b2cc 27 API calls 39323->39324 39325 409615 39324->39325 39326 409d1f 6 API calls 39325->39326 39327 409625 39326->39327 39352 409b98 GetFileAttributesW 39327->39352 39329 409634 39330 409648 39329->39330 39353 4091b8 memset 39329->39353 39332 40b2cc 27 API calls 39330->39332 39335 408801 39330->39335 39333 40965d 39332->39333 39334 409d1f 6 API calls 39333->39334 39336 40966d 39334->39336 39335->38576 39335->38603 39405 409b98 GetFileAttributesW 39336->39405 39338 40967c 39338->39335 39339 409681 39338->39339 39406 409529 72 API calls 39339->39406 39341 409690 39341->39335 39342->38598 39343->38603 39344->38604 39352->39329 39407 40a6e6 WideCharToMultiByte 39353->39407 39355 409202 39408 444432 39355->39408 39358 40b273 27 API calls 39359 409236 39358->39359 39454 438552 39359->39454 39362 409383 39364 40b273 27 API calls 39362->39364 39365 409399 39364->39365 39368 438552 134 API calls 39365->39368 39386 4093a3 39368->39386 39372 4094ff 39483 443d90 39372->39483 39375 4251c4 137 API calls 39375->39386 39379 4093df 39482 424f26 123 API calls 39379->39482 39381 4253cf 17 API calls 39381->39386 39385 40951d 39385->39330 39386->39372 39386->39375 39386->39379 39386->39381 39389 4093e4 39386->39389 39480 4253af 17 API calls 39389->39480 39405->39338 39406->39341 39407->39355 39504 4438b5 39408->39504 39410 44444c 39411 409215 39410->39411 39518 415a6d 39410->39518 39411->39358 39411->39385 39413 4442e6 11 API calls 39415 44469e 39413->39415 39414 444486 39416 4444b9 memcpy 39414->39416 39453 4444a4 39414->39453 39415->39411 39418 443d90 111 API calls 39415->39418 39522 415258 39416->39522 39418->39411 39419 444524 39420 444541 39419->39420 39421 44452a 39419->39421 39525 444316 39420->39525 39422 416935 16 API calls 39421->39422 39422->39453 39425 444316 18 API calls 39426 444563 39425->39426 39427 444316 18 API calls 39426->39427 39428 44456f 39427->39428 39429 444316 18 API calls 39428->39429 39453->39413 39643 438460 39454->39643 39456 409240 39456->39362 39457 4251c4 39456->39457 39694 424f07 39457->39694 39459 4251e4 39460 4251f7 39459->39460 39461 4251e8 39459->39461 39702 4250f8 39460->39702 39701 4446ea 11 API calls 39461->39701 39482->39372 39505 4438d0 39504->39505 39515 4438c9 39504->39515 39592 415378 memcpy memcpy 39505->39592 39515->39410 39519 415a77 39518->39519 39520 415a8d 39519->39520 39521 415a7e memset 39519->39521 39520->39414 39521->39520 39523 4438b5 11 API calls 39522->39523 39524 41525d 39523->39524 39524->39419 39526 444328 39525->39526 39527 444423 39526->39527 39528 44434e 39526->39528 39593 4446ea 11 API calls 39527->39593 39529 432d4e 3 API calls 39528->39529 39531 44435a 39529->39531 39533 444375 39531->39533 39534 44438b 39531->39534 39532 432d4e 3 API calls 39535 4443ec 39532->39535 39536 416935 16 API calls 39533->39536 39534->39532 39537 444381 39535->39537 39538 416935 16 API calls 39535->39538 39536->39537 39537->39425 39538->39537 39593->39537 39655 41703f 39643->39655 39645 43847a 39646 43848a 39645->39646 39647 43847e 39645->39647 39662 438270 39646->39662 39692 4446ea 11 API calls 39647->39692 39652 4384bb 39653 438270 134 API calls 39652->39653 39654 438488 39653->39654 39654->39456 39656 417044 39655->39656 39657 41705c 39655->39657 39659 416760 11 API calls 39656->39659 39661 417055 39656->39661 39658 417075 39657->39658 39660 41707a 11 API calls 39657->39660 39658->39645 39659->39661 39660->39656 39661->39645 39663 415a91 memset 39662->39663 39664 43828d 39663->39664 39665 438297 39664->39665 39666 438341 39664->39666 39668 4382d6 39664->39668 39667 415c7d 16 API calls 39665->39667 39669 44358f 19 API calls 39666->39669 39670 438458 39667->39670 39671 4382fb 39668->39671 39672 4382db 39668->39672 39681 438318 39669->39681 39670->39654 39693 424f26 123 API calls 39670->39693 39674 415c23 memcpy 39671->39674 39673 416935 16 API calls 39672->39673 39675 4382e9 39673->39675 39676 438305 39674->39676 39677 415c7d 16 API calls 39675->39677 39679 44358f 19 API calls 39676->39679 39676->39681 39677->39665 39678 438373 39682 4300e8 memset memset memcpy 39678->39682 39685 438383 39678->39685 39679->39681 39680 43819e 115 API calls 39680->39678 39681->39678 39681->39680 39682->39685 39683 4383cd 39684 4383f5 39683->39684 39687 42453e 123 API calls 39683->39687 39688 438404 39684->39688 39689 43841c 39684->39689 39685->39683 39686 415c23 memcpy 39685->39686 39686->39683 39687->39684 39692->39654 39693->39652 39695 424f1f 39694->39695 39696 424f0c 39694->39696 39715 424eea 11 API calls 39695->39715 39714 416760 11 API calls 39696->39714 39699 424f18 39699->39459 39700 424f24 39700->39459 39714->39699 39715->39700 39793 413f4f 39766->39793 39769 413f37 K32GetModuleFileNameExW 39770 413f4a 39769->39770 39770->38633 39772 413969 wcscpy 39771->39772 39773 41396c wcschr 39771->39773 39783 413a3a 39772->39783 39773->39772 39775 41398e 39773->39775 39798 4097f7 wcslen wcslen _memicmp 39775->39798 39777 41399a 39778 4139a4 memset 39777->39778 39779 4139e6 39777->39779 39799 409dd5 GetWindowsDirectoryW wcscpy 39778->39799 39781 413a31 wcscpy 39779->39781 39782 4139ec memset 39779->39782 39781->39783 39800 409dd5 GetWindowsDirectoryW wcscpy 39782->39800 39783->38633 39784 4139c9 wcscpy wcscat 39784->39783 39786 413a11 memcpy wcscat 39786->39783 39788 413cb0 GetModuleHandleW 39787->39788 39789 413cda 39787->39789 39788->39789 39792 413cbf GetProcAddress 39788->39792 39790 413ce3 GetProcessTimes 39789->39790 39791 413cf6 39789->39791 39790->38638 39791->38638 39792->39789 39794 413f2f 39793->39794 39795 413f54 39793->39795 39794->39769 39794->39770 39796 40a804 8 API calls 39795->39796 39797 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 39796->39797 39797->39794 39798->39777 39799->39784 39800->39786 39801->38658 39802->38682 39804 409cf9 GetVersionExW 39803->39804 39805 409d0a 39803->39805 39804->39805 39805->38687 39805->38693 39806->38694 39807->38698 39808->38700 39809->38766 39811 40bba5 39810->39811 39855 40cc26 39811->39855 39814 40bd4b 39876 40cc0c 39814->39876 39819 40b2cc 27 API calls 39820 40bbef 39819->39820 39883 40ccf0 _wcsicmp 39820->39883 39822 40bbf5 39822->39814 39884 40ccb4 6 API calls 39822->39884 39824 40bc26 39825 40cf04 17 API calls 39824->39825 39826 40bc2e 39825->39826 39827 40bd43 39826->39827 39828 40b2cc 27 API calls 39826->39828 39829 40cc0c 4 API calls 39827->39829 39830 40bc40 39828->39830 39829->39814 39885 40ccf0 _wcsicmp 39830->39885 39832 40bc46 39832->39827 39833 40bc61 memset memset WideCharToMultiByte 39832->39833 39886 40103c strlen 39833->39886 39835 40bcc0 39836 40b273 27 API calls 39835->39836 39837 40bcd0 memcmp 39836->39837 39837->39827 39838 40bce2 39837->39838 39839 404423 38 API calls 39838->39839 39840 40bd10 39839->39840 39840->39827 39841 40bd3a LocalFree 39840->39841 39842 40bd1f memcpy 39840->39842 39841->39827 39842->39841 39843->38781 39844->38818 39845->38818 39846->38818 39847->38818 39848->38818 39849->38818 39850->38818 39851->38818 39852->38818 39853->38793 39854->38815 39887 4096c3 CreateFileW 39855->39887 39857 40cc34 39858 40cc3d GetFileSize 39857->39858 39866 40bbca 39857->39866 39859 40afcf 2 API calls 39858->39859 39860 40cc64 39859->39860 39888 40a2ef ReadFile 39860->39888 39862 40cc71 39889 40ab4a MultiByteToWideChar 39862->39889 39864 40cc95 CloseHandle 39865 40b04b ??3@YAXPAX 39864->39865 39865->39866 39866->39814 39867 40cf04 39866->39867 39868 40b633 free 39867->39868 39869 40cf14 39868->39869 39895 40b1ab free free 39869->39895 39871 40cf1b 39872 40cfef 39871->39872 39875 40bbdd 39871->39875 39896 40cd4b 39871->39896 39874 40cd4b 14 API calls 39872->39874 39874->39875 39875->39814 39875->39819 39877 40b633 free 39876->39877 39878 40cc15 39877->39878 39879 40aa04 free 39878->39879 39880 40cc1d 39879->39880 39942 40b1ab free free 39880->39942 39882 40b7d4 memset CreateFileW 39882->38773 39882->38774 39883->39822 39884->39824 39885->39832 39886->39835 39887->39857 39888->39862 39890 40ab93 39889->39890 39891 40ab6b 39889->39891 39890->39864 39892 40a9ce 4 API calls 39891->39892 39893 40ab74 39892->39893 39894 40ab7c MultiByteToWideChar 39893->39894 39894->39890 39895->39871 39897 40cd7b 39896->39897 39930 40aa29 6 API calls 39897->39930 39899 40cef5 39900 40aa04 free 39899->39900 39901 40cefd 39900->39901 39901->39871 39902 40cd89 39902->39899 39931 40aa29 6 API calls 39902->39931 39904 40ce1d 39932 40aa29 6 API calls 39904->39932 39906 40ce3e 39907 40ce6a 39906->39907 39933 40abb7 wcslen memmove 39906->39933 39908 40ce9f 39907->39908 39936 40abb7 wcslen memmove 39907->39936 39939 40a8d0 7 API calls 39908->39939 39912 40ce56 39934 40aa71 wcslen 39912->39934 39913 40ce8b 39937 40aa71 wcslen 39913->39937 39914 40ceb5 39940 40a8d0 7 API calls 39914->39940 39917 40ce5e 39935 40abb7 wcslen memmove 39917->39935 39919 40ce93 39938 40abb7 wcslen memmove 39919->39938 39921 40cecb 39941 40d00b malloc memcpy free free 39921->39941 39924 40cedd 39925 40aa04 free 39924->39925 39926 40cee5 39925->39926 39927 40aa04 free 39926->39927 39928 40ceed 39927->39928 39929 40aa04 free 39928->39929 39929->39899 39930->39902 39931->39904 39932->39906 39933->39912 39934->39917 39935->39907 39936->39913 39937->39919 39938->39908 39939->39914 39940->39921 39941->39924 39942->39882 39943->38833 39944->38841 40440 441819 40443 430737 40440->40443 40442 441825 40444 430756 40443->40444 40456 43076d 40443->40456 40445 430774 40444->40445 40446 43075f 40444->40446 40457 43034a 40445->40457 40468 4169a7 11 API calls 40446->40468 40449 4307ce 40451 430819 memset 40449->40451 40461 415b2c 40449->40461 40450 43077e 40450->40449 40454 4307fa 40450->40454 40450->40456 40451->40456 40453 4307e9 40453->40451 40453->40456 40469 4169a7 11 API calls 40454->40469 40456->40442 40458 43034e 40457->40458 40460 430359 40457->40460 40470 415c23 memcpy 40458->40470 40460->40450 40462 415b42 40461->40462 40465 415b46 40461->40465 40463 415b94 40462->40463 40462->40465 40466 415b5a 40462->40466 40464 4438b5 10 API calls 40463->40464 40464->40465 40465->40453 40466->40465 40467 415b79 memcpy 40466->40467 40467->40465 40468->40456 40469->40456 40470->40460 40471 41493c EnumResourceNamesW

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 CloseHandle GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 353 40de5a 351->353 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 355 40de5d-40de63 353->355 357 40de74-40de78 355->357 358 40de65-40de6c 355->358 357->352 357->355 358->357 360 40de6e-40de71 358->360 360->357 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 373 40dff8-40dffb 370->373 374 40defd-40df02 370->374 371->370 372 40ded0-40dee1 _wcsicmp 371->372 372->370 375 40dffd-40e006 372->375 373->363 373->375 376 40df08 374->376 377 40dfef-40dff2 CloseHandle 374->377 375->362 375->363 378 40df0b-40df10 376->378 377->373 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 382 40df23-40df4a GetCurrentProcess DuplicateHandle 379->382 380->378 381 40dfd1-40dfd3 380->381 381->377 382->380 383 40df4c-40df76 memset call 41352f 382->383 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->377
                                                                            APIs
                                                                            • memset.MSVCRT ref: 0040DDAD
                                                                              • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                                                            • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                              • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                              • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                            • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                            • CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                            • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                            • _wcsicmp.MSVCRT ref: 0040DEB2
                                                                            • _wcsicmp.MSVCRT ref: 0040DEC5
                                                                            • _wcsicmp.MSVCRT ref: 0040DED8
                                                                            • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                                                            • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                                                            • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                                                            • memset.MSVCRT ref: 0040DF5F
                                                                            • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                                                                            • _wcsicmp.MSVCRT ref: 0040DFB2
                                                                            • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$Handle$_wcsicmp$CloseProcess$CurrentFileModulememset$??2@CreateDuplicateInformationNameOpenQuerySystem
                                                                            • String ID: dllhost.exe$p+vw@Fvw@Bvw$taskhost.exe$taskhostex.exe
                                                                            • API String ID: 708747863-11196306
                                                                            • Opcode ID: 5cab624b8928eaf00a06d38b2ee3d6eb31f92f98f3d88623932f7a2009947366
                                                                            • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                                                            • Opcode Fuzzy Hash: 5cab624b8928eaf00a06d38b2ee3d6eb31f92f98f3d88623932f7a2009947366
                                                                            • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58
                                                                            APIs
                                                                              • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                              • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                                                              • Part of subcall function 00418680: free.MSVCRT ref: 004186C7
                                                                              • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                            • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                                                            • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                                                            • free.MSVCRT ref: 00418803
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: DiskFreeSpacefree$FullNamePathVersionmalloc
                                                                            • String ID:
                                                                            • API String ID: 1355100292-0
                                                                            • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                            • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                                                            • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                            • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                                                            APIs
                                                                            • CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                            • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                            • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: Library$Load$AddressCryptDataDirectoryFreeProcSystemUnprotectmemsetwcscatwcscpy
                                                                            • String ID:
                                                                            • API String ID: 767404330-0
                                                                            • Opcode ID: 91f5c8417cc05eb5371089ee99512099cd95d68580e827c1857cd6a30ed1daf0
                                                                            • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                                                            • Opcode Fuzzy Hash: 91f5c8417cc05eb5371089ee99512099cd95d68580e827c1857cd6a30ed1daf0
                                                                            • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                                                            APIs
                                                                            • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                                                            • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: FileFind$FirstNext
                                                                            • String ID:
                                                                            • API String ID: 1690352074-0
                                                                            • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                            • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                                                            • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                            • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                                                            APIs
                                                                            • memset.MSVCRT ref: 0041898C
                                                                            • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: InfoSystemmemset
                                                                            • String ID:
                                                                            • API String ID: 3558857096-0
                                                                            • Opcode ID: 1cb27ac447f4cf033b6cba199a5ddcb1fdd974c12d9e405e28a5f35c0eb83b67
                                                                            • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                                                            • Opcode Fuzzy Hash: 1cb27ac447f4cf033b6cba199a5ddcb1fdd974c12d9e405e28a5f35c0eb83b67
                                                                            • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 40 44558e-445594 call 444b06 4->40 41 44557e-44558c call 4136c0 call 41366b 4->41 19 4455e5 5->19 20 4455e8-4455f9 5->20 10 445800-445809 6->10 11 445856-44585f 10->11 12 44580b-44581e call 40a889 call 403e2d 10->12 15 445861-445874 call 40a889 call 403c9c 11->15 16 4458ac-4458b5 11->16 42 445823-445826 12->42 49 445879-44587c 15->49 21 44594f-445958 16->21 22 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 16->22 19->20 23 445672-445683 call 40a889 call 403fbe 20->23 24 4455fb-445601 20->24 35 4459f2-4459fa 21->35 36 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 21->36 135 44592d-445945 call 40b6ef 22->135 136 44594a 22->136 84 445685 23->84 85 4456b2-4456b5 call 40b1ab 23->85 29 445605-445607 24->29 30 445603 24->30 29->23 38 445609-44560d 29->38 30->29 44 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 35->44 45 445b29-445b32 35->45 153 4459d0-4459e8 call 40b6ef 36->153 154 4459ed 36->154 38->23 48 44560f-445641 call 4087b3 call 40a889 call 4454bf 38->48 40->3 41->40 51 44584c-445854 call 40b1ab 42->51 52 445828 42->52 182 445b08-445b15 call 40ae51 44->182 53 445c7c-445c85 45->53 54 445b38-445b96 memset * 3 45->54 150 445665-445670 call 40b1ab 48->150 151 445643-445663 call 40a9b5 call 4087b3 48->151 64 4458a2-4458aa call 40b1ab 49->64 65 44587e 49->65 51->11 67 44582e-445847 call 40a9b5 call 4087b3 52->67 61 445d1c-445d25 53->61 62 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 53->62 68 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 54->68 69 445b98-445ba0 54->69 73 445fae-445fb2 61->73 74 445d2b-445d3b 61->74 168 445cf5 62->168 169 445cfc-445d03 62->169 64->16 81 445884-44589d call 40a9b5 call 4087b3 65->81 138 445849 67->138 247 445c77 68->247 69->68 83 445ba2-445bcf call 4099c6 call 445403 call 445389 69->83 90 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 74->90 91 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 74->91 156 44589f 81->156 83->53 100 44568b-4456a4 call 40a9b5 call 4087b3 84->100 104 4456ba-4456c4 85->104 162 445d67-445d6c 90->162 163 445d71-445d83 call 445093 90->163 196 445e17 91->196 197 445e1e-445e25 91->197 158 4456a9-4456b0 100->158 118 4457f9 104->118 119 4456ca-4456d3 call 413cfa call 413d4c 104->119 118->6 172 4456d8-4456f7 call 40b2cc call 413fa6 119->172 135->136 136->21 138->51 150->104 151->150 153->154 154->35 156->64 158->85 158->100 174 445fa1-445fa9 call 40b6ef 162->174 163->73 168->169 179 445d05-445d13 169->179 180 445d17 169->180 206 4456fd-445796 memset * 4 call 409c70 * 3 172->206 207 4457ea-4457f7 call 413d29 172->207 174->73 179->180 180->61 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->45 201->182 219 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->219 242 445e62-445e69 202->242 243 445e5b 202->243 218 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->218 206->207 246 445798-4457ca call 40b2cc call 409d1f call 409b98 206->246 207->10 218->73 253 445f9b 218->253 219->182 242->203 248 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 242->248 243->242 246->207 265 4457cc-4457e5 call 4087b3 246->265 247->53 264 445f4d-445f5a call 40ae51 248->264 253->174 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->207 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->218 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                                                                            APIs
                                                                            • memset.MSVCRT ref: 004455C2
                                                                            • wcsrchr.MSVCRT ref: 004455DA
                                                                            • memset.MSVCRT ref: 0044570D
                                                                            • memset.MSVCRT ref: 00445725
                                                                              • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                                                              • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                                                              • Part of subcall function 0040BDB0: CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                              • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                                                              • Part of subcall function 0040BDB0: wcsncmp.MSVCRT ref: 0040BE38
                                                                              • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                                                              • Part of subcall function 0040BDB0: memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                              • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                            • memset.MSVCRT ref: 0044573D
                                                                            • memset.MSVCRT ref: 00445755
                                                                            • memset.MSVCRT ref: 004458CB
                                                                            • memset.MSVCRT ref: 004458E3
                                                                            • memset.MSVCRT ref: 0044596E
                                                                            • memset.MSVCRT ref: 00445A10
                                                                            • memset.MSVCRT ref: 00445A28
                                                                            • memset.MSVCRT ref: 00445AC6
                                                                              • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                              • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                              • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                              • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                                                              • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                              • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                            • memset.MSVCRT ref: 00445B52
                                                                            • memset.MSVCRT ref: 00445B6A
                                                                            • memset.MSVCRT ref: 00445C9B
                                                                            • memset.MSVCRT ref: 00445CB3
                                                                            • _wcsicmp.MSVCRT ref: 00445D56
                                                                            • memset.MSVCRT ref: 00445B82
                                                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                              • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                              • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                              • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                                                              • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                                                            • memset.MSVCRT ref: 00445986
                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateFolderHandlePathProcSizeSpecial_wcsicmp_wcslwrmemcpywcscatwcscpywcsncmp
                                                                            • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                                                            • API String ID: 1963886904-3798722523
                                                                            • Opcode ID: 4107367e6a52814d16d978fdb1f2ed27fa2de906a3c2bdd9af1925875ae5045e
                                                                            • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                                                            • Opcode Fuzzy Hash: 4107367e6a52814d16d978fdb1f2ed27fa2de906a3c2bdd9af1925875ae5045e
                                                                            • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                                                                            Control-flow Graph

                                                                            APIs
                                                                              • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll,00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044C3
                                                                              • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                              • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044E9
                                                                              • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                            • SetErrorMode.KERNELBASE(00008001,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 00412799
                                                                            • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004127B2
                                                                            • EnumResourceTypesW.KERNEL32(00000000,?,00000002), ref: 004127B9
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                                                                            • String ID: $/deleteregkey$/savelangfile
                                                                            • API String ID: 2744995895-28296030
                                                                            • Opcode ID: fcad638c039a134244896b453c320ca2d1027186d3b9ab8085e6916e84848b7d
                                                                            • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                                                            • Opcode Fuzzy Hash: fcad638c039a134244896b453c320ca2d1027186d3b9ab8085e6916e84848b7d
                                                                            • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • memset.MSVCRT ref: 0040B71C
                                                                              • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                                                              • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                                                            • wcsrchr.MSVCRT ref: 0040B738
                                                                            • memset.MSVCRT ref: 0040B756
                                                                            • memset.MSVCRT ref: 0040B7F5
                                                                            • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                            • CopyFileW.KERNEL32(00445FAE,?,00000000,?,?), ref: 0040B82D
                                                                            • CloseHandle.KERNELBASE(00000000,?,?), ref: 0040B838
                                                                            • memset.MSVCRT ref: 0040B851
                                                                            • memset.MSVCRT ref: 0040B8CA
                                                                            • memcmp.MSVCRT(?,v10,00000003), ref: 0040B9BF
                                                                              • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                              • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                              • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                            • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0040BAE5
                                                                            • memset.MSVCRT ref: 0040BB53
                                                                            • memcpy.MSVCRT(?,00000000,?,00000000,00000000,?), ref: 0040BB66
                                                                            • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: memset$File$Freewcsrchr$AddressCloseCopyCreateCryptDataDeleteHandleLibraryLocalProcUnprotectmemcmpmemcpywcscpy
                                                                            • String ID: chp$v10
                                                                            • API String ID: 1297422669-2783969131
                                                                            • Opcode ID: 544f7529f0c4d3a53e9c457f8d9cabf322a2e4b31897d0a2c4cc607292de5a12
                                                                            • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                                                            • Opcode Fuzzy Hash: 544f7529f0c4d3a53e9c457f8d9cabf322a2e4b31897d0a2c4cc607292de5a12
                                                                            • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 504 40e2ab-40e2ce call 40695d call 406b90 508 40e2d3-40e2d5 504->508 509 40e4a0-40e4af call 4069a3 508->509 510 40e2db-40e300 508->510 511 40e304-40e316 call 406e8f 510->511 516 40e476-40e483 call 406b53 511->516 517 40e31c-40e39b call 40dd50 * 7 memset call 40aa29 511->517 523 40e302 516->523 524 40e489-40e495 call 40aa04 516->524 541 40e3c9-40e3ce 517->541 542 40e39d-40e3ae call 40742e 517->542 523->511 524->509 529 40e497-40e49f free 524->529 529->509 544 40e3d0-40e3d6 541->544 545 40e3d9-40e3de 541->545 551 40e3b0 542->551 552 40e3b3-40e3c1 wcschr 542->552 544->545 547 40e3e0-40e3f1 memcpy 545->547 548 40e3f4-40e3f9 545->548 547->548 549 40e3fb-40e40c memcpy 548->549 550 40e40f-40e414 548->550 549->550 553 40e416-40e427 memcpy 550->553 554 40e42a-40e42f 550->554 551->552 552->541 555 40e3c3-40e3c6 552->555 553->554 556 40e431-40e442 memcpy 554->556 557 40e445-40e44a 554->557 555->541 556->557 558 40e44c-40e45b 557->558 559 40e45e-40e463 557->559 558->559 559->516 560 40e465-40e469 559->560 560->516 561 40e46b-40e473 560->561 561->516
                                                                            APIs
                                                                              • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                              • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                            • free.MSVCRT ref: 0040E49A
                                                                              • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                            • memset.MSVCRT ref: 0040E380
                                                                              • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                              • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,Function_0004E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                            • wcschr.MSVCRT ref: 0040E3B8
                                                                            • memcpy.MSVCRT(?,-00000121,00000008,Function_0004E518,00000000,00000000,771B2EE0), ref: 0040E3EC
                                                                            • memcpy.MSVCRT(?,-00000121,00000008,Function_0004E518,00000000,00000000,771B2EE0), ref: 0040E407
                                                                            • memcpy.MSVCRT(?,-00000220,00000008,Function_0004E518,00000000,00000000,771B2EE0), ref: 0040E422
                                                                            • memcpy.MSVCRT(?,-00000220,00000008,Function_0004E518,00000000,00000000,771B2EE0), ref: 0040E43D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: memcpy$_wcsicmpmemset$freewcschrwcslen
                                                                            • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                                                            • API String ID: 3849927982-2252543386
                                                                            • Opcode ID: 3e36793f9e080becf73b9dda80bc1391f7a6b1e793b4af3828a127e2c1810b15
                                                                            • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                                                            • Opcode Fuzzy Hash: 3e36793f9e080becf73b9dda80bc1391f7a6b1e793b4af3828a127e2c1810b15
                                                                            • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 562 4091b8-40921b memset call 40a6e6 call 444432 567 409520-409526 562->567 568 409221-40923b call 40b273 call 438552 562->568 572 409240-409248 568->572 573 409383-4093ab call 40b273 call 438552 572->573 574 40924e-409258 call 4251c4 572->574 586 4093b1 573->586 587 4094ff-40950b call 443d90 573->587 579 40937b-40937e call 424f26 574->579 580 40925e-409291 call 4253cf * 2 call 4253af * 2 574->580 579->573 580->579 610 409297-409299 580->610 590 4093d3-4093dd call 4251c4 586->590 587->567 596 40950d-409511 587->596 597 4093b3-4093cc call 4253cf * 2 590->597 598 4093df 590->598 596->567 600 409513-40951d call 408f2f 596->600 597->590 613 4093ce-4093d1 597->613 602 4094f7-4094fa call 424f26 598->602 600->567 602->587 610->579 612 40929f-4092a3 610->612 612->579 614 4092a9-4092ba 612->614 613->590 617 4093e4-4093fb call 4253af * 2 613->617 615 4092bc 614->615 616 4092be-4092e3 memcpy memcmp 614->616 615->616 618 409333-409345 memcmp 616->618 619 4092e5-4092ec 616->619 617->602 627 409401-409403 617->627 618->579 622 409347-40935f memcpy 618->622 619->579 621 4092f2-409331 memcpy * 2 619->621 624 409363-409378 memcpy 621->624 622->624 624->579 627->602 628 409409-40941b memcmp 627->628 628->602 629 409421-409433 memcmp 628->629 630 4094a4-4094b6 memcmp 629->630 631 409435-40943c 629->631 630->602 633 4094b8-4094ed memcpy * 2 630->633 631->602 632 409442-4094a2 memcpy * 3 631->632 634 4094f4 632->634 633->634 634->602
                                                                            APIs
                                                                            • memset.MSVCRT ref: 004091E2
                                                                              • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                            • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                            • memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                            • memcpy.MSVCRT(?,00000023,?), ref: 0040930C
                                                                            • memcpy.MSVCRT(?,?,00000010), ref: 00409325
                                                                            • memcmp.MSVCRT(00000000,0045A4E8,00000006), ref: 0040933B
                                                                            • memcpy.MSVCRT(?,00000015,?), ref: 00409357
                                                                            • memcpy.MSVCRT(?,?,00000010), ref: 00409370
                                                                            • memcmp.MSVCRT(00000000,004599B8,00000010), ref: 00409411
                                                                            • memcmp.MSVCRT(00000000,0045A500,00000006), ref: 00409429
                                                                            • memcpy.MSVCRT(?,00000023,?), ref: 00409462
                                                                            • memcpy.MSVCRT(?,?,00000010), ref: 0040947E
                                                                            • memcpy.MSVCRT(?,?,00000020), ref: 0040949A
                                                                            • memcmp.MSVCRT(00000000,0045A4F8,00000006), ref: 004094AC
                                                                            • memcpy.MSVCRT(?,00000015,?), ref: 004094D0
                                                                            • memcpy.MSVCRT(?,?,00000020), ref: 004094E8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                                                            • String ID:
                                                                            • API String ID: 3715365532-3916222277
                                                                            • Opcode ID: 1c524b1582e21d5cf33c38ae172dfd569e4d92201c70e2bcc6981c46efb40b80
                                                                            • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                                                            • Opcode Fuzzy Hash: 1c524b1582e21d5cf33c38ae172dfd569e4d92201c70e2bcc6981c46efb40b80
                                                                            • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 635 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 638 413f00-413f11 Process32NextW 635->638 639 413da5-413ded OpenProcess 638->639 640 413f17-413f24 CloseHandle 638->640 641 413eb0-413eb5 639->641 642 413df3-413e26 memset call 413f27 639->642 641->638 644 413eb7-413ebd 641->644 650 413e79-413e9d call 413959 call 413ca4 642->650 651 413e28-413e35 642->651 645 413ec8-413eda call 4099f4 644->645 646 413ebf-413ec6 free 644->646 648 413edb-413ee2 645->648 646->648 655 413ee4 648->655 656 413ee7-413efe 648->656 662 413ea2-413eae CloseHandle 650->662 653 413e61-413e68 651->653 654 413e37-413e44 GetModuleHandleW 651->654 653->650 659 413e6a-413e76 653->659 654->653 658 413e46-413e5c GetProcAddress 654->658 655->656 656->638 658->653 659->650 662->641
                                                                            APIs
                                                                              • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,?), ref: 00413D6A
                                                                            • memset.MSVCRT ref: 00413D7F
                                                                            • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                                                            • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                                                            • memset.MSVCRT ref: 00413E07
                                                                            • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                                                            • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                                                                            • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                                                                            • free.MSVCRT ref: 00413EC1
                                                                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                                                            • CloseHandle.KERNELBASE(00000000,00000000,0000022C), ref: 00413F1A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: Handle$CloseProcess32freememset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                                                                            • String ID: QueryFullProcessImageNameW$kernel32.dll
                                                                            • API String ID: 1344430650-1740548384
                                                                            • Opcode ID: 7edb3ed668d67efb41ddc3a99b3dcc2d3fa5e99a9f713289acc2c2ca3bb66fb8
                                                                            • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                                                            • Opcode Fuzzy Hash: 7edb3ed668d67efb41ddc3a99b3dcc2d3fa5e99a9f713289acc2c2ca3bb66fb8
                                                                            • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9

                                                                            Control-flow Graph

                                                                            APIs
                                                                              • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                                                              • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                              • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                              • Part of subcall function 0040DD85: CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                              • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                              • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                                                              • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                            • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                            • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                            • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                            • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                              • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                              • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                              • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                              • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                                                                            • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                            • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                            • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                            • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                            • CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                            • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                                                            • CloseHandle.KERNEL32(?), ref: 0040E148
                                                                            • CloseHandle.KERNEL32(?), ref: 0040E14D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: File$Handle$Close$CreateProcess$CurrentTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                                                            • String ID: bhv
                                                                            • API String ID: 4234240956-2689659898
                                                                            • Opcode ID: d6173e2fc1e4a9acd8e6e5097b502ef7bad012bb9f4f5ce7a241332e90e3d993
                                                                            • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                                                            • Opcode Fuzzy Hash: d6173e2fc1e4a9acd8e6e5097b502ef7bad012bb9f4f5ce7a241332e90e3d993
                                                                            • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 691 413f4f-413f52 692 413fa5 691->692 693 413f54-413f5a call 40a804 691->693 695 413f5f-413fa4 GetProcAddress * 5 693->695 695->692
                                                                            APIs
                                                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                            • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                            • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                            • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                            • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                            • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                            • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                            • API String ID: 2941347001-70141382
                                                                            • Opcode ID: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                                            • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                                                                            • Opcode Fuzzy Hash: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                                            • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • memset.MSVCRT ref: 0040C298
                                                                              • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                              • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                                                              • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                                                              • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                            • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                            • wcschr.MSVCRT ref: 0040C324
                                                                            • wcschr.MSVCRT ref: 0040C344
                                                                            • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                            • GetLastError.KERNEL32 ref: 0040C373
                                                                            • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                                                            • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstFolderLastPathSpecial
                                                                            • String ID: visited:
                                                                            • API String ID: 2470578098-1702587658
                                                                            • Opcode ID: 93c9a51482be428e2f8f42027b6bca19130ab09787b58ace62cc7f2a9cf54466
                                                                            • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                                                            • Opcode Fuzzy Hash: 93c9a51482be428e2f8f42027b6bca19130ab09787b58ace62cc7f2a9cf54466
                                                                            • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 721 40e175-40e1a1 call 40695d call 406b90 726 40e1a7-40e1e5 memset 721->726 727 40e299-40e2a8 call 4069a3 721->727 729 40e1e8-40e1fa call 406e8f 726->729 733 40e270-40e27d call 406b53 729->733 734 40e1fc-40e219 call 40dd50 * 2 729->734 733->729 739 40e283-40e286 733->739 734->733 745 40e21b-40e21d 734->745 742 40e291-40e294 call 40aa04 739->742 743 40e288-40e290 free 739->743 742->727 743->742 745->733 746 40e21f-40e235 call 40742e 745->746 746->733 749 40e237-40e242 call 40aae3 746->749 749->733 752 40e244-40e26b _snwprintf call 40a8d0 749->752 752->733
                                                                            APIs
                                                                              • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                            • memset.MSVCRT ref: 0040E1BD
                                                                              • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                            • free.MSVCRT ref: 0040E28B
                                                                              • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                              • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                                                              • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                                                            • _snwprintf.MSVCRT ref: 0040E257
                                                                              • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                              • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                              • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                              • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: free$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                                                            • String ID: $ContainerId$Container_%I64d$Containers$Name
                                                                            • API String ID: 2804212203-2982631422
                                                                            • Opcode ID: a8b50b7bcc3e8c665b2e5c478097124d3492c25552be42f1d5eb6a41abf251f1
                                                                            • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                                                            • Opcode Fuzzy Hash: a8b50b7bcc3e8c665b2e5c478097124d3492c25552be42f1d5eb6a41abf251f1
                                                                            • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 754 40b58d-40b59e 755 40b5a4-40b5c0 GetModuleHandleW FindResourceW 754->755 756 40b62e-40b632 754->756 757 40b5c2-40b5ce LoadResource 755->757 758 40b5e7 755->758 757->758 759 40b5d0-40b5e5 SizeofResource LockResource 757->759 760 40b5e9-40b5eb 758->760 759->760 760->756 761 40b5ed-40b5ef 760->761 761->756 762 40b5f1-40b629 call 40afcf memcpy call 40b4d3 call 40b3c1 call 40b04b 761->762 762->756
                                                                            APIs
                                                                            • GetModuleHandleW.KERNEL32(00000000,?, AE,?,?,00411B78,?,General,?,00000000,00000001), ref: 0040B5A5
                                                                            • FindResourceW.KERNELBASE(00000000,00000032,BIN), ref: 0040B5B6
                                                                            • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                                                            • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                                                            • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                                                            • memcpy.MSVCRT(00000000,00000000,00000000), ref: 0040B60D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                                                            • String ID: AE$BIN
                                                                            • API String ID: 1668488027-3931574542
                                                                            • Opcode ID: 34e809506899ed03cb1dc36614dfe32cef5e62f1a3b34244b0efced66f6d4593
                                                                            • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                                                            • Opcode Fuzzy Hash: 34e809506899ed03cb1dc36614dfe32cef5e62f1a3b34244b0efced66f6d4593
                                                                            • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED

                                                                            Control-flow Graph

                                                                            APIs
                                                                              • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                              • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                              • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                            • memset.MSVCRT ref: 0040BC75
                                                                            • memset.MSVCRT ref: 0040BC8C
                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,Function_0004E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                                                            • memcmp.MSVCRT(?,00000000,00000005,?,?,?,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE), ref: 0040BCD6
                                                                            • memcpy.MSVCRT(00000024,?,00000020,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD2B
                                                                            • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: memset$ByteCharCloseFileFreeHandleLocalMultiSizeWide_wcsicmpmemcmpmemcpy
                                                                            • String ID:
                                                                            • API String ID: 115830560-3916222277
                                                                            • Opcode ID: 4ebf604db45489440b0c8485e844b7deffc41ff7e568ae10611abfa3d316197e
                                                                            • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                                                            • Opcode Fuzzy Hash: 4ebf604db45489440b0c8485e844b7deffc41ff7e568ae10611abfa3d316197e
                                                                            • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 822 41837f-4183bf 823 4183c1-4183cc call 418197 822->823 824 4183dc-4183ec call 418160 822->824 829 4183d2-4183d8 823->829 830 418517-41851d 823->830 831 4183f6-41840b 824->831 832 4183ee-4183f1 824->832 829->824 833 418417-418423 831->833 834 41840d-418415 831->834 832->830 835 418427-418442 call 41739b 833->835 834->835 838 418444-41845d CreateFileW 835->838 839 41845f-418475 CreateFileA 835->839 840 418477-41847c 838->840 839->840 841 4184c2-4184c7 840->841 842 41847e-418495 GetLastError free 840->842 845 4184d5-418501 memset call 418758 841->845 846 4184c9-4184d3 841->846 843 4184b5-4184c0 call 444706 842->843 844 418497-4184b3 call 41837f 842->844 843->830 844->830 850 418506-418515 free 845->850 846->845 850->830
                                                                            APIs
                                                                            • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                                                            • CreateFileA.KERNEL32(?,-7FBE829D,00000003,00000000,|A,00417CE3,00000000), ref: 0041846F
                                                                            • GetLastError.KERNEL32 ref: 0041847E
                                                                            • free.MSVCRT ref: 0041848B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: CreateFile$ErrorLastfree
                                                                            • String ID: |A
                                                                            • API String ID: 77810686-1717621600
                                                                            • Opcode ID: b9220c8ee9235e77546fc7e578fe859ac5c7910c95b4d012992e052ab282d142
                                                                            • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                                                            • Opcode Fuzzy Hash: b9220c8ee9235e77546fc7e578fe859ac5c7910c95b4d012992e052ab282d142
                                                                            • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • memset.MSVCRT ref: 0041249C
                                                                            • ??2@YAPAXI@Z.MSVCRT(00002A88), ref: 004124D2
                                                                            • ??2@YAPAXI@Z.MSVCRT(00000350), ref: 00412510
                                                                            • GetModuleHandleW.KERNEL32(00000000,0000000E), ref: 00412582
                                                                            • LoadIconW.USER32(00000000,00000065), ref: 0041258B
                                                                            • wcscpy.MSVCRT ref: 004125A0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                                                            • String ID: r!A
                                                                            • API String ID: 2791114272-628097481
                                                                            • Opcode ID: c924fcd7ecfcbdf661535418ab9e4f477d4ea067639620652b406838daccced0
                                                                            • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                                                            • Opcode Fuzzy Hash: c924fcd7ecfcbdf661535418ab9e4f477d4ea067639620652b406838daccced0
                                                                            • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49
                                                                            APIs
                                                                              • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                              • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                              • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                              • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                                                              • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                              • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                                                              • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                                                              • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                              • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                                                              • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                                                              • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                              • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                                                              • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                                                              • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                            • _wcslwr.MSVCRT ref: 0040C817
                                                                              • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                                                              • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                                                            • wcslen.MSVCRT ref: 0040C82C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: memset$free$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                                                            • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                                                            • API String ID: 2936932814-4196376884
                                                                            • Opcode ID: b881829d82f0d8b9654aa99a04529af2f3c2152f6b010e5444e3d03ead400705
                                                                            • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                                                            • Opcode Fuzzy Hash: b881829d82f0d8b9654aa99a04529af2f3c2152f6b010e5444e3d03ead400705
                                                                            • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D
                                                                            APIs
                                                                            • memset.MSVCRT ref: 0040A824
                                                                            • GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                            • wcscpy.MSVCRT ref: 0040A854
                                                                            • wcscat.MSVCRT ref: 0040A86A
                                                                            • LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                            • LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                            • String ID: C:\Windows\system32
                                                                            • API String ID: 669240632-2896066436
                                                                            • Opcode ID: 808217d469f29374b6c53add07773bde8ba425e7a3f83fd710eb9a2b8acfca27
                                                                            • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                                                            • Opcode Fuzzy Hash: 808217d469f29374b6c53add07773bde8ba425e7a3f83fd710eb9a2b8acfca27
                                                                            • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                                                            APIs
                                                                              • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                              • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                              • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                              • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                              • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                            • CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                            • wcslen.MSVCRT ref: 0040BE06
                                                                            • wcsncmp.MSVCRT ref: 0040BE38
                                                                            • memset.MSVCRT ref: 0040BE91
                                                                            • memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                            • _wcsnicmp.MSVCRT ref: 0040BEFC
                                                                            • wcschr.MSVCRT ref: 0040BF24
                                                                            • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$CredEnumerateFreeLocal_wcsnicmpmemcpymemsetwcschrwcslenwcsncmp
                                                                            • String ID:
                                                                            • API String ID: 697348961-0
                                                                            • Opcode ID: 33cbc3fbfef4114ffc04ab79ab4e472c1ca1484598d0cfc67a802b423a316e07
                                                                            • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                                                                            • Opcode Fuzzy Hash: 33cbc3fbfef4114ffc04ab79ab4e472c1ca1484598d0cfc67a802b423a316e07
                                                                            • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                                                                            APIs
                                                                            • memset.MSVCRT ref: 00403CBF
                                                                            • memset.MSVCRT ref: 00403CD4
                                                                            • memset.MSVCRT ref: 00403CE9
                                                                            • memset.MSVCRT ref: 00403CFE
                                                                            • memset.MSVCRT ref: 00403D13
                                                                              • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                              • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                              • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                              • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                              • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                            • memset.MSVCRT ref: 00403DDA
                                                                              • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                              • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                            • String ID: Waterfox$Waterfox\Profiles
                                                                            • API String ID: 4039892925-11920434
                                                                            • Opcode ID: 74213e66932f07ea3ad059af1798c87c438cc92db4e0e7cdb609a7dadd567ada
                                                                            • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                                                            • Opcode Fuzzy Hash: 74213e66932f07ea3ad059af1798c87c438cc92db4e0e7cdb609a7dadd567ada
                                                                            • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                                                                            APIs
                                                                            • memset.MSVCRT ref: 00403E50
                                                                            • memset.MSVCRT ref: 00403E65
                                                                            • memset.MSVCRT ref: 00403E7A
                                                                            • memset.MSVCRT ref: 00403E8F
                                                                            • memset.MSVCRT ref: 00403EA4
                                                                              • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                              • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                              • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                              • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                              • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                            • memset.MSVCRT ref: 00403F6B
                                                                              • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                              • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                            • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                                                            • API String ID: 4039892925-2068335096
                                                                            • Opcode ID: fb8d06a7ed3fa35f71d99b938417e45633d605fe1ac21657eef3450a4ac41d2d
                                                                            • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                                                            • Opcode Fuzzy Hash: fb8d06a7ed3fa35f71d99b938417e45633d605fe1ac21657eef3450a4ac41d2d
                                                                            • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                                                            APIs
                                                                            • memset.MSVCRT ref: 00403FE1
                                                                            • memset.MSVCRT ref: 00403FF6
                                                                            • memset.MSVCRT ref: 0040400B
                                                                            • memset.MSVCRT ref: 00404020
                                                                            • memset.MSVCRT ref: 00404035
                                                                              • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                              • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                              • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                              • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                              • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                            • memset.MSVCRT ref: 004040FC
                                                                              • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                              • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                            • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                                                            • API String ID: 4039892925-3369679110
                                                                            • Opcode ID: a800c2c864e82bb525ebc7d4b700ce70e1897f56eef446e490fc18a40a012dd3
                                                                            • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                                                            • Opcode Fuzzy Hash: a800c2c864e82bb525ebc7d4b700ce70e1897f56eef446e490fc18a40a012dd3
                                                                            • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                                                            APIs
                                                                            • memcpy.MSVCRT(00000048,00451D40,0000002C,000003FF,00445FAE,?,00000000,?,0040B879), ref: 004444E3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: memcpy
                                                                            • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                                                            • API String ID: 3510742995-2641926074
                                                                            • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                            • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                                                            • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                            • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                                                            APIs
                                                                              • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                              • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                                                              • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                                                            • memset.MSVCRT ref: 004033B7
                                                                            • memcpy.MSVCRT(?,00000000,0000121C), ref: 004033D0
                                                                            • wcscmp.MSVCRT ref: 004033FC
                                                                            • _wcsicmp.MSVCRT ref: 00403439
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: memset$_wcsicmpfreememcpywcscmpwcsrchr
                                                                            • String ID: $0.@
                                                                            • API String ID: 2758756878-1896041820
                                                                            • Opcode ID: 90c1bd1f00aab923b8f25d437f952d518439630af4329cefc1ee53129d619d56
                                                                            • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                                                            • Opcode Fuzzy Hash: 90c1bd1f00aab923b8f25d437f952d518439630af4329cefc1ee53129d619d56
                                                                            • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                                                            APIs
                                                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                            • String ID:
                                                                            • API String ID: 2941347001-0
                                                                            • Opcode ID: 80e482451f5ca37e8404f50e4d067f365766b265f7642500ec0655012d68ebd6
                                                                            • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                                                                            • Opcode Fuzzy Hash: 80e482451f5ca37e8404f50e4d067f365766b265f7642500ec0655012d68ebd6
                                                                            • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                                                                            APIs
                                                                            • memset.MSVCRT ref: 00403C09
                                                                            • memset.MSVCRT ref: 00403C1E
                                                                              • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                              • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                                                              • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                                                            • wcscat.MSVCRT ref: 00403C47
                                                                              • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                              • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                              • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                            • wcscat.MSVCRT ref: 00403C70
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: memsetwcscat$CloseFolderPathSpecialwcscpywcslen
                                                                            • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                                                            • API String ID: 1534475566-1174173950
                                                                            • Opcode ID: 8452d1ff202b3ecdc32f03c4689b339ff6508c8f38893fabe83067ed25a4ac21
                                                                            • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                                                            • Opcode Fuzzy Hash: 8452d1ff202b3ecdc32f03c4689b339ff6508c8f38893fabe83067ed25a4ac21
                                                                            • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                                                            APIs
                                                                              • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                            • SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                            • memset.MSVCRT ref: 00414C87
                                                                            • RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                            • wcscpy.MSVCRT ref: 00414CFC
                                                                              • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                                                            Strings
                                                                            • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: AddressCloseFolderPathProcSpecialVersionmemsetwcscpy
                                                                            • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                            • API String ID: 71295984-2036018995
                                                                            • Opcode ID: f400cfab40eb781a7377af97b809c3f02e1ff83a00fe342fd0a4f0569afe9d8a
                                                                            • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                                                            • Opcode Fuzzy Hash: f400cfab40eb781a7377af97b809c3f02e1ff83a00fe342fd0a4f0569afe9d8a
                                                                            • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                                                            APIs
                                                                            • wcschr.MSVCRT ref: 00414458
                                                                            • _snwprintf.MSVCRT ref: 0041447D
                                                                            • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                                                            • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: PrivateProfileString$Write_snwprintfwcschr
                                                                            • String ID: "%s"
                                                                            • API String ID: 1343145685-3297466227
                                                                            • Opcode ID: aabbe202c5f79078aea71dac5ab2605718744c8b92afc7520f4e067a7367162e
                                                                            • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                                                            • Opcode Fuzzy Hash: aabbe202c5f79078aea71dac5ab2605718744c8b92afc7520f4e067a7367162e
                                                                            • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                                                            APIs
                                                                            • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                                                            • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                                                                            • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: AddressHandleModuleProcProcessTimes
                                                                            • String ID: GetProcessTimes$kernel32.dll
                                                                            • API String ID: 1714573020-3385500049
                                                                            • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                            • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                                                            • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                            • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                                                            APIs
                                                                            • memset.MSVCRT ref: 004087D6
                                                                              • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                              • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                                                            • memset.MSVCRT ref: 00408828
                                                                            • memset.MSVCRT ref: 00408840
                                                                            • memset.MSVCRT ref: 00408858
                                                                            • memset.MSVCRT ref: 00408870
                                                                            • memset.MSVCRT ref: 00408888
                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                                                            • String ID:
                                                                            • API String ID: 2911713577-0
                                                                            • Opcode ID: 6684bba834465d20886231ffe2d62564197a18c1a2325da43f028315e65dbcab
                                                                            • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                                                            • Opcode Fuzzy Hash: 6684bba834465d20886231ffe2d62564197a18c1a2325da43f028315e65dbcab
                                                                            • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                                                            APIs
                                                                            • memcmp.MSVCRT(?,?,00000004,?,00000065,004381DF,00000065,00000000,00000007,?,00000000), ref: 0041F202
                                                                            • memcmp.MSVCRT(?,SQLite format 3,00000010,?,00000065,004381DF,00000065,00000000), ref: 0041F22D
                                                                            • memcmp.MSVCRT(?,@ ,00000003,?,?,00000065,004381DF,00000065,00000000), ref: 0041F299
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: memcmp
                                                                            • String ID: @ $SQLite format 3
                                                                            • API String ID: 1475443563-3708268960
                                                                            • Opcode ID: bc797f5c287fbec082bfe36368e8bdb92b626008a1b8340b8f00afaa449410d4
                                                                            • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                                                            • Opcode Fuzzy Hash: bc797f5c287fbec082bfe36368e8bdb92b626008a1b8340b8f00afaa449410d4
                                                                            • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: _wcsicmpqsort
                                                                            • String ID: /nosort$/sort
                                                                            • API String ID: 1579243037-1578091866
                                                                            • Opcode ID: a0f12cb90dd745c164ef67684cb79943b88980d13b6e843c418957b63f9314a7
                                                                            • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                                                            • Opcode Fuzzy Hash: a0f12cb90dd745c164ef67684cb79943b88980d13b6e843c418957b63f9314a7
                                                                            • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                                                            APIs
                                                                            • memset.MSVCRT ref: 0040E60F
                                                                            • memset.MSVCRT ref: 0040E629
                                                                              • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                            Strings
                                                                            • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                                                            • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: memsetwcslen$AttributesFileFolderPathSpecialwcscatwcscpy
                                                                            • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                                                            • API String ID: 2887208581-2114579845
                                                                            • Opcode ID: 45b77cc57d7adabb6b76daf53bfb3be083a41c4971f5e6ab387fbe8a56a2d209
                                                                            • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                                                            • Opcode Fuzzy Hash: 45b77cc57d7adabb6b76daf53bfb3be083a41c4971f5e6ab387fbe8a56a2d209
                                                                            • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                                                            APIs
                                                                            • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                                                                            • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                                                            • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                                                            • LockResource.KERNEL32(00000000), ref: 004148EF
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: Resource$FindLoadLockSizeof
                                                                            • String ID:
                                                                            • API String ID: 3473537107-0
                                                                            • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                            • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                                                            • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                            • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                                                            APIs
                                                                            • ??3@YAXPAX@Z.MSVCRT(02140048), ref: 0044DF01
                                                                            • ??3@YAXPAX@Z.MSVCRT(009972C0), ref: 0044DF11
                                                                            • ??3@YAXPAX@Z.MSVCRT(00997AD0), ref: 0044DF21
                                                                            • ??3@YAXPAX@Z.MSVCRT(009976C8), ref: 0044DF31
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: ??3@
                                                                            • String ID:
                                                                            • API String ID: 613200358-0
                                                                            • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                            • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                                                                            • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                            • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                                                                            APIs
                                                                            Strings
                                                                            • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: memset
                                                                            • String ID: only a single result allowed for a SELECT that is part of an expression
                                                                            • API String ID: 2221118986-1725073988
                                                                            • Opcode ID: d115b1de85cb0c2c74241db9f2e26d4ca9f76d3b3ab36ed3aa85b1754c3cbe0d
                                                                            • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                                                            • Opcode Fuzzy Hash: d115b1de85cb0c2c74241db9f2e26d4ca9f76d3b3ab36ed3aa85b1754c3cbe0d
                                                                            • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                                                            APIs
                                                                            • ??3@YAXPAX@Z.MSVCRT(?,00000000,00412966,/deleteregkey,/savelangfile,?,?,?,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004125C3
                                                                            • DeleteObject.GDI32(00000000), ref: 004125E7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: ??3@DeleteObject
                                                                            • String ID: r!A
                                                                            • API String ID: 1103273653-628097481
                                                                            • Opcode ID: 35011d0761a793af9b86058f165b74ada9e8dfd6de6a99c5cda2ffee1e56a26e
                                                                            • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                                                            • Opcode Fuzzy Hash: 35011d0761a793af9b86058f165b74ada9e8dfd6de6a99c5cda2ffee1e56a26e
                                                                            • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                                                            APIs
                                                                            • ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0CC
                                                                            • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0EA
                                                                            • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D108
                                                                            • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D126
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: ??2@
                                                                            • String ID:
                                                                            • API String ID: 1033339047-0
                                                                            • Opcode ID: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                                            • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                                                            • Opcode Fuzzy Hash: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                                            • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                                                                            APIs
                                                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                            • memcmp.MSVCRT(?,0044EC68,00000010,?,00000000,?), ref: 00444BA5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$memcmp
                                                                            • String ID: $$8
                                                                            • API String ID: 2808797137-435121686
                                                                            • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                            • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                                                            • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                            • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                                                            Strings
                                                                            • duplicate column name: %s, xrefs: 004307FE
                                                                            • too many columns on %s, xrefs: 00430763
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: duplicate column name: %s$too many columns on %s
                                                                            • API String ID: 0-1445880494
                                                                            • Opcode ID: 93b9582cf047c94b57d064edc5564507e5ded9912264045a732c21487ec891bf
                                                                            • Instruction ID: 332525b9e829d337f3b342900587a6bcab00951879d739311f42b30c77ca79e1
                                                                            • Opcode Fuzzy Hash: 93b9582cf047c94b57d064edc5564507e5ded9912264045a732c21487ec891bf
                                                                            • Instruction Fuzzy Hash: 5E314735500705AFCB109F55C891ABEB7B5EF88318F24815BE8969B342C738F841CB99
                                                                            APIs
                                                                              • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                              • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                              • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                              • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                              • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                              • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                              • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                              • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                              • Part of subcall function 0040E01E: CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                            • CloseHandle.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                                                                              • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                                                              • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                                                              • Part of subcall function 0040E2AB: memcpy.MSVCRT(?,-00000121,00000008,Function_0004E518,00000000,00000000,771B2EE0), ref: 0040E3EC
                                                                            • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                                                            • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                                                                              • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                                                              • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                                                              • Part of subcall function 0040E175: free.MSVCRT ref: 0040E28B
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: File$Handle$Close$ProcessViewmemset$CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintffreememcpywcschr
                                                                            • String ID:
                                                                            • API String ID: 1979745280-0
                                                                            • Opcode ID: db5b060151050967cb8a3560fbfd23956168ef1b290a982d56d7add8c3b4651d
                                                                            • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                                                            • Opcode Fuzzy Hash: db5b060151050967cb8a3560fbfd23956168ef1b290a982d56d7add8c3b4651d
                                                                            • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                                                            APIs
                                                                              • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                                                              • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                                                              • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                                                              • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                                                            • memset.MSVCRT ref: 00403A55
                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                              • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                              • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                              • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                              • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: memsetwcscatwcslen$free$AttributesFilememcpywcscpy
                                                                            • String ID: history.dat$places.sqlite
                                                                            • API String ID: 2641622041-467022611
                                                                            • Opcode ID: 5bee45cdb6d082daa32fce0b5ea4b1357e7f956e37a37acc92fd9a7c9172319e
                                                                            • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                                                            • Opcode Fuzzy Hash: 5bee45cdb6d082daa32fce0b5ea4b1357e7f956e37a37acc92fd9a7c9172319e
                                                                            • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                                                            APIs
                                                                              • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                              • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                                                              • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                                                            • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                                                                            • GetLastError.KERNEL32 ref: 00417627
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$File$PointerRead
                                                                            • String ID:
                                                                            • API String ID: 839530781-0
                                                                            • Opcode ID: 43cd8d8e6b63bda72f55cb56ee55d1ec8e5478229177a04f989a23650c495d71
                                                                            • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                                                            • Opcode Fuzzy Hash: 43cd8d8e6b63bda72f55cb56ee55d1ec8e5478229177a04f989a23650c495d71
                                                                            • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: FileFindFirst
                                                                            • String ID: *.*$index.dat
                                                                            • API String ID: 1974802433-2863569691
                                                                            • Opcode ID: 357f5a483d779ef34e4c4d87daa9b3f5529f5b59003a03b6604f1343cb38d30a
                                                                            • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                                                            • Opcode Fuzzy Hash: 357f5a483d779ef34e4c4d87daa9b3f5529f5b59003a03b6604f1343cb38d30a
                                                                            • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                                                            APIs
                                                                            • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                            • GetLastError.KERNEL32 ref: 004175A2
                                                                            • GetLastError.KERNEL32 ref: 004175A8
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$FilePointer
                                                                            • String ID:
                                                                            • API String ID: 1156039329-0
                                                                            • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                            • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                                                            • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                            • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                                                            APIs
                                                                            • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                            • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                            • CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: File$CloseCreateHandleTime
                                                                            • String ID:
                                                                            • API String ID: 3397143404-0
                                                                            • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                            • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                                                            • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                            • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                                                            APIs
                                                                            • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                            • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                            • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: Temp$DirectoryFileNamePathWindows
                                                                            • String ID:
                                                                            • API String ID: 1125800050-0
                                                                            • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                            • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                                                            • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                            • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                                                            APIs
                                                                            • Sleep.KERNEL32(00000064), ref: 004175D0
                                                                            • CloseHandle.KERNELBASE(?,00000000,00000000,0045DBC0,00417C24,00000008,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: CloseHandleSleep
                                                                            • String ID: }A
                                                                            • API String ID: 252777609-2138825249
                                                                            • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                            • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                                                            • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                            • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                                                            APIs
                                                                            • malloc.MSVCRT ref: 00409A10
                                                                            • memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                                            • free.MSVCRT ref: 00409A31
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: freemallocmemcpy
                                                                            • String ID:
                                                                            • API String ID: 3056473165-0
                                                                            • Opcode ID: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                                            • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                                                            • Opcode Fuzzy Hash: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                                            • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: d
                                                                            • API String ID: 0-2564639436
                                                                            • Opcode ID: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                                                                            • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                                                                            • Opcode Fuzzy Hash: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                                                                            • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: memset
                                                                            • String ID: BINARY
                                                                            • API String ID: 2221118986-907554435
                                                                            • Opcode ID: bc3d19a7d02c8d15955695c672ee8877c8483ff31dc40855ee5cfcc836beaa69
                                                                            • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                                                            • Opcode Fuzzy Hash: bc3d19a7d02c8d15955695c672ee8877c8483ff31dc40855ee5cfcc836beaa69
                                                                            • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: _wcsicmp
                                                                            • String ID: /stext
                                                                            • API String ID: 2081463915-3817206916
                                                                            • Opcode ID: 43183885e7d34794edc347ee746a2fdce482efa4a93d67cd5162a7f7a47e1933
                                                                            • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                                                            • Opcode Fuzzy Hash: 43183885e7d34794edc347ee746a2fdce482efa4a93d67cd5162a7f7a47e1933
                                                                            • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                                                            APIs
                                                                              • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                            • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                              • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                              • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                              • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                                                              • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                                                            • CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                              • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,0040AFD7,00000000,0040B608), ref: 0040B052
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: File$ByteCharMultiWide$??2@??3@CloseCreateHandleReadSize
                                                                            • String ID:
                                                                            • API String ID: 2445788494-0
                                                                            • Opcode ID: bdc6ff89a6972445fbf15f1c87a3cbc7fe705fee6098557394266cd6fc52cd88
                                                                            • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                                                            • Opcode Fuzzy Hash: bdc6ff89a6972445fbf15f1c87a3cbc7fe705fee6098557394266cd6fc52cd88
                                                                            • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                                                            APIs
                                                                            Strings
                                                                            • failed to allocate %u bytes of memory, xrefs: 004152F0
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: malloc
                                                                            • String ID: failed to allocate %u bytes of memory
                                                                            • API String ID: 2803490479-1168259600
                                                                            • Opcode ID: 331d9f3b8e40439b36498a1be208f9c7b855b07c1663acfa81ecf9407a5950a4
                                                                            • Instruction ID: 0aa28a7b77b2060330bf56ee6aba3953d7f003d38adef6953018dc3bb0cf108c
                                                                            • Opcode Fuzzy Hash: 331d9f3b8e40439b36498a1be208f9c7b855b07c1663acfa81ecf9407a5950a4
                                                                            • Instruction Fuzzy Hash: 0FE026B7F01A12A3C200561AFD01AC677919FC132572B013BF92CD36C1E638D896C7A9
                                                                            APIs
                                                                            • memset.MSVCRT ref: 0041BDDF
                                                                            • memcmp.MSVCRT(00001388,?,00000010,?,00000065,00000065,?,?,?,?,?,0041F1B4,?,00000065,004381DF,00000065), ref: 0041BDF1
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: memcmpmemset
                                                                            • String ID:
                                                                            • API String ID: 1065087418-0
                                                                            • Opcode ID: fec4f8c686635726a589492d039bcbb9c6040c3e4ffa7e28f30a1ad23493d54b
                                                                            • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                                                            • Opcode Fuzzy Hash: fec4f8c686635726a589492d039bcbb9c6040c3e4ffa7e28f30a1ad23493d54b
                                                                            • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                                                            APIs
                                                                              • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,?,00410C56,?), ref: 0040ECF9
                                                                              • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,?,00410C56,?), ref: 0040EDC0
                                                                            • GetStdHandle.KERNEL32(000000F5,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00410530
                                                                            • CloseHandle.KERNELBASE(00000000,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00410654
                                                                              • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                                                                              • Part of subcall function 0040973C: GetLastError.KERNEL32(00000000,?,00410669,00000000,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00409750
                                                                              • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                                                              • Part of subcall function 0040973C: MessageBoxW.USER32(00000000,?,Error,00000030), ref: 00409796
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: Handle$??2@??3@CloseCreateErrorFileLastMessage_snwprintf
                                                                            • String ID:
                                                                            • API String ID: 1381354015-0
                                                                            • Opcode ID: 77225ea8c14d98a1088d43b9fd7330a512e035650861724d713e236cc530cbe1
                                                                            • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                                                            • Opcode Fuzzy Hash: 77225ea8c14d98a1088d43b9fd7330a512e035650861724d713e236cc530cbe1
                                                                            • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                                                            APIs
                                                                            • memset.MSVCRT ref: 004301AD
                                                                            • memcpy.MSVCRT(000001A8,?,00000020,?,00000000,00000000,00443DCE,00000000,00000000,00000000,?,00445FAE,?), ref: 004301CD
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: memcpymemset
                                                                            • String ID:
                                                                            • API String ID: 1297977491-0
                                                                            • Opcode ID: 5779d3908ed9fcb9905e682258c98d3473ff673b5cf038f88537d7202db00c15
                                                                            • Instruction ID: 4c6ebae2fd17f46eb6a701b53e5b2159fa076c350f721ddb3a961165d25aeca7
                                                                            • Opcode Fuzzy Hash: 5779d3908ed9fcb9905e682258c98d3473ff673b5cf038f88537d7202db00c15
                                                                            • Instruction Fuzzy Hash: F331BE72A00214EBDF10DF59C881A9EB7B4EF48714F24959AE804AF242C775EE41CB98
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: free
                                                                            • String ID:
                                                                            • API String ID: 1294909896-0
                                                                            • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                            • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                                                                            • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                            • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                                                                            APIs
                                                                              • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                                                              • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                              • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                              • Part of subcall function 0040A02C: CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                            • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: File$Time$CloseCompareCreateHandlememset
                                                                            • String ID:
                                                                            • API String ID: 2154303073-0
                                                                            • Opcode ID: b49b02137a533de872d41cf471f5063eaa0d82b3b55f9ade19adc7adaa1443d9
                                                                            • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                                                            • Opcode Fuzzy Hash: b49b02137a533de872d41cf471f5063eaa0d82b3b55f9ade19adc7adaa1443d9
                                                                            • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                                                            APIs
                                                                              • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                            • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                            • String ID:
                                                                            • API String ID: 3150196962-0
                                                                            • Opcode ID: be26bcaf2987f4035eeff70895753d9ab226293c41c78703657a1ba2214892b4
                                                                            • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                                                                            • Opcode Fuzzy Hash: be26bcaf2987f4035eeff70895753d9ab226293c41c78703657a1ba2214892b4
                                                                            • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                                                                            APIs
                                                                            • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                              • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: File$PointerRead
                                                                            • String ID:
                                                                            • API String ID: 3154509469-0
                                                                            • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                            • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                                                            • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                            • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                                                            APIs
                                                                            • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                                                              • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                                                              • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                                                              • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: PrivateProfile$StringWrite_itowmemset
                                                                            • String ID:
                                                                            • API String ID: 4232544981-0
                                                                            • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                            • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                                                            • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                            • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                                                            APIs
                                                                            • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: FreeLibrary
                                                                            • String ID:
                                                                            • API String ID: 3664257935-0
                                                                            • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                            • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                                                            • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                            • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                                                            APIs
                                                                              • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                              • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                              • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                              • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                              • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                            • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$FileModuleName
                                                                            • String ID:
                                                                            • API String ID: 3859505661-0
                                                                            • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                            • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                                                            • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                            • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                                                            APIs
                                                                            • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: FileRead
                                                                            • String ID:
                                                                            • API String ID: 2738559852-0
                                                                            • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                            • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                                                            • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                            • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                                                            APIs
                                                                            • WriteFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,?,?,0041056A,00000000,004538EC,00000002,?,00412758,00000000,00000000,?), ref: 0040A325
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: FileWrite
                                                                            • String ID:
                                                                            • API String ID: 3934441357-0
                                                                            • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                            • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                                                            • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                            • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                                                            APIs
                                                                            • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: FreeLibrary
                                                                            • String ID:
                                                                            • API String ID: 3664257935-0
                                                                            • Opcode ID: 1d54aae614fa8c55dcd640132eb097a684c5c1cfdaa339356b04098da49b3b41
                                                                            • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                                                            • Opcode Fuzzy Hash: 1d54aae614fa8c55dcd640132eb097a684c5c1cfdaa339356b04098da49b3b41
                                                                            • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                                                            APIs
                                                                            • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: CreateFile
                                                                            • String ID:
                                                                            • API String ID: 823142352-0
                                                                            • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                            • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                                                            • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                            • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                                                            APIs
                                                                            • CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: CreateFile
                                                                            • String ID:
                                                                            • API String ID: 823142352-0
                                                                            • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                            • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                                                            • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                            • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                                                            APIs
                                                                            • ??3@YAXPAX@Z.MSVCRT(00000000,0040AFD7,00000000,0040B608), ref: 0040B052
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: ??3@
                                                                            • String ID:
                                                                            • API String ID: 613200358-0
                                                                            • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                            • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                                                            • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                            • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                                                            APIs
                                                                            • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: FreeLibrary
                                                                            • String ID:
                                                                            • API String ID: 3664257935-0
                                                                            • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                            • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                                                            • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                            • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                                                            APIs
                                                                            • EnumResourceNamesW.KERNELBASE(?,?,004148B6,00000000), ref: 0041494B
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: EnumNamesResource
                                                                            • String ID:
                                                                            • API String ID: 3334572018-0
                                                                            • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                            • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                                                            • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                            • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                                                            APIs
                                                                            • FreeLibrary.KERNELBASE(00000000), ref: 0044DEB6
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: FreeLibrary
                                                                            • String ID:
                                                                            • API String ID: 3664257935-0
                                                                            • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                            • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                                                            • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                            • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                                                            APIs
                                                                            • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: CloseFind
                                                                            • String ID:
                                                                            • API String ID: 1863332320-0
                                                                            • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                            • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                                                            • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                            • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                                                            APIs
                                                                            • RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: Open
                                                                            • String ID:
                                                                            • API String ID: 71445658-0
                                                                            • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                            • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                                                                            • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                            • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                                                                            APIs
                                                                            • GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: AttributesFile
                                                                            • String ID:
                                                                            • API String ID: 3188754299-0
                                                                            • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                            • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                                                            • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                            • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4a5c685a9d9bdef1792c919a9c6653d350a9d3b47e85a52724e839495e208d01
                                                                            • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                                                            • Opcode Fuzzy Hash: 4a5c685a9d9bdef1792c919a9c6653d350a9d3b47e85a52724e839495e208d01
                                                                            • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                                                            APIs
                                                                            • memset.MSVCRT ref: 004095FC
                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                              • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                                                              • Part of subcall function 004091B8: memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                              • Part of subcall function 004091B8: memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                                                            • String ID:
                                                                            • API String ID: 3655998216-0
                                                                            • Opcode ID: 06dd2208bba870b09ae4b6a35152530ffce6bfcddb3583e774ca40d5f9d70baf
                                                                            • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                                                            • Opcode Fuzzy Hash: 06dd2208bba870b09ae4b6a35152530ffce6bfcddb3583e774ca40d5f9d70baf
                                                                            • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                                                            APIs
                                                                            • memset.MSVCRT ref: 00445426
                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                              • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                              • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                                                            • String ID:
                                                                            • API String ID: 1828521557-0
                                                                            • Opcode ID: 30388877fc1f1466cb5fc4dbbd946ecf0cc3df28c932be715bfff3731eba89eb
                                                                            • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                                                            • Opcode Fuzzy Hash: 30388877fc1f1466cb5fc4dbbd946ecf0cc3df28c932be715bfff3731eba89eb
                                                                            • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                                                            APIs
                                                                              • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                              • Part of subcall function 004062A6: SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                            • memcpy.MSVCRT(00000000,00000000,?,00000000,00000000,?,00000000,0040627C), ref: 00406942
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: ??2@FilePointermemcpy
                                                                            • String ID:
                                                                            • API String ID: 609303285-0
                                                                            • Opcode ID: 56af1d3d616a015a3ecb908bea2399ecc0b12673b9d22b9fdb7fca1b43f88111
                                                                            • Instruction ID: a147fa8ec668463fbbadbca9a08a444fcb23aa95a0ceadfc627c4072e562ebd5
                                                                            • Opcode Fuzzy Hash: 56af1d3d616a015a3ecb908bea2399ecc0b12673b9d22b9fdb7fca1b43f88111
                                                                            • Instruction Fuzzy Hash: 4B11A7B2500108BBDB11A755C840F9F77ADDF85318F16807AF90677281C778AE2687A9
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: _wcsicmp
                                                                            • String ID:
                                                                            • API String ID: 2081463915-0
                                                                            • Opcode ID: cbddd43e50b6ded4d98ad0d82dd6b3ceb41ab08d79f44c56bc7594620457dfc9
                                                                            • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                                                            • Opcode Fuzzy Hash: cbddd43e50b6ded4d98ad0d82dd6b3ceb41ab08d79f44c56bc7594620457dfc9
                                                                            • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                                                            APIs
                                                                              • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                                                                              • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                            • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                                                              • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: File$CloseCreateErrorHandleLastRead
                                                                            • String ID:
                                                                            • API String ID: 2136311172-0
                                                                            • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                            • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                                                            • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                            • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                                                            APIs
                                                                              • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,0040AFD7,00000000,0040B608), ref: 0040B052
                                                                            • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: ??2@??3@
                                                                            • String ID:
                                                                            • API String ID: 1936579350-0
                                                                            • Opcode ID: b7d64a9db0ab8f7e7b6c625ee8b1c93a5659d73149cb5b89327274070e360fa5
                                                                            • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                                                            • Opcode Fuzzy Hash: b7d64a9db0ab8f7e7b6c625ee8b1c93a5659d73149cb5b89327274070e360fa5
                                                                            • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: free
                                                                            • String ID:
                                                                            • API String ID: 1294909896-0
                                                                            • Opcode ID: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                            • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                                                            • Opcode Fuzzy Hash: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                            • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: free
                                                                            • String ID:
                                                                            • API String ID: 1294909896-0
                                                                            • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                            • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                                                            • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                            • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: free
                                                                            • String ID:
                                                                            • API String ID: 1294909896-0
                                                                            • Opcode ID: 908a2f96169ffd3f5635234353574390e30f5bbba8146f1a6a93cc8e14f9cc97
                                                                            • Instruction ID: 5e082493cfe38c59748d9de5a46a99a47989c0e105afa31b953e1adb18ef7a34
                                                                            • Opcode Fuzzy Hash: 908a2f96169ffd3f5635234353574390e30f5bbba8146f1a6a93cc8e14f9cc97
                                                                            • Instruction Fuzzy Hash: 17900282455501105C0425755C06505110808A313A376074A7032955D1CE188060601D
                                                                            APIs
                                                                            • GetLastError.KERNEL32 ref: 004182D7
                                                                              • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                            • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                                                            • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                                                            • LocalFree.KERNEL32(?), ref: 00418342
                                                                            • free.MSVCRT ref: 00418370
                                                                              • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,771ADF80,?,0041755F,?), ref: 00417452
                                                                              • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: FormatMessage$ByteCharErrorFreeLastLocalMultiVersionWidefreemalloc
                                                                            • String ID: OsError 0x%x (%u)
                                                                            • API String ID: 2360000266-2664311388
                                                                            • Opcode ID: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                            • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                                                            • Opcode Fuzzy Hash: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                            • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                                                            APIs
                                                                            • GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: Version
                                                                            • String ID:
                                                                            • API String ID: 1889659487-0
                                                                            • Opcode ID: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                                            • Instruction ID: 34334e4c1a53cba42546035453d5331cf18162d9798f59f763323439a3546438
                                                                            • Opcode Fuzzy Hash: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                                            • Instruction Fuzzy Hash: BAE0463590131CCFEB24DB34DB0B7C676F5AB08B46F0104F4C20AC2092D3789688CA2A
                                                                            APIs
                                                                            • _wcsicmp.MSVCRT ref: 004022A6
                                                                            • _wcsicmp.MSVCRT ref: 004022D7
                                                                            • _wcsicmp.MSVCRT ref: 00402305
                                                                            • _wcsicmp.MSVCRT ref: 00402333
                                                                              • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                              • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,Function_0004E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                            • memset.MSVCRT ref: 0040265F
                                                                            • memcpy.MSVCRT(?,?,00000011), ref: 0040269B
                                                                              • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                              • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                              • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                            • memcpy.MSVCRT(?,?,0000001C,?,?,00000000,?), ref: 004026FF
                                                                            • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                                                            • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: _wcsicmp$Freememcpy$Library$AddressCryptDataLocalProcUnprotectmemsetwcslen
                                                                            • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                                                            • API String ID: 2929817778-1134094380
                                                                            • Opcode ID: 6b2dcad71dd29105a6653737fa8e45fa2e3e7ed8fa5e3c17c72860e5870ea394
                                                                            • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                                                            • Opcode Fuzzy Hash: 6b2dcad71dd29105a6653737fa8e45fa2e3e7ed8fa5e3c17c72860e5870ea394
                                                                            • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                                                            APIs
                                                                            • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                                                            • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                                                            • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                                                            • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                                                            • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                                                            • GetWindowRect.USER32(?,?), ref: 00414088
                                                                            • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                                                            • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                                                            • GetDC.USER32 ref: 004140E3
                                                                            • wcslen.MSVCRT ref: 00414123
                                                                            • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                                                            • ReleaseDC.USER32(?,?), ref: 00414181
                                                                            • _snwprintf.MSVCRT ref: 00414244
                                                                            • SetWindowTextW.USER32(?,?), ref: 00414258
                                                                            • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                                                            • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                                                            • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                                                            • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                                                            • GetClientRect.USER32(?,?), ref: 004142E1
                                                                            • GetWindowRect.USER32(?,?), ref: 004142EB
                                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                                                            • GetClientRect.USER32(?,?), ref: 0041433B
                                                                            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                                                            • String ID: %s:$EDIT$STATIC
                                                                            • API String ID: 2080319088-3046471546
                                                                            • Opcode ID: d5ee3c6463b2dd39cebf85bfb280f62e7b68b75cb8304e0a6374ce3c4529937b
                                                                            • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                                                            • Opcode Fuzzy Hash: d5ee3c6463b2dd39cebf85bfb280f62e7b68b75cb8304e0a6374ce3c4529937b
                                                                            • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                                                            APIs
                                                                            • EndDialog.USER32(?,?), ref: 00413221
                                                                            • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                                                            • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                                                            • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                                                            • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                                                            • memset.MSVCRT ref: 00413292
                                                                            • memset.MSVCRT ref: 004132B4
                                                                            • memset.MSVCRT ref: 004132CD
                                                                            • memset.MSVCRT ref: 004132E1
                                                                            • memset.MSVCRT ref: 004132FB
                                                                            • memset.MSVCRT ref: 00413310
                                                                            • GetCurrentProcess.KERNEL32 ref: 00413318
                                                                            • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                                                            • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                                                            • memset.MSVCRT ref: 004133C0
                                                                            • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                                                            • memcpy.MSVCRT(?,0045AA90,0000021C), ref: 004133FC
                                                                            • wcscpy.MSVCRT ref: 0041341F
                                                                            • _snwprintf.MSVCRT ref: 0041348E
                                                                            • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                                                            • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                                                            • SetFocus.USER32(00000000), ref: 004134B7
                                                                            Strings
                                                                            • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                                                            • {Unknown}, xrefs: 004132A6
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                                                            • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                                                            • API String ID: 4111938811-1819279800
                                                                            • Opcode ID: 40febe18c8ea58ee401dc1d7e9b16ea7dd9e42426c780dab9fc2ef4c2d2113e8
                                                                            • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                                                            • Opcode Fuzzy Hash: 40febe18c8ea58ee401dc1d7e9b16ea7dd9e42426c780dab9fc2ef4c2d2113e8
                                                                            • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                                                            APIs
                                                                            • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                                                            • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                                                            • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                                                            • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                                                            • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                                                            • SetCursor.USER32(00000000,?,?), ref: 0040129E
                                                                            • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                                                            • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                                                            • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                                                            • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                                                            • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                                                            • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                                                            • EndDialog.USER32(?,?), ref: 0040135E
                                                                            • DeleteObject.GDI32(?), ref: 0040136A
                                                                            • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                                                            • ShowWindow.USER32(00000000), ref: 00401398
                                                                            • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                                                            • ShowWindow.USER32(00000000), ref: 004013A7
                                                                            • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                                                            • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                                                            • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                                                            • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                                                            • String ID:
                                                                            • API String ID: 829165378-0
                                                                            • Opcode ID: d28eae30b51bd20c699493622e1b5036da36ceab07d34b4d33997197d58435e6
                                                                            • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                                                            • Opcode Fuzzy Hash: d28eae30b51bd20c699493622e1b5036da36ceab07d34b4d33997197d58435e6
                                                                            • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                                                            APIs
                                                                            • memset.MSVCRT ref: 00404172
                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                            • wcscpy.MSVCRT ref: 004041D6
                                                                            • wcscpy.MSVCRT ref: 004041E7
                                                                            • memset.MSVCRT ref: 00404200
                                                                            • memset.MSVCRT ref: 00404215
                                                                            • _snwprintf.MSVCRT ref: 0040422F
                                                                            • wcscpy.MSVCRT ref: 00404242
                                                                            • memset.MSVCRT ref: 0040426E
                                                                            • memset.MSVCRT ref: 004042CD
                                                                            • memset.MSVCRT ref: 004042E2
                                                                            • _snwprintf.MSVCRT ref: 004042FE
                                                                            • wcscpy.MSVCRT ref: 00404311
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                                                            • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                                                            • API String ID: 2454223109-1580313836
                                                                            • Opcode ID: a77b9e8d0023a9b0013669bfcd7e150c1f61845d053eff75771d06e602164fa8
                                                                            • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                                                            • Opcode Fuzzy Hash: a77b9e8d0023a9b0013669bfcd7e150c1f61845d053eff75771d06e602164fa8
                                                                            • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                                                            APIs
                                                                            • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                            • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                            • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                            • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                            • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                            • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                            • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                            • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                            • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$HandleModule
                                                                            • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll$p+vw@Fvw@Bvw
                                                                            • API String ID: 667068680-772928780
                                                                            • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                            • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                                                                            • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                            • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                                                                            APIs
                                                                              • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                                                                            • SetMenu.USER32(?,00000000), ref: 00411453
                                                                            • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                                                                            • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                                                                            • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                                                                            • memcpy.MSVCRT(?,?,00002008,?,00000000,/nosaveload,00000000,00000001), ref: 004115C8
                                                                            • ShowWindow.USER32(?,?), ref: 004115FE
                                                                            • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                                                            • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                                                            • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                                                            • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                                                                            • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                                                              • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                                                              • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                                                                            • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                                                                            • API String ID: 4054529287-3175352466
                                                                            • Opcode ID: 8847399f9b9726e4c3d36038752de16191353ca0570e8d305bfc5bef64df017b
                                                                            • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                                                                            • Opcode Fuzzy Hash: 8847399f9b9726e4c3d36038752de16191353ca0570e8d305bfc5bef64df017b
                                                                            • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: _snwprintf$memset$wcscpy
                                                                            • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                            • API String ID: 2000436516-3842416460
                                                                            • Opcode ID: f43de039386cd0382df8450c395ac1cae23be0dcf7256b882f2abc90b2723d32
                                                                            • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                                                            • Opcode Fuzzy Hash: f43de039386cd0382df8450c395ac1cae23be0dcf7256b882f2abc90b2723d32
                                                                            • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                                                            APIs
                                                                              • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                            • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                                                                            • ??2@YAPAXI@Z.MSVCRT(00000001,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 0040859D
                                                                              • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                            • memset.MSVCRT ref: 004085CF
                                                                            • memset.MSVCRT ref: 004085F1
                                                                            • memset.MSVCRT ref: 00408606
                                                                            • strcmp.MSVCRT ref: 00408645
                                                                            • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086DB
                                                                            • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086FA
                                                                            • memset.MSVCRT ref: 0040870E
                                                                            • strcmp.MSVCRT ref: 0040876B
                                                                            • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000001E), ref: 0040879D
                                                                            • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                                                                            • String ID: ---
                                                                            • API String ID: 3437578500-2854292027
                                                                            • Opcode ID: 514a4b219222fc308ac2af9ebc5a2bc9af16dfffa76d3dbf40f60a33dc7994f2
                                                                            • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                                                                            • Opcode Fuzzy Hash: 514a4b219222fc308ac2af9ebc5a2bc9af16dfffa76d3dbf40f60a33dc7994f2
                                                                            • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: _wcsicmp
                                                                            • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                                                            • API String ID: 2081463915-1959339147
                                                                            • Opcode ID: ed70c74fadb10ab7d72ef9915f44c0908033a9cd6b37cdcdb0b46a34d9d8d060
                                                                            • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                                                                            • Opcode Fuzzy Hash: ed70c74fadb10ab7d72ef9915f44c0908033a9cd6b37cdcdb0b46a34d9d8d060
                                                                            • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                                                                            APIs
                                                                            • GetDC.USER32(00000000), ref: 004121FF
                                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                                                            • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                                                            • SetBkMode.GDI32(?,00000001), ref: 00412232
                                                                            • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                                                            • SelectObject.GDI32(?,?), ref: 00412251
                                                                            • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                                                            • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                                                              • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                                                              • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                                                              • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                                                            • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                                                            • SetCursor.USER32(00000000), ref: 004122BC
                                                                            • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                                                            • memcpy.MSVCRT(?,?,00002008), ref: 0041234D
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                                                            • String ID:
                                                                            • API String ID: 1700100422-0
                                                                            • Opcode ID: 982738172b7671ed7e60757921d653f6822ff96d67897b30d29685b1d4afaeae
                                                                            • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                                                            • Opcode Fuzzy Hash: 982738172b7671ed7e60757921d653f6822ff96d67897b30d29685b1d4afaeae
                                                                            • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                                                            APIs
                                                                            • GetClientRect.USER32(?,?), ref: 004111E0
                                                                            • GetWindowRect.USER32(?,?), ref: 004111F6
                                                                            • GetWindowRect.USER32(?,?), ref: 0041120C
                                                                            • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                                                            • GetWindowRect.USER32(00000000), ref: 0041124D
                                                                            • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                                                            • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                                                            • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                                                            • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                                                            • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                                                            • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                                                            • EndDeferWindowPos.USER32(?), ref: 0041130B
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Defer$Rect$BeginClientItemPoints
                                                                            • String ID:
                                                                            • API String ID: 552707033-0
                                                                            • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                            • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                                                            • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                            • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                                                            APIs
                                                                            • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,?,?,0040C255,?,?,*.*,0040C2BF,00000000), ref: 0040C0A4
                                                                              • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                            • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                                                              • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                                                              • Part of subcall function 0040BFF3: memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                                            • memcpy.MSVCRT(00000000,?,00000004,00000000,?,?,?,?), ref: 0040C11B
                                                                            • strchr.MSVCRT ref: 0040C140
                                                                            • strchr.MSVCRT ref: 0040C151
                                                                            • _strlwr.MSVCRT ref: 0040C15F
                                                                            • memset.MSVCRT ref: 0040C17A
                                                                            • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: File$memcpystrchr$CloseCreateHandlePointerSize_memicmp_strlwrmemset
                                                                            • String ID: 4$h
                                                                            • API String ID: 4066021378-1856150674
                                                                            • Opcode ID: 71bd764b9dcf29740d9000bfd46b6f343dec630bed034bbd58b4fa538d0cb68c
                                                                            • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                                                            • Opcode Fuzzy Hash: 71bd764b9dcf29740d9000bfd46b6f343dec630bed034bbd58b4fa538d0cb68c
                                                                            • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                                                            APIs
                                                                            • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                                                            • KillTimer.USER32(?,00000041), ref: 004060D7
                                                                            • KillTimer.USER32(?,00000041), ref: 004060E8
                                                                            • GetTickCount.KERNEL32 ref: 0040610B
                                                                            • GetParent.USER32(?), ref: 00406136
                                                                            • SendMessageW.USER32(00000000), ref: 0040613D
                                                                            • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                                                            • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                                                            • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                                                            • String ID: A
                                                                            • API String ID: 2892645895-3554254475
                                                                            • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                            • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                                                            • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                            • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                                                            • String ID: 0$6
                                                                            • API String ID: 4066108131-3849865405
                                                                            • Opcode ID: fc96a420e8f8bdf87928e34e657a0b6c1b8723afb93dcca2deed5b8d5a3436dd
                                                                            • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                                                            • Opcode Fuzzy Hash: fc96a420e8f8bdf87928e34e657a0b6c1b8723afb93dcca2deed5b8d5a3436dd
                                                                            • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                                                            APIs
                                                                            • memset.MSVCRT ref: 004082EF
                                                                              • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                            • memset.MSVCRT ref: 00408362
                                                                            • memset.MSVCRT ref: 00408377
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: memset$ByteCharMultiWide
                                                                            • String ID:
                                                                            • API String ID: 290601579-0
                                                                            • Opcode ID: aa14e1b9e389497361ed401ed70ebc10d5f62d7ff5e107018b9223dc9ab6e0fb
                                                                            • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                                                            • Opcode Fuzzy Hash: aa14e1b9e389497361ed401ed70ebc10d5f62d7ff5e107018b9223dc9ab6e0fb
                                                                            • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                                                            APIs
                                                                            • memset.MSVCRT ref: 0040A47B
                                                                            • _snwprintf.MSVCRT ref: 0040A4AE
                                                                            • wcslen.MSVCRT ref: 0040A4BA
                                                                            • memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                            • wcslen.MSVCRT ref: 0040A4E0
                                                                            • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: memcpywcslen$_snwprintfmemset
                                                                            • String ID: %s (%s)$YV@
                                                                            • API String ID: 3979103747-598926743
                                                                            • Opcode ID: 1cd29c0c96bb3ddeb02ffde04bffb630c2350d0f86c95190f97a15d0a128dfe3
                                                                            • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                                                                            • Opcode Fuzzy Hash: 1cd29c0c96bb3ddeb02ffde04bffb630c2350d0f86c95190f97a15d0a128dfe3
                                                                            • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                                                                            APIs
                                                                            • LoadLibraryW.KERNEL32(comctl32.dll,00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044C3
                                                                            • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                            • FreeLibrary.KERNEL32(00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044E9
                                                                            • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: Library$AddressFreeLoadMessageProc
                                                                            • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                                            • API String ID: 2780580303-317687271
                                                                            • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                            • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                                                                            • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                            • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                                                                            APIs
                                                                            Strings
                                                                            • out of memory, xrefs: 0042F865
                                                                            • unable to open database: %s, xrefs: 0042F84E
                                                                            • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                                                                            • database %s is already in use, xrefs: 0042F6C5
                                                                            • too many attached databases - max %d, xrefs: 0042F64D
                                                                            • database is already attached, xrefs: 0042F721
                                                                            • cannot ATTACH database within transaction, xrefs: 0042F663
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: memcpymemset
                                                                            • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                                            • API String ID: 1297977491-2001300268
                                                                            • Opcode ID: 9fef2143278846cd95885c1cbe03afab34c3f4ef307752a183a19874e6a22e95
                                                                            • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                                                                            • Opcode Fuzzy Hash: 9fef2143278846cd95885c1cbe03afab34c3f4ef307752a183a19874e6a22e95
                                                                            • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                                                                            APIs
                                                                            • DeleteFileW.KERNEL32(00000000,00000000,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 00418548
                                                                            • GetFileAttributesW.KERNEL32(00000000), ref: 0041854F
                                                                            • GetLastError.KERNEL32 ref: 0041855C
                                                                            • Sleep.KERNEL32(00000064), ref: 00418571
                                                                            • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 0041857A
                                                                            • GetFileAttributesA.KERNEL32(00000000), ref: 00418581
                                                                            • GetLastError.KERNEL32 ref: 0041858E
                                                                            • Sleep.KERNEL32(00000064), ref: 004185A3
                                                                            • free.MSVCRT ref: 004185AC
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: File$AttributesDeleteErrorLastSleep$free
                                                                            • String ID:
                                                                            • API String ID: 2802642348-0
                                                                            • Opcode ID: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                            • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                                                                            • Opcode Fuzzy Hash: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                            • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                                                                            APIs
                                                                            • GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                            • wcscpy.MSVCRT ref: 0040D1B5
                                                                              • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                                                              • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                                                            • wcslen.MSVCRT ref: 0040D1D3
                                                                            • GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                            • LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                            • memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                              • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0CC
                                                                              • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0EA
                                                                              • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D108
                                                                              • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D126
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                                                            • String ID: strings
                                                                            • API String ID: 3166385802-3030018805
                                                                            • Opcode ID: 07dd20e83a72376c017d688d2d43246e42d1d17d60f688a4af98472ad4cd9316
                                                                            • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                                                            • Opcode Fuzzy Hash: 07dd20e83a72376c017d688d2d43246e42d1d17d60f688a4af98472ad4cd9316
                                                                            • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                                                            APIs
                                                                              • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                                                                            • memset.MSVCRT ref: 00405455
                                                                            • memset.MSVCRT ref: 0040546C
                                                                            • memset.MSVCRT ref: 00405483
                                                                            • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00405498
                                                                            • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004054AD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: memset$memcpy$ErrorLast
                                                                            • String ID: 6$\
                                                                            • API String ID: 404372293-1284684873
                                                                            • Opcode ID: 0330b9b22cd30b5b2625a0a7e6ceceae146d238a8b356c7611763844912e7754
                                                                            • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                                                                            • Opcode Fuzzy Hash: 0330b9b22cd30b5b2625a0a7e6ceceae146d238a8b356c7611763844912e7754
                                                                            • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                                                                            APIs
                                                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                                                            • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                                                            • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                                                            • wcscpy.MSVCRT ref: 0040A0D9
                                                                            • wcscat.MSVCRT ref: 0040A0E6
                                                                            • wcscat.MSVCRT ref: 0040A0F5
                                                                            • wcscpy.MSVCRT ref: 0040A107
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                                                            • String ID:
                                                                            • API String ID: 1331804452-0
                                                                            • Opcode ID: 23c89843948f9d4d6ccb23a927c15bd8e6af065920e5565f2ade9cfd678fbabf
                                                                            • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                                                            • Opcode Fuzzy Hash: 23c89843948f9d4d6ccb23a927c15bd8e6af065920e5565f2ade9cfd678fbabf
                                                                            • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                                                            APIs
                                                                              • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                                                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                            • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                            • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                            • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                            • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                            • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                            • String ID: advapi32.dll
                                                                            • API String ID: 2012295524-4050573280
                                                                            • Opcode ID: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                                            • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                                                                            • Opcode Fuzzy Hash: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                                            • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                                                                            APIs
                                                                            Strings
                                                                            • <?xml version="1.0" ?>, xrefs: 0041007C
                                                                            • <%s>, xrefs: 004100A6
                                                                            • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: memset$_snwprintf
                                                                            • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                                            • API String ID: 3473751417-2880344631
                                                                            • Opcode ID: 2b06e63593618d13b5a5b8efcda018c795261ff0c1630acf280f9998f6f819b8
                                                                            • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                                                            • Opcode Fuzzy Hash: 2b06e63593618d13b5a5b8efcda018c795261ff0c1630acf280f9998f6f819b8
                                                                            • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: wcscat$_snwprintfmemset
                                                                            • String ID: %2.2X
                                                                            • API String ID: 2521778956-791839006
                                                                            • Opcode ID: 31c2c2b958cbfb7d79e881a69437bc30ebdfa5a8327fe047e8a0291744cff554
                                                                            • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                                                            • Opcode Fuzzy Hash: 31c2c2b958cbfb7d79e881a69437bc30ebdfa5a8327fe047e8a0291744cff554
                                                                            • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: _snwprintfwcscpy
                                                                            • String ID: dialog_%d$general$menu_%d$strings
                                                                            • API String ID: 999028693-502967061
                                                                            • Opcode ID: 80a89c9967db9934379ab2cd2962a5087f7f7915bf37897dca38dc6723802d56
                                                                            • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                                                                            • Opcode Fuzzy Hash: 80a89c9967db9934379ab2cd2962a5087f7f7915bf37897dca38dc6723802d56
                                                                            • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                                                                            APIs
                                                                              • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                              • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                              • Part of subcall function 00414592: RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                              • Part of subcall function 0040A9CE: free.MSVCRT ref: 0040A9DD
                                                                            • memset.MSVCRT ref: 0040C439
                                                                            • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                            • _wcsupr.MSVCRT ref: 0040C481
                                                                              • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                              • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                              • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                              • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                                            • memset.MSVCRT ref: 0040C4D0
                                                                            • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                            • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,?), ref: 0040C508
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: free$EnumValuememset$CloseOpen_wcsuprmemcpywcslen
                                                                            • String ID:
                                                                            • API String ID: 4131475296-0
                                                                            • Opcode ID: fcedaf62f28e4fa43429b70223f92c2d9bddde4a2c2a0188f501f40e4b32f332
                                                                            • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                                                                            • Opcode Fuzzy Hash: fcedaf62f28e4fa43429b70223f92c2d9bddde4a2c2a0188f501f40e4b32f332
                                                                            • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: AttributesFilefreememset
                                                                            • String ID:
                                                                            • API String ID: 2507021081-0
                                                                            • Opcode ID: f626a43687866fd62cff7198848d6d3005aba6e6c292beb9a178d7ac8eb7ae81
                                                                            • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                                                                            • Opcode Fuzzy Hash: f626a43687866fd62cff7198848d6d3005aba6e6c292beb9a178d7ac8eb7ae81
                                                                            • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                                                                            APIs
                                                                            • AreFileApisANSI.KERNEL32 ref: 004174FC
                                                                            • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                                                                            • malloc.MSVCRT ref: 00417524
                                                                            • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                                                                            • free.MSVCRT ref: 00417544
                                                                            • free.MSVCRT ref: 00417562
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWidefree$ApisFilemalloc
                                                                            • String ID:
                                                                            • API String ID: 4131324427-0
                                                                            • Opcode ID: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                            • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                                                                            • Opcode Fuzzy Hash: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                            • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                                                                            APIs
                                                                            • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                                                                            • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                                                                            • free.MSVCRT ref: 0041822B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: PathTemp$free
                                                                            • String ID: %s\etilqs_$etilqs_
                                                                            • API String ID: 924794160-1420421710
                                                                            • Opcode ID: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                            • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                                                            • Opcode Fuzzy Hash: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                            • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                                                            APIs
                                                                            • AreFileApisANSI.KERNEL32 ref: 00417497
                                                                            • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                                                                            • malloc.MSVCRT ref: 004174BD
                                                                            • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                                                                            • free.MSVCRT ref: 004174E4
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide$ApisFilefreemalloc
                                                                            • String ID:
                                                                            • API String ID: 4053608372-0
                                                                            • Opcode ID: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                            • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                                                                            • Opcode Fuzzy Hash: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                            • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                                                                            APIs
                                                                            • GetParent.USER32(?), ref: 0040D453
                                                                            • GetWindowRect.USER32(?,?), ref: 0040D460
                                                                            • GetClientRect.USER32(00000000,?), ref: 0040D46B
                                                                            • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                                                                            • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Rect$ClientParentPoints
                                                                            • String ID:
                                                                            • API String ID: 4247780290-0
                                                                            • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                            • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                                                                            • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                            • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                                                                            APIs
                                                                              • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                            • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                            • ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                            • memset.MSVCRT ref: 004450CD
                                                                              • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                            • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                              • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                                                              • Part of subcall function 00444E84: memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                              • Part of subcall function 00444E84: memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                              • Part of subcall function 00444E84: memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                                            • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                                                            • String ID:
                                                                            • API String ID: 1471605966-0
                                                                            • Opcode ID: edfdfd5907517e88f4142de78b3de7a943e3e7aedefbd09b5ff7bb7402004b57
                                                                            • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                                                            • Opcode Fuzzy Hash: edfdfd5907517e88f4142de78b3de7a943e3e7aedefbd09b5ff7bb7402004b57
                                                                            • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                                                            APIs
                                                                            • memset.MSVCRT ref: 004100FB
                                                                            • memset.MSVCRT ref: 00410112
                                                                              • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                              • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                            • _snwprintf.MSVCRT ref: 00410141
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: memset$_snwprintf_wcslwrwcscpy
                                                                            • String ID: </%s>
                                                                            • API String ID: 3400436232-259020660
                                                                            • Opcode ID: 5b9d86c37e8fc893e623c972aadbd746c4d139f4edb44e4e662c1ed71a902018
                                                                            • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                                                            • Opcode Fuzzy Hash: 5b9d86c37e8fc893e623c972aadbd746c4d139f4edb44e4e662c1ed71a902018
                                                                            • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                                                            APIs
                                                                            • memset.MSVCRT ref: 0040D58D
                                                                            • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                                                                            • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: ChildEnumTextWindowWindowsmemset
                                                                            • String ID: caption
                                                                            • API String ID: 1523050162-4135340389
                                                                            • Opcode ID: 0d93d59d75102ca4f37fb867a54fcac0e05f73641c093ad9b23abec7f1ae8059
                                                                            • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                                                                            • Opcode Fuzzy Hash: 0d93d59d75102ca4f37fb867a54fcac0e05f73641c093ad9b23abec7f1ae8059
                                                                            • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                                                                            APIs
                                                                              • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                                                              • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                                                            • CreateFontIndirectW.GDI32(?), ref: 00401156
                                                                            • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                                                            • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                                                            • String ID: MS Sans Serif
                                                                            • API String ID: 210187428-168460110
                                                                            • Opcode ID: d52be591b3ab58c36f6074870949877e32a333ebc1fa33980d7036594a0e8467
                                                                            • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                                                            • Opcode Fuzzy Hash: d52be591b3ab58c36f6074870949877e32a333ebc1fa33980d7036594a0e8467
                                                                            • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                                                            APIs
                                                                            • memset.MSVCRT ref: 0040560C
                                                                              • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                              • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                              • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                              • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                              • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                              • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                              • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                              • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                              • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                              • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                              • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                              • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                              • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                            • String ID: *.*$dat$wand.dat
                                                                            • API String ID: 2618321458-1828844352
                                                                            • Opcode ID: 0657051124b0d036bd635f999d135efdf1f0fa3481af6b00979a6af828487765
                                                                            • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                                                                            • Opcode Fuzzy Hash: 0657051124b0d036bd635f999d135efdf1f0fa3481af6b00979a6af828487765
                                                                            • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                                                                            APIs
                                                                            • memset.MSVCRT ref: 00412057
                                                                              • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,Function_0004E518,Function_0004E518,00000005), ref: 0040A12C
                                                                            • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                                                            • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                                                            • GetKeyState.USER32(00000010), ref: 0041210D
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                                                            • String ID:
                                                                            • API String ID: 3550944819-0
                                                                            • Opcode ID: e484aa313eeb80bd7472f2401a4c50dedc9a7c38d875d1deba0becea129ff557
                                                                            • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                                                            • Opcode Fuzzy Hash: e484aa313eeb80bd7472f2401a4c50dedc9a7c38d875d1deba0becea129ff557
                                                                            • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                                                            APIs
                                                                            • free.MSVCRT ref: 0040F561
                                                                            • memcpy.MSVCRT(00000000,?,00000001,g4@,00000000,0000121C,?,?,?,00403467), ref: 0040F573
                                                                            • memcpy.MSVCRT(00000000,?,?,00000000), ref: 0040F5A6
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: memcpy$free
                                                                            • String ID: g4@
                                                                            • API String ID: 2888793982-2133833424
                                                                            • Opcode ID: e202219f899f6405cf9ccc08ea0a2323c377b0568c486578cbaaf15be4e6d242
                                                                            • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                                                                            • Opcode Fuzzy Hash: e202219f899f6405cf9ccc08ea0a2323c377b0568c486578cbaaf15be4e6d242
                                                                            • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                                                                            APIs
                                                                            • memset.MSVCRT ref: 004144E7
                                                                              • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                                                              • Part of subcall function 0040A353: memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                            • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                                                                            • memset.MSVCRT ref: 0041451A
                                                                            • GetPrivateProfileStringW.KERNEL32(?,?,Function_0004E518,?,00002000,?), ref: 0041453C
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                                                                            • String ID:
                                                                            • API String ID: 1127616056-0
                                                                            • Opcode ID: 914c831d0af6f6b5d0e69cc874d3cd2e27131541a502a72cc4fac318c133dcf3
                                                                            • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                                                                            • Opcode Fuzzy Hash: 914c831d0af6f6b5d0e69cc874d3cd2e27131541a502a72cc4fac318c133dcf3
                                                                            • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                                                                            APIs
                                                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,771ADF80,?,0041755F,?), ref: 00417452
                                                                            • malloc.MSVCRT ref: 00417459
                                                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,771ADF80,?,0041755F,?), ref: 00417478
                                                                            • free.MSVCRT ref: 0041747F
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide$freemalloc
                                                                            • String ID:
                                                                            • API String ID: 2605342592-0
                                                                            • Opcode ID: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                            • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                                                                            • Opcode Fuzzy Hash: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                            • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                                                                            APIs
                                                                            • GetModuleHandleW.KERNEL32(00000000,?,00000000), ref: 00412403
                                                                            • RegisterClassW.USER32(00000001), ref: 00412428
                                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                                                                            • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000,?), ref: 00412455
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: HandleModule$ClassCreateRegisterWindow
                                                                            • String ID:
                                                                            • API String ID: 2678498856-0
                                                                            • Opcode ID: 3d8581704458cf3d0e12cdde0886d81e04a6e1a5031830fe2d02856e91d8c1e2
                                                                            • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                                                                            • Opcode Fuzzy Hash: 3d8581704458cf3d0e12cdde0886d81e04a6e1a5031830fe2d02856e91d8c1e2
                                                                            • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                                                                            APIs
                                                                              • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                                                              • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                                                              • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                                                                            • SetBkMode.GDI32(?,00000001), ref: 004143A2
                                                                            • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                                                                            • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                                                                            • GetStockObject.GDI32(00000000), ref: 004143C6
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                                                                            • String ID:
                                                                            • API String ID: 764393265-0
                                                                            • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                            • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                                                                            • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                            • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                                                                            APIs
                                                                            • memcpy.MSVCRT(0045A808,?,00000050,?,0040155D,?), ref: 004134E0
                                                                            • memcpy.MSVCRT(0045A538,?,000002CC,0045A808,?,00000050,?,0040155D,?), ref: 004134F2
                                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                                                                            • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: memcpy$DialogHandleModuleParam
                                                                            • String ID:
                                                                            • API String ID: 1386444988-0
                                                                            • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                            • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                                                                            • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                            • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                                                                            APIs
                                                                            • _snwprintf.MSVCRT ref: 0040A398
                                                                            • memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: _snwprintfmemcpy
                                                                            • String ID: %2.2X
                                                                            • API String ID: 2789212964-323797159
                                                                            • Opcode ID: ad0fc0dc4c4054376e52d8ba7d115ce3a6dbc9d30928944a1ebc7f5d9ce1ea74
                                                                            • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                                                                            • Opcode Fuzzy Hash: ad0fc0dc4c4054376e52d8ba7d115ce3a6dbc9d30928944a1ebc7f5d9ce1ea74
                                                                            • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                                                                            APIs
                                                                            • GetWindowLongW.USER32(?,000000EC), ref: 0040A159
                                                                            • SetWindowLongW.USER32(000000EC,000000EC,00000000), ref: 0040A16B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: LongWindow
                                                                            • String ID: MZ@
                                                                            • API String ID: 1378638983-2978689999
                                                                            • Opcode ID: 897d752f6043cc922bbe5e3779e5fd859b92255b25006c63bcdd8f44162c87a9
                                                                            • Instruction ID: 658df1d6f65a5f4ca5cf2dc917bfbc57e2b12ac14a328fb0c2cac09aa770bd9f
                                                                            • Opcode Fuzzy Hash: 897d752f6043cc922bbe5e3779e5fd859b92255b25006c63bcdd8f44162c87a9
                                                                            • Instruction Fuzzy Hash: 3FC0027415D116AFDF112B35EC0AE2A7EA9BB86362F208BB4B076E01F1CB7184109A09
                                                                            APIs
                                                                            • wcslen.MSVCRT ref: 0040B1DE
                                                                            • free.MSVCRT ref: 0040B201
                                                                              • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                              • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                                              • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                            • free.MSVCRT ref: 0040B224
                                                                            • memcpy.MSVCRT(00000000,00000000,-00000002,00000000,00000000,?,?,?,?,0040B319,0040B432,00000000,?,?,0040B432,00000000), ref: 0040B248
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: free$memcpy$mallocwcslen
                                                                            • String ID:
                                                                            • API String ID: 726966127-0
                                                                            • Opcode ID: dbfa2e27eb608a9f9479d75297a1486c58e4153ca5a873f0eddd30e24b8e668e
                                                                            • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                                                            • Opcode Fuzzy Hash: dbfa2e27eb608a9f9479d75297a1486c58e4153ca5a873f0eddd30e24b8e668e
                                                                            • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                                                            APIs
                                                                            • strlen.MSVCRT ref: 0040B0D8
                                                                            • free.MSVCRT ref: 0040B0FB
                                                                              • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                              • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                                              • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                            • free.MSVCRT ref: 0040B12C
                                                                            • memcpy.MSVCRT(00000000,?,00000000,00000000,0040B35A,?), ref: 0040B159
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: free$memcpy$mallocstrlen
                                                                            • String ID:
                                                                            • API String ID: 3669619086-0
                                                                            • Opcode ID: 04e6466bee9c2f86a7d5fc6531cc0ab8b23c91005f7f75429686add4e9716e46
                                                                            • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                                                            • Opcode Fuzzy Hash: 04e6466bee9c2f86a7d5fc6531cc0ab8b23c91005f7f75429686add4e9716e46
                                                                            • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                                                            APIs
                                                                            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                                                                            • malloc.MSVCRT ref: 00417407
                                                                            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                                                                            • free.MSVCRT ref: 00417425
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.1327390759.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.1327390759.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.1327390759.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide$freemalloc
                                                                            • String ID:
                                                                            • API String ID: 2605342592-0
                                                                            • Opcode ID: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                            • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                                                                            • Opcode Fuzzy Hash: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                            • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5