Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe

Overview

General Information

Sample name:#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe
renamed because original name is a hash value
Original sample name:_.hpw.scr.exe
Analysis ID:1543679
MD5:697d9c4f0800f93a19b89bf923d4135a
SHA1:6d77a6b41de8d1f24bee70ea628029fe7784077f
SHA256:8071c7b74e7ca2769f3746ec8cc007caee65474bb77808b7a84c84f877452605
Tags:exeuser-zhuzhu0009
Infos:

Detection

Score:69
Range:0 - 100
Whitelisted:false
Confidence:100%

Compliance

Score:31
Range:0 - 100

Signatures

Detected unpacking (changes PE section rights)
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Suricata IDS alerts for network traffic
Detected PE file pumping (to bypass AV & sandboxing)
Found API chain indicative of debugger detection
Found evasive API chain (may stop execution after checking mutex)
Injects a PE file into a foreign processes
Sigma detected: Execution from Suspicious Folder
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Suspicious Program Location with Network Connections
Contains functionality to delete services
Contains functionality to enumerate running services
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
EXE planting / hijacking vulnerabilities found
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for user specific document files
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Explorer Process Tree Break
Sleep loop found (likely to delay execution)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • explorer.exe (PID: 7568 cmdline: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding MD5: 662F4F92FDE3557E86D110526BB578D5)
    • TASLogin.exe (PID: 7988 cmdline: "C:\Users\Public\Documents\A9Q9P9\TASLogin.exe" MD5: E6A3CACCBD9CA82F38A14BD0D4428240)
      • TASLogin.exe (PID: 8016 cmdline: C:\Users\Public\Documents\A9Q9P9\TASLogin.exe MD5: E6A3CACCBD9CA82F38A14BD0D4428240)
  • rundll32.exe (PID: 7628 cmdline: C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding MD5: EF3179D498793BF4234F708D3BE28633)
  • OpenWith.exe (PID: 7744 cmdline: C:\Windows\system32\OpenWith.exe -Embedding MD5: E4A834784FA08C17D47A1E72429C5109)
  • TASLogin.exe (PID: 1620 cmdline: "C:\Users\Public\Documents\A9Q9P9\TASLogin.exe" MD5: E6A3CACCBD9CA82F38A14BD0D4428240)
    • TASLogin.exe (PID: 3384 cmdline: C:\Users\Public\Documents\A9Q9P9\TASLogin.exe MD5: E6A3CACCBD9CA82F38A14BD0D4428240)
  • TASLogin.exe (PID: 2084 cmdline: "C:\Users\Public\Documents\A9Q9P9\TASLogin.exe" MD5: E6A3CACCBD9CA82F38A14BD0D4428240)
    • TASLogin.exe (PID: 3512 cmdline: C:\Users\Public\Documents\A9Q9P9\TASLogin.exe MD5: E6A3CACCBD9CA82F38A14BD0D4428240)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Users\Public\Documents\A9Q9P9\TASLogin.exe" , CommandLine: "C:\Users\Public\Documents\A9Q9P9\TASLogin.exe" , CommandLine|base64offset|contains: , Image: C:\Users\Public\Documents\A9Q9P9\TASLogin.exe, NewProcessName: C:\Users\Public\Documents\A9Q9P9\TASLogin.exe, OriginalFileName: C:\Users\Public\Documents\A9Q9P9\TASLogin.exe, ParentCommandLine: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 7568, ParentProcessName: explorer.exe, ProcessCommandLine: "C:\Users\Public\Documents\A9Q9P9\TASLogin.exe" , ProcessId: 7988, ProcessName: TASLogin.exe
Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\Public\Documents\A9Q9P9\TASLogin.exe, EventID: 13, EventType: SetValue, Image: C:\Users\Public\Documents\A9Q9P9\TASLogin.exe, ProcessId: 7988, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IFfmsjhgsda
Source: Network ConnectionAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: DestinationIp: 137.220.137.85, DestinationIsIpv6: false, DestinationPort: 24818, EventID: 3, Image: C:\Users\Public\Documents\A9Q9P9\TASLogin.exe, Initiated: true, ProcessId: 8016, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49740
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\Public\Documents\A9Q9P9\TASLogin.exe, EventID: 13, EventType: SetValue, Image: C:\Users\Public\Documents\A9Q9P9\TASLogin.exe, ProcessId: 7988, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IFfmsjhgsda
Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems), @gott_cyber: Data: Command: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding, CommandLine: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding, CommandLine|base64offset|contains: Iyb, Image: C:\Windows\explorer.exe, NewProcessName: C:\Windows\explorer.exe, OriginalFileName: C:\Windows\explorer.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 752, ProcessCommandLine: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding, ProcessId: 7568, ProcessName: explorer.exe
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-10-28T09:05:22.603593+010020169221Malware Command and Control Activity Detected192.168.2.449740137.220.137.8524818TCP

Click to jump to signature section

Show All Signature Results
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeEXE: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeJump to behavior

Compliance

barindex
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeEXE: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeJump to behavior
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeStatic PE information: certificate valid
Source: Binary string: c:\Users\86130\Desktop\cert\debug\cert.pdb source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1718229560.0000000005E48000.00000004.00000020.00020000.00000000.sdmp, TASLogin.exe, 00000008.00000002.1858149624.0000000010299000.00000002.00000001.01000000.0000000F.sdmp, TASLogin.exe, 0000000C.00000002.1957609639.0000000010299000.00000002.00000001.01000000.0000000F.sdmp, TASLogin.exe, 0000000E.00000002.2037664334.0000000010299000.00000002.00000001.01000000.0000000F.sdmp, TASLoginBase.dll.0.dr
Source: Binary string: D:\Workspace\p-2ed35f15174943f6b676502b51f53d81\Output\TASLogin.pdb source: TASLogin.exe, TASLogin.exe, 0000000E.00000000.2034919769.000000000044A000.00000002.00000001.01000000.0000000E.sdmp, TASLogin.exe, 0000000F.00000000.2035415053.000000000044A000.00000002.00000001.01000000.0000000E.sdmp, TASLogin.exe.0.dr
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_00408694 FindFirstFileW,FindClose,9_2_00408694
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_004080C8 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,9_2_004080C8
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 13_2_00408694 FindFirstFileW,FindClose,13_2_00408694
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 13_2_004080C8 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,13_2_004080C8
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 15_2_00408694 FindFirstFileW,FindClose,15_2_00408694
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 15_2_004080C8 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,15_2_004080C8
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_00427EE0 GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,StrCmpNIW,9_2_00427EE0

Networking

barindex
Source: Network trafficSuricata IDS: 2016922 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic : 192.168.2.4:49740 -> 137.220.137.85:24818
Source: global trafficTCP traffic: 192.168.2.4:49740 -> 137.220.137.85:24818
Source: Joe Sandbox ViewASN Name: BCPL-SGBGPNETGlobalASNSG BCPL-SGBGPNETGlobalASNSG
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_0042B0E8 recv,9_2_0042B0E8
Source: global trafficDNS traffic detected: DNS query: 24818.windows-updata.com
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1695127501.00000000058EE000.00000004.00000020.00020000.00000000.sdmp, TASLogin.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCodeSigningCA-1.crt0
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1695127501.00000000058EE000.00000004.00000020.00020000.00000000.sdmp, #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1695264229.0000000005B81000.00000004.00000020.00020000.00000000.sdmp, TASLogin.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, TASLogin.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1695127501.00000000058EE000.00000004.00000020.00020000.00000000.sdmp, #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1695264229.0000000005B81000.00000004.00000020.00020000.00000000.sdmp, TASLogin.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1695127501.00000000058EE000.00000004.00000020.00020000.00000000.sdmp, #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1695264229.0000000005B81000.00000004.00000020.00020000.00000000.sdmp, TASLogin.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, TASLogin.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, TASLogin.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, TASLogin.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1695127501.00000000058EE000.00000004.00000020.00020000.00000000.sdmp, TASLogin.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1695127501.00000000058EE000.00000004.00000020.00020000.00000000.sdmp, #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1695264229.0000000005B81000.00000004.00000020.00020000.00000000.sdmp, TASLogin.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1695127501.00000000058EE000.00000004.00000020.00020000.00000000.sdmp, #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1695264229.0000000005B81000.00000004.00000020.00020000.00000000.sdmp, TASLogin.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, TASLogin.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: TASLogin.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1695127501.00000000058EE000.00000004.00000020.00020000.00000000.sdmp, TASLogin.exe.0.drString found in binary or memory: http://crl3.digicert.com/assured-cs-g1.crl00
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1695127501.00000000058EE000.00000004.00000020.00020000.00000000.sdmp, #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1695264229.0000000005B81000.00000004.00000020.00020000.00000000.sdmp, TASLogin.exe.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1695127501.00000000058EE000.00000004.00000020.00020000.00000000.sdmp, TASLogin.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1695127501.00000000058EE000.00000004.00000020.00020000.00000000.sdmp, #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1695264229.0000000005B81000.00000004.00000020.00020000.00000000.sdmp, TASLogin.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1695127501.00000000058EE000.00000004.00000020.00020000.00000000.sdmp, #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1695264229.0000000005B81000.00000004.00000020.00020000.00000000.sdmp, TASLogin.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0=
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1695127501.00000000058EE000.00000004.00000020.00020000.00000000.sdmp, TASLogin.exe.0.drString found in binary or memory: http://crl4.digicert.com/assured-cs-g1.crl0L
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1695127501.00000000058EE000.00000004.00000020.00020000.00000000.sdmp, #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1695264229.0000000005B81000.00000004.00000020.00020000.00000000.sdmp, TASLogin.exe.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1695127501.00000000058EE000.00000004.00000020.00020000.00000000.sdmp, #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1695264229.0000000005B81000.00000004.00000020.00020000.00000000.sdmp, TASLogin.exe.0.drString found in binary or memory: http://ocsp.digicert.com0
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, TASLogin.exe.0.drString found in binary or memory: http://ocsp.digicert.com0A
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, TASLogin.exe.0.drString found in binary or memory: http://ocsp.digicert.com0C
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1695127501.00000000058EE000.00000004.00000020.00020000.00000000.sdmp, TASLogin.exe.0.drString found in binary or memory: http://ocsp.digicert.com0L
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1695127501.00000000058EE000.00000004.00000020.00020000.00000000.sdmp, #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1695264229.0000000005B81000.00000004.00000020.00020000.00000000.sdmp, TASLogin.exe.0.drString found in binary or memory: http://ocsp.digicert.com0N
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, TASLogin.exe.0.drString found in binary or memory: http://ocsp.digicert.com0X
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeString found in binary or memory: http://ocsp.sectigo.com0
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeString found in binary or memory: http://ocsp.sectigo.com04
Source: explorer.exe, 00000002.00000002.2960243626.0000000005D92000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.mDD
Source: explorer.exe, 00000002.00000002.2960243626.0000000005D92000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.microsof
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1695127501.00000000058EE000.00000004.00000020.00020000.00000000.sdmp, #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1695264229.0000000005B81000.00000004.00000020.00020000.00000000.sdmp, TASLogin.exe.0.drString found in binary or memory: http://www.digicert.com/CPS0
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1695127501.00000000058EE000.00000004.00000020.00020000.00000000.sdmp, TASLogin.exe.0.drString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeString found in binary or memory: https://sectigo.com/CPS0
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeString found in binary or memory: https://support.google.com/chrome/?p=usage_stats_crash_reports
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1695127501.00000000058EE000.00000004.00000020.00020000.00000000.sdmp, #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1695264229.0000000005B81000.00000004.00000020.00020000.00000000.sdmp, TASLogin.exe.0.drString found in binary or memory: https://www.digicert.com/CPS0
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_0042D600 OpenSCManagerW,OpenServiceW,StartServiceW,ControlService,DeleteService,ChangeServiceConfigW,CloseServiceHandle,CloseServiceHandle,9_2_0042D600
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_004208F49_2_004208F4
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_004250A39_2_004250A3
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_0041E0A49_2_0041E0A4
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_004248B49_2_004248B4
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_0042215C9_2_0042215C
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_0041E9D49_2_0041E9D4
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_004254969_2_00425496
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_00424DF99_2_00424DF9
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_004246009_2_00424600
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_004256E79_2_004256E7
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 13_2_004208F413_2_004208F4
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 13_2_004250A313_2_004250A3
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 13_2_0041E0A413_2_0041E0A4
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 13_2_004248B413_2_004248B4
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 13_2_0042215C13_2_0042215C
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 13_2_0041E9D413_2_0041E9D4
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 13_2_0042549613_2_00425496
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 13_2_00424DF913_2_00424DF9
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 13_2_0042460013_2_00424600
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 13_2_004256E713_2_004256E7
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 15_2_004208F415_2_004208F4
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 15_2_004250A315_2_004250A3
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 15_2_0041E0A415_2_0041E0A4
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 15_2_004248B415_2_004248B4
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 15_2_0042215C15_2_0042215C
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 15_2_0041E9D415_2_0041E9D4
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 15_2_0042549615_2_00425496
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 15_2_00424DF915_2_00424DF9
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 15_2_0042460015_2_00424600
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 15_2_004256E715_2_004256E7
Source: Joe Sandbox ViewDropped File: C:\Users\Public\Documents\A9Q9P9\TASLogin.exe CA1F26619B4483F4BDA6B4D352B58A9C4F30C2E985E62E761B7D6F3440922264
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: String function: 00406000 appears 33 times
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: String function: 00406A80 appears 39 times
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: String function: 00406BB8 appears 31 times
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: String function: 00406060 appears 42 times
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: String function: 004063A0 appears 36 times
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: String function: 00406824 appears 582 times
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: String function: 004090B0 appears 39 times
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: String function: 0040ADB8 appears 600 times
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeStatic PE information: Resource name: ZIP type: Zip archive data, at least v2.0 to extract, compression method=deflate
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: TASLogin.exe.0.drStatic PE information: Section: .ace ZLIB complexity 0.99965625
Source: TASLogin.exe.0.drStatic PE information: Section: .tvm0 ZLIB complexity 0.9984584530651341
Source: classification engineClassification label: mal69.evad.winEXE@16/21@1/1
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_0043BC08 LookupPrivilegeValueW,AdjustTokenPrivileges,9_2_0043BC08
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_0043D53C GetDiskFreeSpaceW,9_2_0043D53C
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_0040BA58 GetModuleHandleW,FindResourceW,LoadResource,LockResource,FreeResource,9_2_0040BA58
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_0042D600 OpenSCManagerW,OpenServiceW,StartServiceW,ControlService,DeleteService,ChangeServiceConfigW,CloseServiceHandle,CloseServiceHandle,9_2_0042D600
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeFile created: C:\Users\Public\BRBUAUJump to behavior
Source: C:\Windows\System32\OpenWith.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7744:120:WilError_03
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeMutant created: \Sessions\1\BaseNamedObjects\$0_4BF0F494
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeProcess created: C:\Windows\explorer.exe
Source: unknownProcess created: C:\Windows\explorer.exe
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeProcess created: C:\Windows\explorer.exeJump to behavior
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\explorer.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
Source: unknownProcess created: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe "C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe"
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe C:\Users\Public\Music\LI1L1K
Source: unknownProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
Source: unknownProcess created: C:\Windows\System32\OpenWith.exe C:\Windows\system32\OpenWith.exe -Embedding
Source: C:\Windows\explorer.exeProcess created: C:\Users\Public\Documents\A9Q9P9\TASLogin.exe "C:\Users\Public\Documents\A9Q9P9\TASLogin.exe"
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeProcess created: C:\Users\Public\Documents\A9Q9P9\TASLogin.exe C:\Users\Public\Documents\A9Q9P9\TASLogin.exe
Source: unknownProcess created: C:\Users\Public\Documents\A9Q9P9\TASLogin.exe "C:\Users\Public\Documents\A9Q9P9\TASLogin.exe"
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeProcess created: C:\Users\Public\Documents\A9Q9P9\TASLogin.exe C:\Users\Public\Documents\A9Q9P9\TASLogin.exe
Source: unknownProcess created: C:\Users\Public\Documents\A9Q9P9\TASLogin.exe "C:\Users\Public\Documents\A9Q9P9\TASLogin.exe"
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeProcess created: C:\Users\Public\Documents\A9Q9P9\TASLogin.exe C:\Users\Public\Documents\A9Q9P9\TASLogin.exe
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe C:\Users\Public\Music\LI1L1KJump to behavior
Source: C:\Windows\explorer.exeProcess created: C:\Users\Public\Documents\A9Q9P9\TASLogin.exe "C:\Users\Public\Documents\A9Q9P9\TASLogin.exe" Jump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeProcess created: C:\Users\Public\Documents\A9Q9P9\TASLogin.exe C:\Users\Public\Documents\A9Q9P9\TASLogin.exeJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeProcess created: C:\Users\Public\Documents\A9Q9P9\TASLogin.exe C:\Users\Public\Documents\A9Q9P9\TASLogin.exeJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeProcess created: C:\Users\Public\Documents\A9Q9P9\TASLogin.exe C:\Users\Public\Documents\A9Q9P9\TASLogin.exeJump to behavior
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeSection loaded: explorerframe.dllJump to behavior
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: aepic.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: twinapi.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: ninput.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: explorerframe.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: actxprxy.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: aepic.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: twinapi.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: ninput.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: explorerframe.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: actxprxy.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: dui70.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: duser.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: thumbcache.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: dataexchange.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.ui.fileexplorer.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: cldapi.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: fltlib.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: uiribbon.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: atlthunk.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: winmm.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.staterepositoryclient.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: structuredquery.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: ieframe.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: msiso.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: smartscreenps.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: twinui.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: actxprxy.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.ui.appdefaults.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.ui.immersive.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: uiautomationcore.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: dui70.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: duser.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: bcp47mrm.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: uianimation.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.ui.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: windowmanagementapi.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: inputhost.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: thumbcache.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: tiledatarepository.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: staterepository.core.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.staterepository.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.staterepositorycore.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: mrmcorer.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: directmanipulation.dllJump to behavior
Source: C:\Windows\System32\OpenWith.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: tasloginbase.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: oledlg.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: schedcli.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: avicap32.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: msvfw32.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: winsta.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: tasloginbase.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: oledlg.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: schedcli.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: tasloginbase.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: oledlg.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: schedcli.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{56FDF344-FD6D-11d0-958A-006097C9A090}\InProcServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeStatic PE information: certificate valid
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeStatic file information: File size 57700088 > 1048576
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x368b000
Source: Binary string: c:\Users\86130\Desktop\cert\debug\cert.pdb source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, 00000000.00000003.1718229560.0000000005E48000.00000004.00000020.00020000.00000000.sdmp, TASLogin.exe, 00000008.00000002.1858149624.0000000010299000.00000002.00000001.01000000.0000000F.sdmp, TASLogin.exe, 0000000C.00000002.1957609639.0000000010299000.00000002.00000001.01000000.0000000F.sdmp, TASLogin.exe, 0000000E.00000002.2037664334.0000000010299000.00000002.00000001.01000000.0000000F.sdmp, TASLoginBase.dll.0.dr
Source: Binary string: D:\Workspace\p-2ed35f15174943f6b676502b51f53d81\Output\TASLogin.pdb source: TASLogin.exe, TASLogin.exe, 0000000E.00000000.2034919769.000000000044A000.00000002.00000001.01000000.0000000E.sdmp, TASLogin.exe, 0000000F.00000000.2035415053.000000000044A000.00000002.00000001.01000000.0000000E.sdmp, TASLogin.exe.0.dr

Data Obfuscation

barindex
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeUnpacked PE file: 9.2.TASLogin.exe.400000.0.unpack .ace:ER;.ace:R;.ace:W;.ace:R;.ace:W;.ace:R;.tvm0:ER;.ace:R;.ace:EW; vs .text:ER;.itext:ER;.data:W;.bss:W;.idata:W;.didata:W;.tls:W;.rdata:R;.reloc:R;.rsrc:R;
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeUnpacked PE file: 13.2.TASLogin.exe.400000.0.unpack .ace:ER;.ace:R;.ace:W;.ace:R;.ace:W;.ace:R;.tvm0:ER;.ace:R;.ace:EW; vs .text:ER;.itext:ER;.data:W;.bss:W;.idata:W;.didata:W;.tls:W;.rdata:R;.reloc:R;.rsrc:R;
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeUnpacked PE file: 15.2.TASLogin.exe.400000.0.unpack .ace:ER;.ace:R;.ace:W;.ace:R;.ace:W;.ace:R;.tvm0:ER;.ace:R;.ace:EW; vs .text:ER;.itext:ER;.data:W;.bss:W;.idata:W;.didata:W;.tls:W;.rdata:R;.reloc:R;.rsrc:R;
Source: initial sampleStatic PE information: section where entry point is pointing to: .ace
Source: TASLogin.exe.0.drStatic PE information: section name: .ace
Source: TASLogin.exe.0.drStatic PE information: section name: .ace
Source: TASLogin.exe.0.drStatic PE information: section name: .ace
Source: TASLogin.exe.0.drStatic PE information: section name: .ace
Source: TASLogin.exe.0.drStatic PE information: section name: .ace
Source: TASLogin.exe.0.drStatic PE information: section name: .ace
Source: TASLogin.exe.0.drStatic PE information: section name: .tvm0
Source: TASLogin.exe.0.drStatic PE information: section name: .ace
Source: TASLogin.exe.0.drStatic PE information: section name: .ace
Source: TASLoginBase.dll.0.drStatic PE information: section name: .textbss
Source: TASLoginBase.dll.0.drStatic PE information: section name: .didat
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeCode function: 0_3_05BBB761 push FFFFFFA6h; iretd 0_3_05BBB76B
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeCode function: 0_3_05BBB761 push FFFFFFA6h; iretd 0_3_05BBB76B
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeCode function: 0_3_05BBB761 push FFFFFFA6h; iretd 0_3_05BBB76B
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeCode function: 0_3_05BBB7E1 push FFFFFFA6h; iretd 0_3_05BBB76B
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeCode function: 0_3_05BBB7E1 push FFFFFFA6h; iretd 0_3_05BBB76B
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeCode function: 0_3_05BBB7E1 push FFFFFFA6h; iretd 0_3_05BBB76B
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeCode function: 0_3_05BBB761 push FFFFFFA6h; iretd 0_3_05BBB76B
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeCode function: 0_3_05BBB761 push FFFFFFA6h; iretd 0_3_05BBB76B
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeCode function: 0_3_05BBB761 push FFFFFFA6h; iretd 0_3_05BBB76B
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeCode function: 0_3_05BBB7E1 push FFFFFFA6h; iretd 0_3_05BBB76B
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeCode function: 0_3_05BBB7E1 push FFFFFFA6h; iretd 0_3_05BBB76B
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeCode function: 0_3_05BBB7E1 push FFFFFFA6h; iretd 0_3_05BBB76B
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeCode function: 0_3_05BBB761 push FFFFFFA6h; iretd 0_3_05BBB76B
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeCode function: 0_3_05BBB761 push FFFFFFA6h; iretd 0_3_05BBB76B
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeCode function: 0_3_05BBB761 push FFFFFFA6h; iretd 0_3_05BBB76B
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeCode function: 0_3_05BBB7E1 push FFFFFFA6h; iretd 0_3_05BBB76B
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeCode function: 0_3_05BBB7E1 push FFFFFFA6h; iretd 0_3_05BBB76B
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeCode function: 0_3_05BBB7E1 push FFFFFFA6h; iretd 0_3_05BBB76B
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 8_2_0044CD4D push esi; ret 8_2_0044CD56
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_00426840 push ecx; mov dword ptr [esp], ecx9_2_00426845
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_00443318 push 004433B5h; ret 9_2_004433AD
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_00426448 push ecx; mov dword ptr [esp], edx9_2_00426449
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_00426408 push ecx; mov dword ptr [esp], edx9_2_00426409
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_00431070 push 004310B8h; ret 9_2_004310B0
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_0043E8C0 push 0043E935h; ret 9_2_0043E92D
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_0042C0EC push 0042C138h; ret 9_2_0042C130
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_0042B0AC push 0042B0E4h; ret 9_2_0042B0DC
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_004159E0 push ecx; mov dword ptr [esp], eax9_2_004159E2
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_004079FD pushfd ; retf 9_2_004079FE
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_00415AA4 push ecx; mov dword ptr [esp], eax9_2_00415AA6
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_0042C380 push 0042C3B8h; ret 9_2_0042C3B0
Source: TASLogin.exe.0.drStatic PE information: section name: .ace entropy: 7.998370715747767
Source: TASLogin.exe.0.drStatic PE information: section name: .tvm0 entropy: 7.997724175014119
Source: TASLogin.exe.0.drStatic PE information: section name: .ace entropy: 7.977928914872778
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeFile created: C:\Users\Public\Documents\A9Q9P9\TASLoginBase.dllJump to dropped file
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeFile created: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeJump to dropped file
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_0042D600 OpenSCManagerW,OpenServiceW,StartServiceW,ControlService,DeleteService,ChangeServiceConfigW,CloseServiceHandle,CloseServiceHandle,9_2_0042D600
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run IFfmsjhgsdaJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run IFfmsjhgsdaJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: icon122.png
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeStatic PE information: Resource name: RT_RCDATA size: 0x335c318
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_13-18111
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: OpenSCManagerW,EnumServicesStatusExW,OpenServiceW,QueryServiceConfigW,QueryServiceConfig2W,CloseServiceHandle,CloseServiceHandle,9_2_0042D1D4
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: VirtualAlloc,GetAdaptersInfo,lstrlenW,VirtualFree,9_2_0040B0EC
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: VirtualAlloc,GetAdaptersInfo,lstrlenW,VirtualFree,9_2_0040B0EA
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: VirtualAlloc,GetAdaptersInfo,lstrlenW,VirtualFree,9_2_0040AEE0
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeWindow / User API: threadDelayed 6667Jump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeAPI coverage: 9.1 %
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeAPI coverage: 9.1 %
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exe TID: 8044Thread sleep time: -66670s >= -30000sJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeLast function: Thread delayed
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeThread sleep count: Count: 6667 delay: -10Jump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_00408694 FindFirstFileW,FindClose,9_2_00408694
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_004080C8 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,9_2_004080C8
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 13_2_00408694 FindFirstFileW,FindClose,13_2_00408694
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 13_2_004080C8 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,13_2_004080C8
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 15_2_00408694 FindFirstFileW,FindClose,15_2_00408694
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 15_2_004080C8 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,15_2_004080C8
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_00427EE0 GetLogicalDriveStringsW,QueryDosDeviceW,lstrlenW,StrCmpNIW,9_2_00427EE0
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_00408F10 GetSystemInfo,9_2_00408F10
Source: TASLogin.exe, 00000009.00000002.2959716114.0000000000598000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllzzrb
Source: explorer.exe, 00000002.00000002.2960624197.00000000067B1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}a
Source: TASLogin.exe, 0000000D.00000002.1956635036.00000000006E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllJ
Source: explorer.exe, 00000002.00000002.2960624197.00000000067B1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #CdRom&Ven_NECVMWar&Prod_VMware_SATA
Source: TASLogin.exe, 0000000F.00000002.2036518898.0000000000528000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll}}
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeAPI call chain: ExitProcess graph end nodegraph_9-15813
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeAPI call chain: ExitProcess graph end nodegraph_13-15782
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeAPI call chain: ExitProcess graph end nodegraph_13-17591
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeAPI call chain: ExitProcess graph end nodegraph_13-17818
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeAPI call chain: ExitProcess graph end nodegraph_15-15782
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeAPI call chain: ExitProcess graph end nodegraph_15-17591
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeAPI call chain: ExitProcess graph end nodegraph_15-17818
Source: C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_9-15882
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_0042CD20 GetProcessHeap,lstrlenW,9_2_0042CD20

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeMemory written: C:\Users\Public\Documents\A9Q9P9\TASLogin.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeMemory written: C:\Users\Public\Documents\A9Q9P9\TASLogin.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeMemory written: C:\Users\Public\Documents\A9Q9P9\TASLogin.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeProcess created: C:\Users\Public\Documents\A9Q9P9\TASLogin.exe C:\Users\Public\Documents\A9Q9P9\TASLogin.exeJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeProcess created: C:\Users\Public\Documents\A9Q9P9\TASLogin.exe C:\Users\Public\Documents\A9Q9P9\TASLogin.exeJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeProcess created: C:\Users\Public\Documents\A9Q9P9\TASLogin.exe C:\Users\Public\Documents\A9Q9P9\TASLogin.exeJump to behavior
Source: TASLogin.exe, 00000009.00000002.2960043554.0000000000A5F000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Program ManagerA
Source: TASLogin.exe, 00000009.00000003.1861289737.000000000063C000.00000004.00000020.00020000.00000000.sdmp, TASLogin.exe, 00000009.00000003.1861511431.000000000063C000.00000004.00000020.00020000.00000000.sdmp, TASLogin.exe, 00000009.00000003.1861556411.000000000063C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $*2024-10-28 04:05:21$*4515531$*Program Manager$*$*3535539496$*zxcv12321$*1111111$*x
Source: TASLogin.exe, 00000009.00000002.2960043554.0000000000A2B000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: $*2024-10-28 04:05:21$*4515531$*Program Manager$*$*3535539496$*zxcv12321$*1111111$*host.exe
Source: TASLogin.exe, 00000009.00000002.2959716114.000000000063C000.00000004.00000020.00020000.00000000.sdmp, TASLogin.exe, 00000009.00000002.2959716114.00000000005E5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $*2024-10-28 04:05:21$*4515531$*Program Manager$*$*3535539496$*zxcv12321$*1111111$*
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_004046A0 cpuid 9_2_004046A0
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: GetUserDefaultUILanguage,GetLocaleInfoW,9_2_004087CC
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: GetLocaleInfoW,9_2_0041A844
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: GetLocaleInfoW,9_2_0041D2E0
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,9_2_00407C6C
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: EnumSystemLocalesW,9_2_0041D4C8
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: GetLocaleInfoW,9_2_0041A7F8
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: GetUserDefaultUILanguage,GetLocaleInfoW,13_2_004087CC
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: GetLocaleInfoW,13_2_0041A844
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: GetLocaleInfoW,13_2_0041D2E0
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,13_2_00407C6C
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: EnumSystemLocalesW,13_2_0041D4C8
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: GetLocaleInfoW,13_2_0041A7F8
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: GetUserDefaultUILanguage,GetLocaleInfoW,15_2_004087CC
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: GetLocaleInfoW,15_2_0041A844
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: GetLocaleInfoW,15_2_0041D2E0
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,15_2_00407C6C
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: EnumSystemLocalesW,15_2_0041D4C8
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: GetLocaleInfoW,15_2_0041A7F8
Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_0041A7A8 GetLocalTime,9_2_0041A7A8
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_0043B588 GetUserNameW,9_2_0043B588
Source: C:\Users\Public\Documents\A9Q9P9\TASLogin.exeCode function: 9_2_0041C9BC GetVersionExW,9_2_0041C9BC
Source: C:\Windows\explorer.exeDirectory queried: C:\Users\Public\DocumentsJump to behavior
Source: C:\Windows\explorer.exeDirectory queried: C:\Users\Public\Documents\A9Q9P9Jump to behavior
Source: C:\Windows\explorer.exeDirectory queried: C:\Users\Public\Documents\A9Q9P9Jump to behavior
Source: C:\Windows\explorer.exeDirectory queried: C:\Users\Public\DocumentsJump to behavior
Source: C:\Windows\explorer.exeDirectory queried: C:\Users\Public\Documents\A9Q9P9Jump to behavior
Source: C:\Windows\explorer.exeDirectory queried: C:\Users\Public\Documents\A9Q9P9Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts12
Service Execution
1
DLL Search Order Hijacking
1
DLL Search Order Hijacking
3
Obfuscated Files or Information
LSASS Memory1
Account Discovery
Remote Desktop Protocol1
Data from Local System
1
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt11
Windows Service
1
Access Token Manipulation
12
Software Packing
Security Account Manager1
System Service Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Standard Port
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCron1
Registry Run Keys / Startup Folder
11
Windows Service
1
DLL Side-Loading
NTDS13
File and Directory Discovery
Distributed Component Object ModelInput Capture1
Non-Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script112
Process Injection
1
DLL Search Order Hijacking
LSA Secrets35
System Information Discovery
SSHKeylogging1
Application Layer Protocol
Scheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
Registry Run Keys / Startup Folder
11
Masquerading
Cached Domain Credentials211
Security Software Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
Virtualization/Sandbox Evasion
DCSync22
Virtualization/Sandbox Evasion
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Access Token Manipulation
Proc Filesystem2
Process Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt112
Process Injection
/etc/passwd and /etc/shadow1
Application Window Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
Rundll32
Network Sniffing1
System Owner/User Discovery
Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
System Network Configuration Discovery
Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1543679 Sample: #Uc774#Uc9c0#Ud604_#Uc785#U... Startdate: 28/10/2024 Architecture: WINDOWS Score: 69 34 24818.windows-updata.com 2->34 46 Suricata IDS alerts for network traffic 2->46 48 Icon mismatch, binary includes an icon from a different legit application in order to fool users 2->48 50 Detected PE file pumping (to bypass AV & sandboxing) 2->50 52 3 other signatures 2->52 8 explorer.exe 15 9 2->8         started        10 TASLogin.exe 2->10         started        13 TASLogin.exe 2->13         started        15 3 other processes 2->15 signatures3 process4 file5 18 TASLogin.exe 1 8->18         started        54 Injects a PE file into a foreign processes 10->54 21 TASLogin.exe 10->21         started        23 TASLogin.exe 13->23         started        30 C:\Users\Public\Documents\...\TASLogin.exe, PE32 15->30 dropped 32 C:\Users\Public\...\TASLoginBase.dll, PE32 15->32 dropped 25 explorer.exe 1 15->25         started        signatures6 process7 signatures8 38 Detected unpacking (changes PE section rights) 18->38 40 Found evasive API chain (may stop execution after checking mutex) 18->40 42 Found API chain indicative of debugger detection 18->42 44 Injects a PE file into a foreign processes 18->44 27 TASLogin.exe 1 18->27         started        process9 dnsIp10 36 24818.windows-updata.com 137.220.137.85, 24818, 49740 BCPL-SGBGPNETGlobalASNSG Singapore 27->36

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe3%ReversingLabs
SourceDetectionScannerLabelLink
C:\Users\Public\Documents\A9Q9P9\TASLogin.exe0%ReversingLabs
C:\Users\Public\Documents\A9Q9P9\TASLoginBase.dll3%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl00%URL Reputationsafe
https://sectigo.com/CPS00%URL Reputationsafe
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#0%URL Reputationsafe
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
http://ocsp.sectigo.com00%URL Reputationsafe
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
24818.windows-updata.com
137.220.137.85
truetrue
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exefalse
    • URL Reputation: safe
    unknown
    http://schemas.mDDexplorer.exe, 00000002.00000002.2960243626.0000000005D92000.00000004.00000020.00020000.00000000.sdmpfalse
      unknown
      https://sectigo.com/CPS0#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exefalse
      • URL Reputation: safe
      unknown
      http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0##Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exefalse
      • URL Reputation: safe
      unknown
      http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exefalse
      • URL Reputation: safe
      unknown
      http://ocsp.sectigo.com0#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exefalse
      • URL Reputation: safe
      unknown
      https://support.google.com/chrome/?p=usage_stats_crash_reports#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exefalse
        unknown
        http://schemas.microsofexplorer.exe, 00000002.00000002.2960243626.0000000005D92000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0##Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exefalse
          • URL Reputation: safe
          unknown
          http://ocsp.sectigo.com04#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exefalse
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            137.220.137.85
            24818.windows-updata.comSingapore
            64050BCPL-SGBGPNETGlobalASNSGtrue
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1543679
            Start date and time:2024-10-28 09:04:11 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 8m 5s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:17
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe
            renamed because original name is a hash value
            Original Sample Name:_.hpw.scr.exe
            Detection:MAL
            Classification:mal69.evad.winEXE@16/21@1/1
            EGA Information:
            • Successful, ratio: 42.9%
            HCA Information:
            • Successful, ratio: 70%
            • Number of executed functions: 100
            • Number of non-executed functions: 193
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
            • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Execution Graph export aborted for target #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe, PID 7480 because there are no executed function
            • Execution Graph export aborted for target TASLogin.exe, PID 1620 because there are no executed function
            • Execution Graph export aborted for target TASLogin.exe, PID 2084 because there are no executed function
            • Execution Graph export aborted for target TASLogin.exe, PID 7988 because there are no executed function
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtEnumerateKey calls found.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtProtectVirtualMemory calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            • VT rate limit hit for: #Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe
            TimeTypeDescription
            04:05:11API Interceptor1x Sleep call for process: explorer.exe modified
            04:05:16API Interceptor1x Sleep call for process: OpenWith.exe modified
            04:05:22API Interceptor3701x Sleep call for process: TASLogin.exe modified
            08:05:22AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run IFfmsjhgsda C:\Users\Public\Documents\A9Q9P9\TASLogin.exe
            08:05:30AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run IFfmsjhgsda C:\Users\Public\Documents\A9Q9P9\TASLogin.exe
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            137.220.137.85SirixWxjKO.exeGet hashmaliciousUnknownBrowse
              SirixWxjKO.exeGet hashmaliciousUnknownBrowse
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                24818.windows-updata.comSirixWxjKO.exeGet hashmaliciousUnknownBrowse
                • 137.220.137.85
                SirixWxjKO.exeGet hashmaliciousUnknownBrowse
                • 137.220.137.85
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                BCPL-SGBGPNETGlobalASNSGppc.elfGet hashmaliciousUnknownBrowse
                • 134.122.132.94
                libcurl64.dll.bin.dllGet hashmaliciousUnknownBrowse
                • 27.124.45.155
                M4.1vserup-Setup_Install.exeGet hashmaliciousUnknownBrowse
                • 27.124.45.155
                M4.1vserup-Setup_Install.exeGet hashmaliciousUnknownBrowse
                • 27.124.45.155
                WzqSn6cjzD.elfGet hashmaliciousRekoobeBrowse
                • 134.122.129.15
                InBM8iB3GY.elfGet hashmaliciousUnknownBrowse
                • 134.122.129.38
                RINLZ08tM6.elfGet hashmaliciousConnectBackBrowse
                • 134.122.176.216
                oVkL551lD3.elfGet hashmaliciousConnectBackBrowse
                • 134.122.176.216
                na.elfGet hashmaliciousRekoobeBrowse
                • 27.124.45.146
                na.elfGet hashmaliciousRekoobeBrowse
                • 27.124.45.146
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                C:\Users\Public\Documents\A9Q9P9\TASLogin.exeSirixWxjKO.exeGet hashmaliciousUnknownBrowse
                  SirixWxjKO.exeGet hashmaliciousUnknownBrowse
                    C:\Users\Public\Documents\A9Q9P9\TASLoginBase.dllSirixWxjKO.exeGet hashmaliciousUnknownBrowse
                      SirixWxjKO.exeGet hashmaliciousUnknownBrowse
                        Process:C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):7
                        Entropy (8bit):2.5216406363433186
                        Encrypted:false
                        SSDEEP:3:4sm:45
                        MD5:3A910712891157EEA6A3244E09C71327
                        SHA1:DC4F35ADF281441C6F289D7DC2DF3176200CCB89
                        SHA-256:D6DFEBF391F795583510D07C8C1078FC240F1CE0490C379202B05FC47C1A3184
                        SHA-512:A11832E10155EB0F4AFCCB1AF942816CEAA30CA5A6218D81FF023B3098D9FE854152989A73AEF6B439A7CE03A3B8839DF101AB26DBADA8834D4169D5C90E715A
                        Malicious:false
                        Preview:exe,hwp
                        Process:C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe
                        File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                        Category:dropped
                        Size (bytes):2084675
                        Entropy (8bit):7.858929675721841
                        Encrypted:false
                        SSDEEP:49152:er57pncZYCvtokiIs5pc+hhdtP6I7D2Sk:er5m2gtDiBH2
                        MD5:B8AA59AE7DACA08C83F3C1D833BC2CA9
                        SHA1:DA85B9EF05D8B786CAEF59DFB987B869A0872295
                        SHA-256:B25C78CED002AC56D45792272487BAEBDFEEC643634D26C2F95070FBE1AD4044
                        SHA-512:4B9F9C1711855F5884E36C76E0BBE72E6616BDA2D4387CC750403C4EA0D6B025E826F213CD5953C0AAC8E83C06ADFCBED6AE3564BC8087CC5C82D8AAAF48ACA1
                        Malicious:false
                        Preview:PK........a.6Y..>.E..........winzipper/gii.png.\i\.G..]..N.}..7.....L......P....c....$..b.......1...W.H....ApDT.@..@.(.. ...W.3...o?,.tu.z..W.^.:.='..[Q.Uq(..(....\Y...?....).....6.r..`Sxxc.....z.N....j......N..N.....8.....Y.o(.'..2E...R*.77.a..'.V...5..L.a.R..H1*=.;).....J.*R&.q.r.r.......n...#.*ez.-.4;..!....t*9..w.:.v. ..u.\.Ak..!m_n.k.R.?..@Q..p^G..S..D.^....K.....:jF..P.r.f.....}.GQ.m.k70&....n0..x7.k.h#o......O;..z..m.^0..|{t.9\...a7.+...z..CE..3..#..&...=.=@C..}..A:.fz....go..?.S}.'....Lk.in'..h..3..jcO.5..Z..z.T..%n...k;.z8..4u?.V...p.l.;.w9[Nu.9s..V.eY.l.]....[.k.As.B..u..5..<~...:z....xv...<(.../....i?...L...........NY.X.....sQw......V`.H...T....p0.F...+Z+.].[o?..:...iu.r....zzZO.xM.8..,muKgG....?...}...U.... 2......oo%.. <.p.s.....?C"...G..W...rv..!....9.E.. .6...LWo..u&.....Z..7...~...5.]w.*..x:....*q+#.S..[z.].......~......e..t.9.].-.W..:.[. %.Ok>.^.F.V_G.eT......./...S.LE...k.g.. .T[..e...k;.rE.D...8.,...D.h....*.2.
                        Process:C:\Users\Public\Documents\A9Q9P9\TASLogin.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):342
                        Entropy (8bit):3.8464484274890114
                        Encrypted:false
                        SSDEEP:6:fTHNlKnGK1Mg1ftsoPf21kDxfnLQyw+/THNlKnGV/B1ftsoPf21kDxfnLQywc:rH3KqStJSOLi+LH3KAtJSOLic
                        MD5:70DA3A34D12F090D3EEE3BE320E77E37
                        SHA1:4BBF76873DCAA58F4F7F1C14A0AB0EA4153AC46C
                        SHA-256:F0E89736800249D2359A266F9CB2E6CDDD22570D45FA2B6A39AE92477401C594
                        SHA-512:0B8A6F6B5D4352577B36291334DBF4C8A3C5F0E8948EB01639378F1994B46DA302618E7A9B72B027154C9DB318F3C3CFCEF724E85449C95179D6C8B83BCA5FB5
                        Malicious:false
                        Preview:..........K..u.M.*.0.". .".$.=.!. .=.".(.0. .$.*. .%.*.".(.....K..x..M.*.0.B.e.~.....K....OM.*.0.S.*.L.G.y.~.t...g.c.L.u.h.`.|...b.u.b.>.u.h.u.....K..A.KM.*.0.b.K.G.Y.^.M.........K..u.M.*.0.". .".$.=.!. .=.".(.0. .$.*. .%.*.#.&.....K..x..M.*.0.B.e.~.....K....OM.*.0.S.*.L.G.y.~.t...g.c.L.u.h.`.|...b.u.b.>.u.h.u.....K..A.KM.*.0.b.K.G.Y.^.M.
                        Process:C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):581584
                        Entropy (8bit):6.872912235056943
                        Encrypted:false
                        SSDEEP:6144:vSB3SqIVGOto+XBwwcr7oegM5BZvzx/LH2V9TBipz1ze5H7wOgyS64GdPgdYuR:vSBXLODdcdqXTUpz1Kbsyb4FdYG
                        MD5:E6A3CACCBD9CA82F38A14BD0D4428240
                        SHA1:63937051B04582255505261D512A80AB40513B5F
                        SHA-256:CA1F26619B4483F4BDA6B4D352B58A9C4F30C2E985E62E761B7D6F3440922264
                        SHA-512:21FBC87528DBC6B0F4AEE165D9B812595AD1D30AF434C401F4BC86D8BD6A209DA950523CF00E7AE5FB1676350CD299D96E0E7A0255E6EBF53AEB7E51DD5D133E
                        Malicious:true
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Joe Sandbox View:
                        • Filename: SirixWxjKO.exe, Detection: malicious, Browse
                        • Filename: SirixWxjKO.exe, Detection: malicious, Browse
                        Preview:MZ......................@.......H.......:..e............................!..L.!This program cannot be run in DOS mode....$.............]...]...].!/]...].!-]'..].!,]...]...\...]...\...]...\...]..]]...]..M]...]...]...]...\...]..!]...]...\...]Rich...]........................PE..L....Wod....................."......N.............@............................................................................(.......................)..........PI..p....................J.......I..@............................................ace............................... ..`.ace....6...........................@..@.ace....\(..........................@....ace................................@..@.ace................................@....ace................................@..@.tvm0....@.......................... ..`.ace.....0....... ..................@..B.ace....T}...0...~.................. ...........................................................................................................................
                        Process:C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):55734272
                        Entropy (8bit):5.679064125230232
                        Encrypted:false
                        SSDEEP:24576:geiVTsbha1Ap4sB8n4ypNqb5GWKHuVFtNjHYPQhNzl+qNLCWhFBIIb7SCeU:9iVyCCMHYTce9NmuISSjU
                        MD5:4792F8361D50D90955C0525A2BFF1625
                        SHA1:9C304B2CDA0F6701F89AFA21C8F8521E6B0BB22C
                        SHA-256:44FED379DC48CEEEFF46FD463CBC19015ADAF625FCF6279675724A600520E345
                        SHA-512:52FAE02210C88F90634D711E20B1CC2BA3F4DBDE6801B41942E8538E8E7EABD2D7AB1D9938EB180C092DC92F4B466FB2629F8A604F4CE6B3769DC39C593B9A2A
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 3%
                        Joe Sandbox View:
                        • Filename: SirixWxjKO.exe, Detection: malicious, Browse
                        • Filename: SirixWxjKO.exe, Detection: malicious, Browse
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......D.......................'"...'"....'"....'"...'".......'"...Rich..........................PE..L....-%f...........!.....0...06......m........................................`.....................................0~7.R.... 8.......8.@.%...................^..Q....)..............................................18.......8.@....................textbss.A...............................text....$...`...0.................. ..`.rdata........)......@..............@..@.data...t.....7..P...0*.............@....idata...[... 8..`....*.............@....didat........8.......*.............@....rsrc...@.%...8...%...*.............@..@.reloc........^.......P.............@..B................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):324608
                        Entropy (8bit):6.519141819659315
                        Encrypted:false
                        SSDEEP:6144:sDERrfEH1INKtzWc9yijT0OPFJXpLxytqGjd17:2ERAHSszWcEif0+FRBwtp7
                        MD5:469CAF4D761A34C793201A577963E414
                        SHA1:3ED245D3C96E36F4E7E6A08AD4C66E8ECA65F7A5
                        SHA-256:F76F68C9E3AFB0D4D5B5AEFFF62D76024C8C2CB50D7BFCB8E11AFA297F5B5CB0
                        SHA-512:B8117428DD401C7E16860C92D5C73DE68FD16C708E9AB7F06A51E63A738CB790722CE281C85043D3455B3E05D15B7E450FAF8CD8CB4C92AB137048C9A0AA9F58
                        Malicious:false
                        Preview:...{.{{{.{.{rr{{3{{{{{{{.{.{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{.{{=.{../.@.3..@......................................{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{.{{..{.j..{{{{{{{{[{......{..{{U{{{{{{w..{{.{{{..{{{.{{.{{{.{{x{{{{{{{x{{{{{{{{..{{.{{{{{{.{{{{{.{{.{{{{.{{.{{{{{{.{{{{{{{{{{{{.{..{{{..{W.{{{{{{{{{{{{{{{{{{{;.{w.{{{{{{{{{{{{{{{{{{{{{{{{{{{+.{.{{{{{{{{{{{{{{{{{{{...{.{{{..{.{{{{{{{{{{{{{{{{{{.....{{{..{{.{{{..{{.{{{{{{{{{{{{{{.{{......{{wy{{{..{{.{{{..{{{{{{{{{{{{{.{{.....{{{..{{{..{{.{{{..{{{{{{{{{{{{{.{{;....{{{{.G.{{..{{{{{{..{{{{{{{{{{{{{{{{;......{{..{{{.{{.{{{..{{{{{{{{{{{{{.{{;.......{.{{{..{{.{{{..{{{{{{{{{{{{{.{{;....{{{{.{{{{..{{{{{{..{{{{{{{{{{{{{{{{;......{{.{{{{+.{{.{{{..{{{{{{{{{{{{{.{{.......{{w.{{{;.{{.{{{..{{{{{{{{{{{{{.{{.....{{{W.{{{..{{.{{{I.{{{{{{{{{{{{{.{{.{{{{{{{{{{{{{..{{{{{{u.{{{{{{{{{{{{{.{{.{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{
                        Process:C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe
                        File Type:Hangul (Korean) Word Processor File 5.x
                        Category:dropped
                        Size (bytes):200704
                        Entropy (8bit):7.855367666447655
                        Encrypted:false
                        SSDEEP:3072:ySVmSJYhsV+O9JXWIfRNFyrQ2KGw4wI3m6QfZMOBUyMO+wiloOy81Ty:BXKhsV+GJXxLzGwo3mjhb8O+wc1Ty
                        MD5:A2758B91909ECAAF1E3948EC6596B023
                        SHA1:1287B543FA62039150BDC876FB4ED5A73A6D0093
                        SHA-256:5D41A54E8E24725CE1A0237A1254B197AFD13F40D1A049F90D9F04D8902801B4
                        SHA-512:AB0B98E4A99D623E38D803BDE23F1A00F7F036E3C673BD157FEF04DF803819B61156D1840C615BFC0AC642DB277B202773D36C80C6076D1A8446FB28B3C40DE3
                        Malicious:false
                        Preview:......................>...........................................................p...........................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.............................................................................................................F.i.l.e.H.e.a.d.e.r.................................................................................................G.............H.w.p.S.u.m.m.a.r.y.I.n.f.o.r.m.a.t.i.o.n.........................................................................>...........D.o.c.I.n.f.o...........................................................................................
                        Process:C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe
                        File Type:MS Windows 95 Internet shortcut text (URL=<file:\\\C:\Users\Public\Documents\A9Q9P9\lee0923.hwp>), ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):130
                        Entropy (8bit):4.933813966373562
                        Encrypted:false
                        SSDEEP:3:HRAbABGQYmHmRDaHF5hdCl+D10AqSVyyKTLwkPaHF5hdCl+D1Vvn:HRYFVmoaH9dClApVh0BPaH9dCGn
                        MD5:A95FA9F0434DA0FE1747F3A9EAFD2445
                        SHA1:05D283F953397C91C3D8C0365878D1B4BA0DF0FE
                        SHA-256:B35102AFB23B03D3E9489B76A92855ED3AC7D72AE3F87D1AC5367FC40F1FD8D0
                        SHA-512:62F232737B4C95F12B60B1176EC06A161AE8121CAF41D3281BA72061A8AF22FA476C28370F52584A2D9794A1228C024F6B48C5EEE19EE8B7CA03B95F5682DC92
                        Malicious:false
                        Preview:[InternetShortcut]..URL=file:\\\C:\Users\Public\Documents\A9Q9P9\lee0923.hwp..WorkingDirectory=C:\Users\Public\Documents\A9Q9P9\..
                        Process:C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe
                        File Type:MS Windows 95 Internet shortcut text (URL=<file:\\\C:\Users\Public\Documents\A9Q9P9\lee0923.hwp>), ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):130
                        Entropy (8bit):4.933813966373562
                        Encrypted:false
                        SSDEEP:3:HRAbABGQYmHmRDaHF5hdCl+D10AqSVyyKTLwkPaHF5hdCl+D1Vvn:HRYFVmoaH9dClApVh0BPaH9dCGn
                        MD5:A95FA9F0434DA0FE1747F3A9EAFD2445
                        SHA1:05D283F953397C91C3D8C0365878D1B4BA0DF0FE
                        SHA-256:B35102AFB23B03D3E9489B76A92855ED3AC7D72AE3F87D1AC5367FC40F1FD8D0
                        SHA-512:62F232737B4C95F12B60B1176EC06A161AE8121CAF41D3281BA72061A8AF22FA476C28370F52584A2D9794A1228C024F6B48C5EEE19EE8B7CA03B95F5682DC92
                        Malicious:false
                        Preview:[InternetShortcut]..URL=file:\\\C:\Users\Public\Documents\A9Q9P9\lee0923.hwp..WorkingDirectory=C:\Users\Public\Documents\A9Q9P9\..
                        Process:C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe
                        File Type:MS Windows 95 Internet shortcut text (URL=<file:\\\C:\Users\Public\Documents\A9Q9P9\lee0923.hwp>), ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):130
                        Entropy (8bit):4.933813966373562
                        Encrypted:false
                        SSDEEP:3:HRAbABGQYmHmRDaHF5hdCl+D10AqSVyyKTLwkPaHF5hdCl+D1Vvn:HRYFVmoaH9dClApVh0BPaH9dCGn
                        MD5:A95FA9F0434DA0FE1747F3A9EAFD2445
                        SHA1:05D283F953397C91C3D8C0365878D1B4BA0DF0FE
                        SHA-256:B35102AFB23B03D3E9489B76A92855ED3AC7D72AE3F87D1AC5367FC40F1FD8D0
                        SHA-512:62F232737B4C95F12B60B1176EC06A161AE8121CAF41D3281BA72061A8AF22FA476C28370F52584A2D9794A1228C024F6B48C5EEE19EE8B7CA03B95F5682DC92
                        Malicious:false
                        Preview:[InternetShortcut]..URL=file:\\\C:\Users\Public\Documents\A9Q9P9\lee0923.hwp..WorkingDirectory=C:\Users\Public\Documents\A9Q9P9\..
                        Process:C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe
                        File Type:MS Windows 95 Internet shortcut text (URL=<file:\\\C:\Users\Public\Documents\A9Q9P9\lee0923.hwp>), ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):130
                        Entropy (8bit):4.933813966373562
                        Encrypted:false
                        SSDEEP:3:HRAbABGQYmHmRDaHF5hdCl+D10AqSVyyKTLwkPaHF5hdCl+D1Vvn:HRYFVmoaH9dClApVh0BPaH9dCGn
                        MD5:A95FA9F0434DA0FE1747F3A9EAFD2445
                        SHA1:05D283F953397C91C3D8C0365878D1B4BA0DF0FE
                        SHA-256:B35102AFB23B03D3E9489B76A92855ED3AC7D72AE3F87D1AC5367FC40F1FD8D0
                        SHA-512:62F232737B4C95F12B60B1176EC06A161AE8121CAF41D3281BA72061A8AF22FA476C28370F52584A2D9794A1228C024F6B48C5EEE19EE8B7CA03B95F5682DC92
                        Malicious:false
                        Preview:[InternetShortcut]..URL=file:\\\C:\Users\Public\Documents\A9Q9P9\lee0923.hwp..WorkingDirectory=C:\Users\Public\Documents\A9Q9P9\..
                        Process:C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe
                        File Type:MS Windows 95 Internet shortcut text (URL=<file:\\\C:\Users\Public\Documents\A9Q9P9\TASLogin.exe>), ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):131
                        Entropy (8bit):4.876320183147702
                        Encrypted:false
                        SSDEEP:3:HRAbABGQYmHmRDaHF5hdCl+D1MkOKPSxXjLwkPaHF5hdCl+D1Vvn:HRYFVmoaH9dCdkhSxTBPaH9dCGn
                        MD5:83EF7F4389E982E161E52FE111E992B2
                        SHA1:198BDCAA7B6BD89DF4A0F9AECCFCD08A8937C44B
                        SHA-256:0146331AC469E8527473D768840FFD205BD751C11E98FA1C98F9CB81834B0222
                        SHA-512:D161046CF16DC76308AAF342E7B221723A2C841C7711D5C0741772B5AFC2BCA132398021AA040D31D9E627BB909C4224525EA8BE3658795EBF01426DAC66900C
                        Malicious:false
                        Preview:[InternetShortcut]..URL=file:\\\C:\Users\Public\Documents\A9Q9P9\TASLogin.exe..WorkingDirectory=C:\Users\Public\Documents\A9Q9P9\..
                        Process:C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe
                        File Type:MS Windows 95 Internet shortcut text (URL=<file:\\\C:\Users\Public\Documents\A9Q9P9\TASLogin.exe>), ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):131
                        Entropy (8bit):4.876320183147702
                        Encrypted:false
                        SSDEEP:3:HRAbABGQYmHmRDaHF5hdCl+D1MkOKPSxXjLwkPaHF5hdCl+D1Vvn:HRYFVmoaH9dCdkhSxTBPaH9dCGn
                        MD5:83EF7F4389E982E161E52FE111E992B2
                        SHA1:198BDCAA7B6BD89DF4A0F9AECCFCD08A8937C44B
                        SHA-256:0146331AC469E8527473D768840FFD205BD751C11E98FA1C98F9CB81834B0222
                        SHA-512:D161046CF16DC76308AAF342E7B221723A2C841C7711D5C0741772B5AFC2BCA132398021AA040D31D9E627BB909C4224525EA8BE3658795EBF01426DAC66900C
                        Malicious:false
                        Preview:[InternetShortcut]..URL=file:\\\C:\Users\Public\Documents\A9Q9P9\TASLogin.exe..WorkingDirectory=C:\Users\Public\Documents\A9Q9P9\..
                        Process:C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe
                        File Type:MS Windows 95 Internet shortcut text (URL=<file:\\\C:\Users\Public\Documents\A9Q9P9\lee0923.hwp>), ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):130
                        Entropy (8bit):4.933813966373562
                        Encrypted:false
                        SSDEEP:3:HRAbABGQYmHmRDaHF5hdCl+D10AqSVyyKTLwkPaHF5hdCl+D1Vvn:HRYFVmoaH9dClApVh0BPaH9dCGn
                        MD5:A95FA9F0434DA0FE1747F3A9EAFD2445
                        SHA1:05D283F953397C91C3D8C0365878D1B4BA0DF0FE
                        SHA-256:B35102AFB23B03D3E9489B76A92855ED3AC7D72AE3F87D1AC5367FC40F1FD8D0
                        SHA-512:62F232737B4C95F12B60B1176EC06A161AE8121CAF41D3281BA72061A8AF22FA476C28370F52584A2D9794A1228C024F6B48C5EEE19EE8B7CA03B95F5682DC92
                        Malicious:false
                        Preview:[InternetShortcut]..URL=file:\\\C:\Users\Public\Documents\A9Q9P9\lee0923.hwp..WorkingDirectory=C:\Users\Public\Documents\A9Q9P9\..
                        Process:C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe
                        File Type:MS Windows 95 Internet shortcut text (URL=<file:\\\C:\Users\Public\Documents\A9Q9P9\TASLogin.exe>), ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):131
                        Entropy (8bit):4.876320183147702
                        Encrypted:false
                        SSDEEP:3:HRAbABGQYmHmRDaHF5hdCl+D1MkOKPSxXjLwkPaHF5hdCl+D1Vvn:HRYFVmoaH9dCdkhSxTBPaH9dCGn
                        MD5:83EF7F4389E982E161E52FE111E992B2
                        SHA1:198BDCAA7B6BD89DF4A0F9AECCFCD08A8937C44B
                        SHA-256:0146331AC469E8527473D768840FFD205BD751C11E98FA1C98F9CB81834B0222
                        SHA-512:D161046CF16DC76308AAF342E7B221723A2C841C7711D5C0741772B5AFC2BCA132398021AA040D31D9E627BB909C4224525EA8BE3658795EBF01426DAC66900C
                        Malicious:false
                        Preview:[InternetShortcut]..URL=file:\\\C:\Users\Public\Documents\A9Q9P9\TASLogin.exe..WorkingDirectory=C:\Users\Public\Documents\A9Q9P9\..
                        Process:C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe
                        File Type:MS Windows 95 Internet shortcut text (URL=<file:\\\C:\Users\Public\Documents\A9Q9P9\lee0923.hwp>), ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):130
                        Entropy (8bit):4.933813966373562
                        Encrypted:false
                        SSDEEP:3:HRAbABGQYmHmRDaHF5hdCl+D10AqSVyyKTLwkPaHF5hdCl+D1Vvn:HRYFVmoaH9dClApVh0BPaH9dCGn
                        MD5:A95FA9F0434DA0FE1747F3A9EAFD2445
                        SHA1:05D283F953397C91C3D8C0365878D1B4BA0DF0FE
                        SHA-256:B35102AFB23B03D3E9489B76A92855ED3AC7D72AE3F87D1AC5367FC40F1FD8D0
                        SHA-512:62F232737B4C95F12B60B1176EC06A161AE8121CAF41D3281BA72061A8AF22FA476C28370F52584A2D9794A1228C024F6B48C5EEE19EE8B7CA03B95F5682DC92
                        Malicious:false
                        Preview:[InternetShortcut]..URL=file:\\\C:\Users\Public\Documents\A9Q9P9\lee0923.hwp..WorkingDirectory=C:\Users\Public\Documents\A9Q9P9\..
                        Process:C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe
                        File Type:MS Windows 95 Internet shortcut text (URL=<file:\\\C:\Users\Public\Documents\A9Q9P9\TASLogin.exe>), ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):131
                        Entropy (8bit):4.876320183147702
                        Encrypted:false
                        SSDEEP:3:HRAbABGQYmHmRDaHF5hdCl+D1MkOKPSxXjLwkPaHF5hdCl+D1Vvn:HRYFVmoaH9dCdkhSxTBPaH9dCGn
                        MD5:83EF7F4389E982E161E52FE111E992B2
                        SHA1:198BDCAA7B6BD89DF4A0F9AECCFCD08A8937C44B
                        SHA-256:0146331AC469E8527473D768840FFD205BD751C11E98FA1C98F9CB81834B0222
                        SHA-512:D161046CF16DC76308AAF342E7B221723A2C841C7711D5C0741772B5AFC2BCA132398021AA040D31D9E627BB909C4224525EA8BE3658795EBF01426DAC66900C
                        Malicious:false
                        Preview:[InternetShortcut]..URL=file:\\\C:\Users\Public\Documents\A9Q9P9\TASLogin.exe..WorkingDirectory=C:\Users\Public\Documents\A9Q9P9\..
                        Process:C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe
                        File Type:MS Windows 95 Internet shortcut text (URL=<file:\\\C:\Users\Public\Documents\A9Q9P9\TASLogin.exe>), ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):131
                        Entropy (8bit):4.876320183147702
                        Encrypted:false
                        SSDEEP:3:HRAbABGQYmHmRDaHF5hdCl+D1MkOKPSxXjLwkPaHF5hdCl+D1Vvn:HRYFVmoaH9dCdkhSxTBPaH9dCGn
                        MD5:83EF7F4389E982E161E52FE111E992B2
                        SHA1:198BDCAA7B6BD89DF4A0F9AECCFCD08A8937C44B
                        SHA-256:0146331AC469E8527473D768840FFD205BD751C11E98FA1C98F9CB81834B0222
                        SHA-512:D161046CF16DC76308AAF342E7B221723A2C841C7711D5C0741772B5AFC2BCA132398021AA040D31D9E627BB909C4224525EA8BE3658795EBF01426DAC66900C
                        Malicious:false
                        Preview:[InternetShortcut]..URL=file:\\\C:\Users\Public\Documents\A9Q9P9\TASLogin.exe..WorkingDirectory=C:\Users\Public\Documents\A9Q9P9\..
                        Process:C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe
                        File Type:MS Windows 95 Internet shortcut text (URL=<file:\\\C:\Users\Public\Documents\A9Q9P9\lee0923.hwp>), ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):130
                        Entropy (8bit):4.933813966373562
                        Encrypted:false
                        SSDEEP:3:HRAbABGQYmHmRDaHF5hdCl+D10AqSVyyKTLwkPaHF5hdCl+D1Vvn:HRYFVmoaH9dClApVh0BPaH9dCGn
                        MD5:A95FA9F0434DA0FE1747F3A9EAFD2445
                        SHA1:05D283F953397C91C3D8C0365878D1B4BA0DF0FE
                        SHA-256:B35102AFB23B03D3E9489B76A92855ED3AC7D72AE3F87D1AC5367FC40F1FD8D0
                        SHA-512:62F232737B4C95F12B60B1176EC06A161AE8121CAF41D3281BA72061A8AF22FA476C28370F52584A2D9794A1228C024F6B48C5EEE19EE8B7CA03B95F5682DC92
                        Malicious:false
                        Preview:[InternetShortcut]..URL=file:\\\C:\Users\Public\Documents\A9Q9P9\lee0923.hwp..WorkingDirectory=C:\Users\Public\Documents\A9Q9P9\..
                        Process:C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe
                        File Type:MS Windows 95 Internet shortcut text (URL=<file:\\\C:\Users\Public\Documents\A9Q9P9\TASLogin.exe>), ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):131
                        Entropy (8bit):4.876320183147702
                        Encrypted:false
                        SSDEEP:3:HRAbABGQYmHmRDaHF5hdCl+D1MkOKPSxXjLwkPaHF5hdCl+D1Vvn:HRYFVmoaH9dCdkhSxTBPaH9dCGn
                        MD5:83EF7F4389E982E161E52FE111E992B2
                        SHA1:198BDCAA7B6BD89DF4A0F9AECCFCD08A8937C44B
                        SHA-256:0146331AC469E8527473D768840FFD205BD751C11E98FA1C98F9CB81834B0222
                        SHA-512:D161046CF16DC76308AAF342E7B221723A2C841C7711D5C0741772B5AFC2BCA132398021AA040D31D9E627BB909C4224525EA8BE3658795EBF01426DAC66900C
                        Malicious:false
                        Preview:[InternetShortcut]..URL=file:\\\C:\Users\Public\Documents\A9Q9P9\TASLogin.exe..WorkingDirectory=C:\Users\Public\Documents\A9Q9P9\..
                        Process:C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe
                        File Type:MS Windows 95 Internet shortcut text (URL=<file:\\\C:\Users\Public\Documents\A9Q9P9\TASLogin.exe>), ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):131
                        Entropy (8bit):4.876320183147702
                        Encrypted:false
                        SSDEEP:3:HRAbABGQYmHmRDaHF5hdCl+D1MkOKPSxXjLwkPaHF5hdCl+D1Vvn:HRYFVmoaH9dCdkhSxTBPaH9dCGn
                        MD5:83EF7F4389E982E161E52FE111E992B2
                        SHA1:198BDCAA7B6BD89DF4A0F9AECCFCD08A8937C44B
                        SHA-256:0146331AC469E8527473D768840FFD205BD751C11E98FA1C98F9CB81834B0222
                        SHA-512:D161046CF16DC76308AAF342E7B221723A2C841C7711D5C0741772B5AFC2BCA132398021AA040D31D9E627BB909C4224525EA8BE3658795EBF01426DAC66900C
                        Malicious:false
                        Preview:[InternetShortcut]..URL=file:\\\C:\Users\Public\Documents\A9Q9P9\TASLogin.exe..WorkingDirectory=C:\Users\Public\Documents\A9Q9P9\..
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):5.778961878652255
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe
                        File size:57'700'088 bytes
                        MD5:697d9c4f0800f93a19b89bf923d4135a
                        SHA1:6d77a6b41de8d1f24bee70ea628029fe7784077f
                        SHA256:8071c7b74e7ca2769f3746ec8cc007caee65474bb77808b7a84c84f877452605
                        SHA512:a699819be46329980047f50b819b84ce585115871b2a8e41c61a8cd66dcf4739213e195d280e993716d6ba0b0f8b15954b77330e0e97acd57029624895faa145
                        SSDEEP:49152:29oGEDr57pncZYCvtokiIs5pc+hhdtP6I7D2SGcCyEq9DRho/ctH01Ws74rA4RUS:29rgr5m2gtDiBHG5qFb0I+0PqkW6
                        TLSH:53C77BE5EBB67553E861E63418F16778A567321BA370DD8630AC92398F857C04F8F08E
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........4...Z...Z...Z.6.....Z.6.....Z...[...Z..d'...Z..d7.4.Z..d4.S.Z..d&...Z..d"...Z.Rich..Z.........PE..L......f...................
                        Icon Hash:80829e9e9a9e8c91
                        Entrypoint:0x440cf2
                        Entrypoint Section:.text
                        Digitally signed:true
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                        DLL Characteristics:
                        Time Stamp:0x66F00D2E [Sun Sep 22 12:27:26 2024 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:f77f649cebbc2879c7b68076eb63bc11
                        Signature Valid:true
                        Signature Issuer:CN=Sectigo Public Code Signing CA EV R36, O=Sectigo Limited, C=GB
                        Signature Validation Error:The operation completed successfully
                        Error Number:0
                        Not Before, Not After
                        • 08/05/2024 01:00:00 09/05/2025 00:59:59
                        Subject Chain
                        • CN=DAVINCI VISION LIMITED, O=DAVINCI VISION LIMITED, S=\u9999\u6e2f\u7279\u522b\u884c\u653f\u533a, C=CN, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.2=Hong Kong SAR, OID.1.3.6.1.4.1.311.60.2.1.3=CN, SERIALNUMBER=73087152
                        Version:3
                        Thumbprint MD5:1545B69C7993DB703C90CD929857CB8B
                        Thumbprint SHA-1:81458929D258DB62735B3A6D56577FED725C2A02
                        Thumbprint SHA-256:1F8381B50B8366D3BD0DF428CA6DCDFA69C26116B81A58CA43A1464EDFA6F5FE
                        Serial:00FEF386AC9C1D8636CB370C8C247F44FA
                        Instruction
                        call 00007F33C06301B3h
                        jmp 00007F33C06271CBh
                        push 00000000h
                        push dword ptr [esp+14h]
                        push dword ptr [esp+14h]
                        push dword ptr [esp+14h]
                        push dword ptr [esp+14h]
                        call 00007F33C063022Bh
                        add esp, 14h
                        ret
                        mov eax, dword ptr [esp+04h]
                        xor ecx, ecx
                        cmp eax, dword ptr [00474EE8h+ecx*8]
                        je 00007F33C06273C4h
                        inc ecx
                        cmp ecx, 2Dh
                        jl 00007F33C06273A3h
                        lea ecx, dword ptr [eax-13h]
                        cmp ecx, 11h
                        jnbe 00007F33C06273BEh
                        push 0000000Dh
                        pop eax
                        ret
                        mov eax, dword ptr [00474EECh+ecx*8]
                        ret
                        add eax, FFFFFF44h
                        push 0000000Eh
                        pop ecx
                        cmp ecx, eax
                        sbb eax, eax
                        and eax, ecx
                        add eax, 08h
                        ret
                        call 00007F33C0629888h
                        test eax, eax
                        jne 00007F33C06273B8h
                        mov eax, 00475050h
                        ret
                        add eax, 08h
                        ret
                        call 00007F33C0629875h
                        test eax, eax
                        jne 00007F33C06273B8h
                        mov eax, 00475054h
                        ret
                        add eax, 0Ch
                        ret
                        push esi
                        call 00007F33C062739Ch
                        mov ecx, dword ptr [esp+08h]
                        push ecx
                        mov dword ptr [eax], ecx
                        call 00007F33C0627342h
                        pop ecx
                        mov esi, eax
                        call 00007F33C0627375h
                        mov dword ptr [eax], esi
                        pop esi
                        ret
                        call 00007F33C062917Ch
                        push dword ptr [esp+04h]
                        call 00007F33C0628FD3h
                        push dword ptr [00475058h]
                        call 00007F33C06296A9h
                        push 000000FFh
                        call eax
                        add esp, 0Ch
                        Programming Language:
                        • [ASM] VS2005 build 50727
                        • [ C ] VS2005 build 50727
                        • [C++] VS2005 build 50727
                        • [RES] VS2005 build 50727
                        • [LNK] VS2005 build 50727
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x722b40xa0.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x7b0000x368ac84.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x37020000x4ef8
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x664580x40.rdata
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x600000x42c.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x7222c0x40.rdata
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x5e1a40x5f000b92461ad663671071019fb20093c4505False0.4565403988486842data6.476084791222863IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x600000x139020x140004ef4a007f5ead19f60aa4494ae216eacFalse0.35657958984375data4.689943254518714IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x740000x62640x3000946ebd3e93aff950f8bacd1eee5afbfbFalse0.23575846354166666data3.2699659458180044IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rsrc0x7b0000x368ac840x368b000bf9991bfec032c13dd4873dedbe72114unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        ZIP0x7bf040x1fcf43Zip archive data, at least v2.0 to extract, compression method=deflateChineseChina0.99932861328125
                        RT_CURSOR0x278e480x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"ChineseChina0.4805194805194805
                        RT_CURSOR0x278f7c0xb4Targa image data - Map 32 x 65536 x 1 +16 "\001"ChineseChina0.7
                        RT_CURSOR0x2790300x134AmigaOS bitmap font "(", fc_YSize 4294967264, 5120 elements, 2nd "\377\360?\377\377\370\177\377\377\374\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rdChineseChina0.36363636363636365
                        RT_CURSOR0x2791640x134Targa image data - RLE 64 x 65536 x 1 +32 "\001"ChineseChina0.35714285714285715
                        RT_CURSOR0x2792980x134dataChineseChina0.37337662337662336
                        RT_CURSOR0x2793cc0x134dataChineseChina0.37662337662337664
                        RT_CURSOR0x2795000x134Targa image data 64 x 65536 x 1 +32 "\001"ChineseChina0.36688311688311687
                        RT_CURSOR0x2796340x134Targa image data 64 x 65536 x 1 +32 "\001"ChineseChina0.37662337662337664
                        RT_CURSOR0x2797680x134Targa image data - Mono - RLE 64 x 65536 x 1 +32 "\001"ChineseChina0.36688311688311687
                        RT_CURSOR0x27989c0x134Targa image data - RGB - RLE 64 x 65536 x 1 +32 "\001"ChineseChina0.38636363636363635
                        RT_CURSOR0x2799d00x134dataChineseChina0.44155844155844154
                        RT_CURSOR0x279b040x134dataChineseChina0.4155844155844156
                        RT_CURSOR0x279c380x134AmigaOS bitmap font "(", fc_YSize 4294966847, 3840 elements, 2nd "\377?\374\377\377\300\003\377\377\300\003\377\377\340\007\377\377\360\017\377\377\370\037\377\377\374?\377\377\376\177\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rdChineseChina0.5422077922077922
                        RT_CURSOR0x279d6c0x134dataChineseChina0.2662337662337662
                        RT_CURSOR0x279ea00x134dataChineseChina0.2824675324675325
                        RT_CURSOR0x279fd40x134dataChineseChina0.3246753246753247
                        RT_BITMAP0x27a1080xb8Device independent bitmap graphic, 12 x 10 x 4, image size 80ChineseChina0.44565217391304346
                        RT_BITMAP0x27a1c00x144Device independent bitmap graphic, 33 x 11 x 4, image size 220ChineseChina0.37962962962962965
                        RT_ICON0x27a3040x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors0.180956678700361
                        RT_ICON0x27abac0x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors0.18280346820809248
                        RT_ICON0x27b1140xdacPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.8914285714285715
                        RT_ICON0x27bec00xdacPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.8914285714285715
                        RT_ICON0x27cc6c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.06887966804979254
                        RT_ICON0x27f2140x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.11092870544090057
                        RT_ICON0x2802bc0x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.20656028368794327
                        RT_DIALOG0x2807240xccdataChineseChina0.7107843137254902
                        RT_DIALOG0x2807f00xe2dataChineseChina0.6637168141592921
                        RT_DIALOG0x2808d40x34dataChineseChina0.9038461538461539
                        RT_STRING0x2809080x54dataChineseChina0.8571428571428571
                        RT_STRING0x28095c0x2cdataChineseChina0.5909090909090909
                        RT_STRING0x2809880x82dataChineseChina0.8769230769230769
                        RT_STRING0x280a0c0x1d0dataChineseChina0.8060344827586207
                        RT_STRING0x280bdc0x164dataChineseChina0.48314606741573035
                        RT_STRING0x280d400x132dataChineseChina0.6405228758169934
                        RT_STRING0x280e740x50dataChineseChina0.725
                        RT_STRING0x280ec40x40dataChineseChina0.65625
                        RT_STRING0x280f040x6adataChineseChina0.7452830188679245
                        RT_STRING0x280f700x1d6dataChineseChina0.6723404255319149
                        RT_STRING0x2811480x110dataChineseChina0.625
                        RT_STRING0x2812580x24dataChineseChina0.4444444444444444
                        RT_STRING0x28127c0x30dataChineseChina0.625
                        RT_RCDATA0x2812ac0x335c318JPEG image data, Exif standard: [TIFF image data, little-endian, direntries=8, orientation=upper-left, xresolution=110, yresolution=118, resolutionunit=2, software=ACDSee Pro 6, datetime=2023:10:27 16:07:55], baseline, precision 8, 55x67, components 30.012384414672851562
                        RT_RCDATA0x35dd5c40x80MSVC .resChineseChina0.640625
                        RT_RCDATA0x35dd6440x122bd8MSVC .resChineseChina1.0003061294555664
                        RT_GROUP_CURSOR0x370021c0x22Lotus unknown worksheet or configuration, revision 0x2ChineseChina0.9705882352941176
                        RT_GROUP_CURSOR0x37002400x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
                        RT_GROUP_CURSOR0x37002540x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
                        RT_GROUP_CURSOR0x37002680x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
                        RT_GROUP_CURSOR0x370027c0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
                        RT_GROUP_CURSOR0x37002900x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
                        RT_GROUP_CURSOR0x37002a40x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
                        RT_GROUP_CURSOR0x37002b80x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
                        RT_GROUP_CURSOR0x37002cc0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
                        RT_GROUP_CURSOR0x37002e00x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
                        RT_GROUP_CURSOR0x37002f40x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
                        RT_GROUP_CURSOR0x37003080x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
                        RT_GROUP_CURSOR0x370031c0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
                        RT_GROUP_CURSOR0x37003300x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
                        RT_GROUP_CURSOR0x37003440x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.3
                        RT_GROUP_ICON0x37003580x5adata0.7333333333333333
                        RT_HTML0x37003b40x2b6ASCII textChineseChina0.4755043227665706
                        RT_HTML0x370066c0x216ASCII textChineseChina0.4700374531835206
                        RT_HTML0x37008840x8f0HTML document, Unicode text, UTF-8 textChineseChina0.4785839160839161
                        RT_HTML0x37011740x973HTML document, Unicode text, UTF-8 (with BOM) textChineseChina0.4803637866887143
                        RT_HTML0x3701ae80x7f4HTML document, Unicode text, UTF-8 textChineseChina0.4764243614931238
                        RT_HTML0x37022dc0x859HTML document, Unicode text, UTF-8 (with BOM) textChineseChina0.48713149274684137
                        RT_HTML0x3702b380x7e6HTML document, Unicode text, UTF-8 textChineseChina0.46439169139465875
                        RT_HTML0x37033200x815HTML document, Unicode text, UTF-8 textChineseChina0.471725471242146
                        RT_HTML0x3703b380x9bcHTML document, Unicode text, UTF-8 (with BOM) textChineseChina0.47752808988764045
                        RT_HTML0x37044f40x7b7HTML document, ASCII textChineseChina0.4450632911392405
                        RT_HTML0x3704cac0x792HTML document, ASCII textChineseChina0.45562435500515996
                        RT_HTML0x37054400x7ecHTML document, Unicode text, UTF-8 textChineseChina0.4723865877712032
                        RT_MANIFEST0x3705c2c0x56ASCII text, with CRLF line terminatorsEnglishUnited States1.0232558139534884
                        DLLImport
                        KERNEL32.dllGetCurrentProcess, GetCPInfo, GetOEMCP, SetErrorMode, GetFileAttributesA, HeapAlloc, HeapFree, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, HeapReAlloc, RaiseException, VirtualAlloc, RtlUnwind, GetCommandLineA, GetProcessHeap, GetStartupInfoA, ExitProcess, HeapSize, SetEndOfFile, VirtualFree, HeapDestroy, HeapCreate, GetStdHandle, SetHandleCount, GetFileType, GetConsoleCP, GetConsoleMode, GetACP, LCMapStringA, LCMapStringW, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, QueryPerformanceCounter, GetSystemTimeAsFileTime, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, SetStdHandle, GetStringTypeA, GetStringTypeW, GetUserDefaultLCID, EnumSystemLocalesA, IsValidLocale, IsValidCodePage, GetLocaleInfoW, FlushFileBuffers, SetFilePointer, ReadFile, GlobalFlags, WritePrivateProfileStringA, InterlockedIncrement, TlsFree, DeleteCriticalSection, LocalReAlloc, TlsSetValue, TlsAlloc, InitializeCriticalSection, GlobalHandle, GlobalReAlloc, EnterCriticalSection, TlsGetValue, LeaveCriticalSection, LocalAlloc, FreeResource, GlobalGetAtomNameA, GlobalFindAtomA, lstrcmpW, GetVersionExA, InterlockedDecrement, GetModuleFileNameW, GetCurrentProcessId, GlobalAddAtomA, GetCurrentThread, GetCurrentThreadId, ConvertDefaultLocale, GetModuleFileNameA, EnumResourceLanguagesA, GetLocaleInfoA, lstrcmpA, GlobalDeleteAtom, GetModuleHandleA, GlobalFree, GlobalAlloc, GlobalLock, GlobalUnlock, FormatMessageA, LocalFree, MulDiv, SetLastError, lstrcpyA, Sleep, GetThreadLocale, FreeLibrary, GetProcAddress, LoadLibraryA, GetTickCount, WriteFile, SetFileTime, LocalFileTimeToFileTime, CreateDirectoryA, CloseHandle, CreateFileA, SystemTimeToFileTime, lstrlenA, CreateFileW, CompareStringA, GetVersion, FindResourceA, LoadResource, LockResource, SizeofResource, GetLastError, WideCharToMultiByte, MultiByteToWideChar, InterlockedExchange
                        USER32.dllGetClassNameA, SetPropA, GetPropA, RemovePropA, IsWindow, SetFocus, GetWindowTextA, GetForegroundWindow, SetActiveWindow, GetDlgItem, GetTopWindow, DestroyWindow, GetMessagePos, MapWindowPoints, SetForegroundWindow, UpdateWindow, GetMenu, CreateWindowExA, GetClassInfoExA, GetClassInfoA, RegisterClassA, GetSysColor, AdjustWindowRectEx, CopyRect, PtInRect, GetDlgCtrlID, DefWindowProcA, SetWindowLongA, SetWindowPos, SystemParametersInfoA, GetWindowPlacement, GetWindowRect, GetWindow, UnhookWindowsHookEx, GetWindowThreadProcessId, GetWindowLongA, GetLastActivePopup, IsWindowEnabled, MessageBoxA, SetCursor, SetWindowsHookExA, CallNextHookEx, GetMessageA, TranslateMessage, DispatchMessageA, GetActiveWindow, IsWindowVisible, GetKeyState, PeekMessageA, GetCursorPos, ValidateRect, SetMenuItemBitmaps, GetMenuCheckMarkDimensions, LoadBitmapA, GetFocus, GetParent, ModifyMenuA, EnableMenuItem, CheckMenuItem, PostMessageA, PostQuitMessage, GetMenuState, GetMenuItemID, GetMenuItemCount, GetSubMenu, LoadCursorA, GetSysColorBrush, GetSystemMetrics, EnableWindow, LoadIconA, GetClientRect, IsIconic, SendMessageA, DrawIcon, wsprintfA, GetDesktopWindow, DestroyMenu, UnregisterClassA, CallWindowProcA, EndPaint, BeginPaint, ReleaseDC, GetDC, ClientToScreen, GrayStringA, DrawTextExA, DrawTextA, TabbedTextOutA, ShowWindow, SetWindowTextA, IsDialogMessageA, CreateDialogIndirectParamA, GetNextDlgTabItem, EndDialog, RegisterWindowMessageA, SendDlgItemMessageA, WinHelpA, GetCapture, GetClassLongA, GetMessageTime
                        GDI32.dllSetMapMode, DeleteObject, PtVisible, RectVisible, TextOutA, ExtTextOutA, Escape, SelectObject, SetViewportOrgEx, OffsetViewportOrgEx, SetViewportExtEx, ScaleViewportExtEx, SetWindowExtEx, ScaleWindowExtEx, DeleteDC, GetStockObject, RestoreDC, SaveDC, GetObjectA, SetBkColor, SetTextColor, GetClipBox, CreateBitmap, GetDeviceCaps
                        WINSPOOL.DRVClosePrinter, DocumentPropertiesA, OpenPrinterA
                        ADVAPI32.dllRegSetValueExA, RegCreateKeyExA, RegQueryValueA, RegEnumKeyA, RegDeleteKeyA, RegOpenKeyExA, RegQueryValueExA, RegOpenKeyA, RegCloseKey
                        SHLWAPI.dllPathFindFileNameA, PathFindExtensionA
                        OLEAUT32.dllVariantInit, VariantChangeType, VariantClear
                        Language of compilation systemCountry where language is spokenMap
                        ChineseChina
                        EnglishUnited States
                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                        2024-10-28T09:05:22.603593+01002016922ET MALWARE Backdoor family PCRat/Gh0st CnC traffic1192.168.2.449740137.220.137.8524818TCP
                        TimestampSource PortDest PortSource IPDest IP
                        Oct 28, 2024 09:05:22.158482075 CET4974024818192.168.2.4137.220.137.85
                        Oct 28, 2024 09:05:22.163866997 CET2481849740137.220.137.85192.168.2.4
                        Oct 28, 2024 09:05:22.163953066 CET4974024818192.168.2.4137.220.137.85
                        Oct 28, 2024 09:05:22.603593111 CET4974024818192.168.2.4137.220.137.85
                        Oct 28, 2024 09:05:22.610053062 CET2481849740137.220.137.85192.168.2.4
                        Oct 28, 2024 09:05:23.049129963 CET2481849740137.220.137.85192.168.2.4
                        Oct 28, 2024 09:05:23.095026016 CET4974024818192.168.2.4137.220.137.85
                        Oct 28, 2024 09:06:23.048217058 CET4974024818192.168.2.4137.220.137.85
                        Oct 28, 2024 09:06:23.053555012 CET2481849740137.220.137.85192.168.2.4
                        TimestampSource PortDest PortSource IPDest IP
                        Oct 28, 2024 09:05:22.119610071 CET5524553192.168.2.41.1.1.1
                        Oct 28, 2024 09:05:22.154263020 CET53552451.1.1.1192.168.2.4
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Oct 28, 2024 09:05:22.119610071 CET192.168.2.41.1.1.10x33feStandard query (0)24818.windows-updata.comA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Oct 28, 2024 09:05:22.154263020 CET1.1.1.1192.168.2.40x33feNo error (0)24818.windows-updata.com137.220.137.85A (IP address)IN (0x0001)false

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:04:05:03
                        Start date:28/10/2024
                        Path:C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\#Uc774#Uc9c0#Ud604_#Uc785#Uc0ac#Uc9c0#Uc6d0#Uc11c.hpw.scr.exe"
                        Imagebase:0x400000
                        File size:57'700'088 bytes
                        MD5 hash:697D9C4F0800F93A19B89BF923D4135A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:true

                        Target ID:1
                        Start time:04:05:08
                        Start date:28/10/2024
                        Path:C:\Windows\explorer.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\explorer.exe C:\Users\Public\Music\LI1L1K
                        Imagebase:0x7ff72b770000
                        File size:5'141'208 bytes
                        MD5 hash:662F4F92FDE3557E86D110526BB578D5
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:2
                        Start time:04:05:08
                        Start date:28/10/2024
                        Path:C:\Windows\explorer.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                        Imagebase:0x7ff72b770000
                        File size:5'141'208 bytes
                        MD5 hash:662F4F92FDE3557E86D110526BB578D5
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:false

                        Target ID:3
                        Start time:04:05:09
                        Start date:28/10/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                        Imagebase:0x7ff6bd680000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:4
                        Start time:04:05:16
                        Start date:28/10/2024
                        Path:C:\Windows\System32\OpenWith.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\OpenWith.exe -Embedding
                        Imagebase:0x7ff612240000
                        File size:123'984 bytes
                        MD5 hash:E4A834784FA08C17D47A1E72429C5109
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:8
                        Start time:04:05:20
                        Start date:28/10/2024
                        Path:C:\Users\Public\Documents\A9Q9P9\TASLogin.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\Public\Documents\A9Q9P9\TASLogin.exe"
                        Imagebase:0x7ff71e800000
                        File size:581'584 bytes
                        MD5 hash:E6A3CACCBD9CA82F38A14BD0D4428240
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Antivirus matches:
                        • Detection: 0%, ReversingLabs
                        Reputation:low
                        Has exited:true

                        Target ID:9
                        Start time:04:05:21
                        Start date:28/10/2024
                        Path:C:\Users\Public\Documents\A9Q9P9\TASLogin.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Users\Public\Documents\A9Q9P9\TASLogin.exe
                        Imagebase:0x400000
                        File size:581'584 bytes
                        MD5 hash:E6A3CACCBD9CA82F38A14BD0D4428240
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:Borland Delphi
                        Reputation:low
                        Has exited:false

                        Target ID:12
                        Start time:04:05:30
                        Start date:28/10/2024
                        Path:C:\Users\Public\Documents\A9Q9P9\TASLogin.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\Public\Documents\A9Q9P9\TASLogin.exe"
                        Imagebase:0x400000
                        File size:581'584 bytes
                        MD5 hash:E6A3CACCBD9CA82F38A14BD0D4428240
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:true

                        Target ID:13
                        Start time:04:05:31
                        Start date:28/10/2024
                        Path:C:\Users\Public\Documents\A9Q9P9\TASLogin.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Users\Public\Documents\A9Q9P9\TASLogin.exe
                        Imagebase:0x400000
                        File size:581'584 bytes
                        MD5 hash:E6A3CACCBD9CA82F38A14BD0D4428240
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:Borland Delphi
                        Reputation:low
                        Has exited:true

                        Target ID:14
                        Start time:04:05:38
                        Start date:28/10/2024
                        Path:C:\Users\Public\Documents\A9Q9P9\TASLogin.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\Public\Documents\A9Q9P9\TASLogin.exe"
                        Imagebase:0x400000
                        File size:581'584 bytes
                        MD5 hash:E6A3CACCBD9CA82F38A14BD0D4428240
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:true

                        Target ID:15
                        Start time:04:05:39
                        Start date:28/10/2024
                        Path:C:\Users\Public\Documents\A9Q9P9\TASLogin.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Users\Public\Documents\A9Q9P9\TASLogin.exe
                        Imagebase:0x400000
                        File size:581'584 bytes
                        MD5 hash:E6A3CACCBD9CA82F38A14BD0D4428240
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:Borland Delphi
                        Reputation:low
                        Has exited:true

                        Reset < >

                          Execution Graph

                          Execution Coverage:13.4%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:7.4%
                          Total number of Nodes:2000
                          Total number of Limit Nodes:34
                          execution_graph 15650 408f10 GetSystemInfo 15651 402ac0 15652 402d20 15651->15652 15653 402ad8 15651->15653 15655 402e38 15652->15655 15656 402ce4 15652->15656 15654 402aea 15653->15654 15667 402b75 Sleep 15653->15667 15659 402af9 15654->15659 15665 402bd8 15654->15665 15669 402bb9 Sleep 15654->15669 15657 402e41 15655->15657 15658 402868 VirtualAlloc 15655->15658 15660 402d3e 15656->15660 15663 402cfe Sleep 15656->15663 15661 402893 15658->15661 15664 4028a3 15658->15664 15670 4027a8 VirtualAlloc 15660->15670 15674 402d5c 15660->15674 15675 402820 15661->15675 15663->15660 15666 402d14 Sleep 15663->15666 15673 402be4 15665->15673 15680 4027a8 15665->15680 15666->15656 15667->15654 15668 402b8b Sleep 15667->15668 15668->15653 15669->15665 15672 402bcf Sleep 15669->15672 15670->15674 15672->15654 15676 402866 15675->15676 15677 402829 15675->15677 15676->15664 15677->15676 15678 402834 Sleep 15677->15678 15679 40284d Sleep 15677->15679 15678->15677 15679->15677 15684 40273c 15680->15684 15682 4027b0 VirtualAlloc 15683 4027c7 15682->15683 15683->15673 15685 4026dc 15684->15685 15685->15682 15686 43a870 15687 43a896 15686->15687 15710 43a7b4 CreateFileW 15687->15710 15689 43a89e 15709 43a96a 15689->15709 15714 40adb8 15689->15714 15693 43a8b1 15721 4063e8 15693->15721 15694 406060 12 API calls 15696 43a997 15694->15696 15699 43a8d3 15700 43a912 15699->15700 15702 40ad0c 12 API calls 15699->15702 15699->15709 15701 40ad0c 12 API calls 15700->15701 15700->15709 15705 43a931 15701->15705 15703 43a905 15702->15703 15736 4063a0 15703->15736 15706 40ad0c 12 API calls 15705->15706 15705->15709 15707 43a95d 15706->15707 15708 4063a0 12 API calls 15707->15708 15708->15709 15742 406060 15709->15742 15711 43a7e6 15710->15711 15713 43a83a 15710->15713 15711->15713 15746 4069a8 15711->15746 15713->15689 15715 40adc4 15714->15715 15716 40adcd 15714->15716 15833 406000 15715->15833 15719 40add4 lstrlenW 15716->15719 15718 40adcb 15718->15693 15720 4069a8 12 API calls 15719->15720 15720->15718 15723 4063ec 15721->15723 15722 406410 15725 40ad0c 15722->15725 15723->15722 15724 403f50 12 API calls 15723->15724 15724->15722 15726 40ad3c 15725->15726 15727 40ad80 15726->15727 15728 40ad51 15726->15728 15730 4063a0 12 API calls 15727->15730 15837 406bf0 15728->15837 15732 40ad77 15730->15732 15734 406000 12 API calls 15732->15734 15735 40ada6 15734->15735 15735->15699 15737 4063a4 15736->15737 15739 4063b4 15736->15739 15737->15739 15740 405f54 12 API calls 15737->15740 15738 4063e4 15738->15700 15739->15738 15741 403f50 12 API calls 15739->15741 15740->15739 15741->15738 15744 406066 15742->15744 15743 40608c 15743->15694 15744->15743 15745 403f50 12 API calls 15744->15745 15745->15744 15749 4069b5 15746->15749 15752 4069ff 15746->15752 15747 406024 12 API calls 15750 4069f0 15747->15750 15748 4069f3 15766 405f54 15748->15766 15749->15748 15753 4069cd 15749->15753 15750->15713 15752->15747 15757 403f68 15753->15757 15755 4069d5 15755->15750 15762 406024 15755->15762 15759 403f6e 15757->15759 15759->15755 15761 403f80 15759->15761 15771 404024 15759->15771 15761->15755 15763 40602a 15762->15763 15765 406045 15762->15765 15763->15765 15823 403f50 15763->15823 15765->15750 15767 405f8c 15766->15767 15768 405f58 15766->15768 15767->15752 15768->15767 15828 403f34 15768->15828 15770 405f67 15770->15752 15772 404036 15771->15772 15773 404049 15772->15773 15777 4090b0 15772->15777 15785 404018 15773->15785 15778 4090e5 TlsGetValue 15777->15778 15779 4090bf 15777->15779 15780 4090ca 15778->15780 15781 4090ef 15778->15781 15779->15773 15788 40906c 15780->15788 15781->15773 15784 4090de 15784->15773 15786 405e7c 12 API calls 15785->15786 15787 404023 15786->15787 15787->15755 15789 409072 15788->15789 15790 40908b 15789->15790 15797 4090a0 TlsGetValue 15789->15797 15798 405e88 15789->15798 15801 409058 LocalAlloc 15790->15801 15793 409092 15794 4090a2 TlsSetValue 15793->15794 15795 409096 15793->15795 15794->15797 15796 405e88 11 API calls 15795->15796 15796->15797 15797->15784 15802 405e7c 15798->15802 15801->15793 15805 405d50 15802->15805 15806 405d67 15805->15806 15807 405d71 15805->15807 15815 405cb8 15806->15815 15808 405d81 GetCurrentThreadId 15807->15808 15811 405d8e 15807->15811 15808->15811 15810 403fd8 9 API calls 15810->15811 15811->15810 15812 405e21 FreeLibrary 15811->15812 15813 405e49 ExitProcess 15811->15813 15812->15811 15816 405cc2 GetStdHandle WriteFile 15815->15816 15817 405d1f 15815->15817 15821 406654 15816->15821 15819 405d28 MessageBoxA 15817->15819 15820 405d3b 15817->15820 15819->15820 15820->15807 15822 405d0f GetStdHandle WriteFile 15821->15822 15822->15807 15824 403f54 15823->15824 15825 403f5e 15823->15825 15824->15825 15826 404024 12 API calls 15824->15826 15825->15765 15827 404083 15826->15827 15827->15765 15832 403f38 15828->15832 15829 404024 12 API calls 15830 404083 15829->15830 15830->15770 15831 403f42 15831->15770 15832->15770 15832->15829 15832->15831 15834 406021 15833->15834 15835 406006 15833->15835 15834->15718 15835->15834 15836 403f50 12 API calls 15835->15836 15836->15834 15838 406bfb 15837->15838 15846 406158 15838->15846 15841 406c38 15851 4064b8 15841->15851 15843 406c8e 15843->15732 15844 406c48 15844->15843 15845 4069a8 12 API calls 15844->15845 15845->15843 15847 405f54 12 API calls 15846->15847 15848 406168 15847->15848 15849 406024 12 API calls 15848->15849 15850 406182 15849->15850 15850->15841 15852 4064be 15851->15852 15854 4064f3 15851->15854 15853 405f54 12 API calls 15852->15853 15852->15854 15855 4064cf 15853->15855 15854->15844 15855->15854 15856 403f50 12 API calls 15855->15856 15856->15854 15857 438190 15858 438198 15857->15858 15858->15858 15882 4042f4 QueryPerformanceCounter 15858->15882 15862 4381b8 15863 42a3ec EnterCriticalSection MapViewOfFile LeaveCriticalSection 15862->15863 15865 4381ef lstrlenW 15862->15865 15867 4063e8 12 API calls 15862->15867 15868 4383d5 Sleep 15862->15868 15874 40adb8 13 API calls 15862->15874 15875 43821a 15862->15875 15880 426408 setsockopt 15862->15880 15885 438148 15862->15885 15901 4265f0 15862->15901 15916 4264a8 15862->15916 15919 426448 setsockopt 15862->15919 15920 43b588 15862->15920 15996 437f88 15862->15996 16001 42674c recv 15862->16001 16008 4264f4 setsockopt WSAIoctl 15862->16008 16009 42b2a8 15862->16009 16042 42671c 15862->16042 15863->15862 15865->15862 15866 438417 Sleep 15866->15862 15867->15862 15868->15862 15873 406bf0 12 API calls 15873->15875 15874->15862 15875->15862 15875->15866 15875->15873 16022 40bc54 15875->16022 16045 42a3ec 15875->16045 15880->15862 15883 404301 15882->15883 15884 40430c GetTickCount 15882->15884 15883->15862 15884->15862 15886 438150 15885->15886 16050 42eba0 15886->16050 15888 438158 16054 42ebbc 15888->16054 15890 438160 16058 42dfa0 15890->16058 15898 438177 16082 433200 15898->16082 15900 43817f 15900->15862 16112 4265cc 15901->16112 15904 4266d2 16115 406048 15904->16115 15905 42662c htons 15909 42664c 15905->15909 15908 406024 12 API calls 15910 426708 15908->15910 15911 426664 gethostbyname 15909->15911 15910->15862 15911->15904 15912 42666f 15911->15912 15912->15904 15913 426686 connect 15912->15913 15914 4266b9 WSAGetLastError 15912->15914 15913->15904 15913->15912 15914->15904 15915 4266c6 Sleep 15914->15915 15915->15904 15915->15913 15917 4264ad setsockopt 15916->15917 15917->15862 15919->15862 15921 43b590 15920->15921 16118 427bf0 15921->16118 15923 43b5e4 16122 430478 15923->16122 15924 43b5d3 15924->15923 15925 4063a0 12 API calls 15924->15925 15925->15923 15928 43b608 16129 42817c 15928->16129 15929 43b62e 15931 427bf0 13 API calls 15929->15931 15933 43b651 15931->15933 15935 4063a0 12 API calls 15933->15935 15934 4063a0 12 API calls 15936 43b62c 15934->15936 15935->15936 15937 427bf0 13 API calls 15936->15937 15938 43b681 15937->15938 15939 43b692 15938->15939 15940 4063a0 12 API calls 15938->15940 15941 427bf0 13 API calls 15939->15941 15940->15939 15942 43b6b2 15941->15942 15943 43b6c3 15942->15943 15944 4063a0 12 API calls 15942->15944 16136 43d048 GetVolumeInformationW 15943->16136 15944->15943 15946 43b6d0 16137 40aca4 15946->16137 15951 43b73a 15952 40aca4 13 API calls 15951->15952 15953 43b74e 15952->15953 15954 40aca4 13 API calls 15953->15954 15955 43b770 15954->15955 16164 40683c 15955->16164 15957 43b7a0 16167 43bdd0 15957->16167 15961 43b808 15962 40aca4 13 API calls 15961->15962 15963 43b81c 15962->15963 16226 43c2d4 15963->16226 15965 43b837 16247 43c570 15965->16247 15969 43b873 15970 40aca4 13 API calls 15969->15970 15971 43b8a3 15970->15971 16272 43b35c GetForegroundWindow GetWindowTextW 15971->16272 15973 43b8b9 16274 43b4c8 15973->16274 15975 43b8d1 15976 40683c 12 API calls 15975->15976 15977 43b905 15976->15977 15978 40683c 12 API calls 15977->15978 15979 43b924 15978->15979 15980 40683c 12 API calls 15979->15980 15981 43b943 15980->15981 15982 40683c 12 API calls 15981->15982 15983 43b962 15982->15983 15984 40683c 12 API calls 15983->15984 15985 43b981 15984->15985 15986 40683c 12 API calls 15985->15986 15987 43b9a0 15986->15987 15988 40683c 12 API calls 15987->15988 15989 43b9bf 15988->15989 16285 406b08 15989->16285 16361 4060e4 15996->16361 16000 437fdc LeaveCriticalSection 16000->15862 16002 426765 WSAGetLastError 16001->16002 16003 42677d 16001->16003 16004 426770 16002->16004 16005 42677b 16003->16005 16006 42671c 2 API calls 16003->16006 16004->16005 16007 42671c 2 API calls 16004->16007 16005->15862 16006->16005 16007->16005 16008->15862 16010 42b2b1 16009->16010 16010->16010 16389 42b0e8 16010->16389 16012 42b36d 16013 42b0e8 24 API calls 16012->16013 16021 42b403 16012->16021 16016 42b3a3 16013->16016 16014 42b2e7 16014->16012 16015 42b0e8 24 API calls 16014->16015 16014->16021 16015->16012 16017 42b3e8 16016->16017 16019 42b409 16016->16019 16016->16021 16018 406000 12 API calls 16017->16018 16018->16021 16020 4069a8 12 API calls 16019->16020 16019->16021 16020->16021 16021->15862 16023 406000 12 API calls 16022->16023 16024 40bc7d InternetOpenW 16023->16024 16025 40bc9a InternetOpenUrlW 16024->16025 16026 40bdbc 16024->16026 16027 40bccb HttpQueryInfoW 16025->16027 16028 40bd9d InternetCloseHandle 16025->16028 16032 406024 12 API calls 16026->16032 16029 40bd04 16027->16029 16030 40bd7e InternetCloseHandle 16027->16030 16028->15875 16412 40b634 VirtualAlloc 16029->16412 16030->15875 16035 40bdd1 16032->16035 16037 406048 SysFreeString 16035->16037 16036 40bd0d InternetReadFile 16039 40bd45 16036->16039 16038 40bdd9 16037->16038 16038->15875 16413 40b644 VirtualFree 16039->16413 16041 40bd76 16041->15875 16043 426747 16042->16043 16044 426725 shutdown closesocket 16042->16044 16043->15862 16044->16043 16046 42a400 EnterCriticalSection MapViewOfFile 16045->16046 16047 42a435 16045->16047 16046->16047 16048 42a43c 16046->16048 16047->15875 16049 42a45c LeaveCriticalSection 16048->16049 16049->15875 16051 42eba8 16050->16051 16053 42ebaf 16050->16053 16086 42f180 16051->16086 16053->15888 16055 42ebc4 16054->16055 16057 42ebcb 16054->16057 16090 42f948 16055->16090 16057->15890 16059 42dff4 16058->16059 16060 42dfa9 Sleep 16058->16060 16064 42b890 16059->16064 16061 42dfc4 16060->16061 16061->16059 16062 42671c 2 API calls 16061->16062 16063 42dfed 16062->16063 16063->16059 16094 42b8c8 16064->16094 16069 42b8a3 Sleep 16071 42b8be 16069->16071 16070 42b8c5 16072 42dba8 16070->16072 16071->16070 16100 42dbdc 16072->16100 16075 42dbb6 Sleep 16077 42dbd1 16075->16077 16076 42dbd8 16078 431d48 16076->16078 16077->16076 16079 431d50 16078->16079 16081 431d57 16078->16081 16104 432b38 16079->16104 16081->15898 16083 433208 16082->16083 16085 43320f 16082->16085 16108 433314 16083->16108 16085->15900 16087 42f189 16086->16087 16089 42f191 16086->16089 16088 42671c 2 API calls 16087->16088 16088->16089 16089->16053 16091 42f954 16090->16091 16092 42f963 16090->16092 16091->16092 16093 42671c 2 API calls 16091->16093 16092->16057 16093->16092 16095 42b8d1 16094->16095 16096 42b895 16094->16096 16095->16096 16097 42671c 2 API calls 16095->16097 16098 42be9c UnregisterClassW 16096->16098 16097->16096 16099 42b89a 16098->16099 16099->16069 16099->16070 16101 42dbe5 16100->16101 16102 42dbad 16100->16102 16101->16102 16103 42671c 2 API calls 16101->16103 16102->16075 16102->16076 16103->16102 16105 432b45 16104->16105 16107 432b4a 16104->16107 16106 42671c 2 API calls 16105->16106 16106->16107 16107->16081 16109 433322 16108->16109 16111 433327 16108->16111 16110 42671c 2 API calls 16109->16110 16110->16111 16111->16085 16113 4265e4 16112->16113 16114 4265d5 socket 16112->16114 16113->15904 16113->15905 16114->16113 16116 40605c 16115->16116 16117 40604e SysFreeString 16115->16117 16116->15908 16117->16116 16119 406000 12 API calls 16118->16119 16120 427c0d RegOpenKeyW 16119->16120 16121 427c20 16120->16121 16121->15924 16123 406000 12 API calls 16122->16123 16124 4304a2 16123->16124 16125 4304f1 16124->16125 16127 406b08 12 API calls 16124->16127 16126 406000 12 API calls 16125->16126 16128 430509 16126->16128 16127->16124 16128->15928 16128->15929 16130 4063a0 12 API calls 16129->16130 16131 428191 16130->16131 16132 4281a8 GetProcessTimes 16131->16132 16133 4281d3 16131->16133 16132->16133 16134 4281ca 16132->16134 16133->15934 16294 40bae8 FileTimeToLocalFileTime 16134->16294 16136->15946 16138 40acc4 16137->16138 16139 40acf3 GetUserNameW 16138->16139 16140 40acdc lstrlenW 16138->16140 16143 40b0ec 16139->16143 16140->16139 16141 40ace5 16140->16141 16315 406a80 16141->16315 16144 40b0ef 16143->16144 16145 406000 12 API calls 16144->16145 16146 40b10f VirtualAlloc 16145->16146 16147 40b135 GetAdaptersInfo 16146->16147 16148 40b218 16146->16148 16149 40b1d1 16147->16149 16162 40b158 16147->16162 16150 406000 12 API calls 16148->16150 16151 40b1f3 VirtualFree 16149->16151 16155 40b1de lstrlenW 16149->16155 16152 40b22d 16150->16152 16151->15951 16154 406024 12 API calls 16152->16154 16156 40b235 16154->16156 16157 406bf0 12 API calls 16155->16157 16158 406048 SysFreeString 16156->16158 16157->16151 16159 40b23d 16158->16159 16160 406000 12 API calls 16159->16160 16161 40b245 16160->16161 16161->15951 16162->16149 16163 406b08 12 API calls 16162->16163 16163->16162 16165 406158 12 API calls 16164->16165 16166 406849 16165->16166 16166->15957 16168 406000 12 API calls 16167->16168 16170 43be00 16168->16170 16169 43bfc4 16173 43bfdb 16169->16173 16174 43bfcd 16169->16174 16172 43be3f 16170->16172 16176 43be50 16170->16176 16180 43be4b 16170->16180 16171 4063a0 12 API calls 16171->16169 16177 4063a0 12 API calls 16172->16177 16175 406a28 12 API calls 16173->16175 16338 406a28 16174->16338 16179 43bfd9 16175->16179 16181 43be55 16176->16181 16182 43be9d 16176->16182 16177->16180 16185 406060 12 API calls 16179->16185 16180->16169 16180->16171 16183 43be60 16181->16183 16184 43be6a 16181->16184 16182->16180 16190 43beb3 16182->16190 16191 43bec0 16182->16191 16186 43be62 16183->16186 16187 43be7b 16183->16187 16189 4063a0 12 API calls 16184->16189 16188 43b7f8 16185->16188 16186->16180 16201 4063a0 12 API calls 16186->16201 16194 4063a0 12 API calls 16187->16194 16224 43c2ac GlobalMemoryStatusEx 16188->16224 16189->16180 16195 43beb5 16190->16195 16196 43bee8 16190->16196 16192 43bed7 16191->16192 16193 43bec6 16191->16193 16200 4063a0 12 API calls 16192->16200 16199 4063a0 12 API calls 16193->16199 16194->16180 16197 43bf10 16195->16197 16198 43beb8 16195->16198 16202 43beff 16196->16202 16203 43beee 16196->16203 16204 43bf27 16197->16204 16205 43bf16 16197->16205 16206 43bf35 16198->16206 16207 43bebb 16198->16207 16199->16180 16200->16180 16201->16180 16209 4063a0 12 API calls 16202->16209 16208 4063a0 12 API calls 16203->16208 16211 4063a0 12 API calls 16204->16211 16210 4063a0 12 API calls 16205->16210 16212 43bf3b 16206->16212 16213 43bf49 16206->16213 16216 43bf84 16207->16216 16217 43bf5d 16207->16217 16208->16180 16209->16180 16210->16180 16211->16180 16214 4063a0 12 API calls 16212->16214 16215 4063a0 12 API calls 16213->16215 16214->16180 16215->16180 16219 40aca4 13 API calls 16216->16219 16218 40aca4 13 API calls 16217->16218 16220 43bf70 16218->16220 16221 43bf9c 16219->16221 16222 406a80 12 API calls 16220->16222 16223 406b08 12 API calls 16221->16223 16222->16180 16223->16180 16225 43c2d0 16224->16225 16225->15961 16227 406000 12 API calls 16226->16227 16228 43c301 RegOpenKeyW 16227->16228 16229 43c322 RegEnumKeyW 16228->16229 16230 43c44e 16228->16230 16233 43c357 16229->16233 16232 406060 12 API calls 16230->16232 16234 43c468 16232->16234 16235 406a80 12 API calls 16233->16235 16234->15965 16236 43c37b 16235->16236 16237 43c383 RegOpenKeyW 16236->16237 16238 43c39a RegQueryValueExW 16237->16238 16239 43c42c RegCloseKey 16237->16239 16240 43c40a 16238->16240 16241 43c3ca 16238->16241 16239->15965 16240->15965 16242 40aca4 13 API calls 16241->16242 16243 43c3db 16242->16243 16244 40aca4 13 API calls 16243->16244 16245 43c3f6 16244->16245 16246 406b08 12 API calls 16245->16246 16246->16240 16248 43c595 16247->16248 16249 40aca4 13 API calls 16248->16249 16250 43c5a2 16249->16250 16251 40aca4 13 API calls 16250->16251 16252 43c5c2 16251->16252 16253 40aca4 13 API calls 16252->16253 16254 43c5e2 16253->16254 16255 406b08 12 API calls 16254->16255 16256 43c5f6 16255->16256 16257 406060 12 API calls 16256->16257 16258 43b84d 16257->16258 16259 43c658 InternetGetConnectedState 16258->16259 16260 43c677 16259->16260 16261 43c686 16259->16261 16262 4063a0 12 API calls 16260->16262 16263 43c691 16261->16263 16264 43c69f 16261->16264 16265 43c683 16262->16265 16266 4063a0 12 API calls 16263->16266 16267 43c6aa 16264->16267 16268 43c6b8 16264->16268 16265->15969 16269 43c69d 16266->16269 16270 4063a0 12 API calls 16267->16270 16271 4063a0 12 API calls 16268->16271 16269->15969 16270->16269 16271->16269 16273 43b38e 16272->16273 16273->15973 16275 406000 12 API calls 16274->16275 16276 43b4ec 16275->16276 16277 4063e8 12 API calls 16276->16277 16283 43b4f6 16277->16283 16278 43b54a 16279 406060 12 API calls 16278->16279 16281 43b564 16279->16281 16280 40ad0c 12 API calls 16280->16283 16281->15975 16283->16278 16283->16280 16284 406b08 12 API calls 16283->16284 16352 42847c 16283->16352 16284->16283 16287 406b1e 16285->16287 16286 406ba3 16286->16286 16287->16286 16288 406b69 16287->16288 16289 406b4b 16287->16289 16290 405f54 12 API calls 16288->16290 16291 4069a8 12 API calls 16289->16291 16292 406b59 16290->16292 16291->16292 16292->16286 16293 4063a0 12 API calls 16292->16293 16293->16286 16295 40bb32 FileTimeToSystemTime 16294->16295 16296 40bbed 16294->16296 16295->16296 16297 40bb48 16295->16297 16298 4063a0 12 API calls 16296->16298 16299 40aca4 13 API calls 16297->16299 16301 40bbeb 16298->16301 16300 40bb5a 16299->16300 16302 40aca4 13 API calls 16300->16302 16303 406060 12 API calls 16301->16303 16304 40bb74 16302->16304 16305 40bc13 16303->16305 16306 40aca4 13 API calls 16304->16306 16305->16133 16307 40bb8e 16306->16307 16308 40aca4 13 API calls 16307->16308 16309 40bba8 16308->16309 16310 40aca4 13 API calls 16309->16310 16311 40bbc2 16310->16311 16312 40aca4 13 API calls 16311->16312 16313 40bbdc 16312->16313 16314 406b08 12 API calls 16313->16314 16314->16301 16316 406a84 16315->16316 16323 406a28 16315->16323 16317 4063a0 16316->16317 16319 406aa2 16316->16319 16320 406a94 16316->16320 16316->16323 16325 405f54 12 API calls 16317->16325 16326 4063b4 16317->16326 16318 4063e4 16318->16139 16321 406b00 16319->16321 16327 405f54 12 API calls 16319->16327 16324 4063a0 12 API calls 16320->16324 16321->16321 16322 406a77 16322->16139 16323->16317 16323->16322 16328 406a36 16323->16328 16324->16323 16325->16326 16326->16318 16329 403f50 12 API calls 16326->16329 16335 406abc 16327->16335 16328->16322 16330 406a51 16328->16330 16331 406a6c 16328->16331 16329->16318 16332 4069a8 12 API calls 16330->16332 16333 4069a8 12 API calls 16331->16333 16334 406a56 16332->16334 16333->16334 16334->16139 16336 4063a0 12 API calls 16335->16336 16337 406aee 16336->16337 16337->16139 16339 406a77 16338->16339 16340 406a2c 16338->16340 16339->16179 16341 4063a0 16340->16341 16342 406a36 16340->16342 16343 4063b4 16341->16343 16349 405f54 12 API calls 16341->16349 16342->16339 16345 406a51 16342->16345 16346 406a6c 16342->16346 16344 4063e4 16343->16344 16350 403f50 12 API calls 16343->16350 16344->16179 16347 4069a8 12 API calls 16345->16347 16348 4069a8 12 API calls 16346->16348 16351 406a56 16347->16351 16348->16351 16349->16343 16350->16344 16351->16179 16355 4284b3 16352->16355 16353 4284dc 16354 406000 12 API calls 16353->16354 16356 428509 16354->16356 16355->16353 16358 40b918 16355->16358 16356->16283 16359 40b927 16358->16359 16360 40b931 CompareStringW 16359->16360 16360->16355 16362 4060e8 EnterCriticalSection 16361->16362 16363 42b474 16362->16363 16364 42b48d 16363->16364 16365 42b4ad lstrlenW 16364->16365 16366 42b529 16365->16366 16368 42b4bb 16365->16368 16378 40a854 GlobalAlloc 16366->16378 16379 426840 16368->16379 16369 42b551 16374 426840 4 API calls 16369->16374 16372 406000 12 API calls 16373 42b657 16372->16373 16373->16000 16375 42b60b 16374->16375 16388 40a864 GlobalFree 16375->16388 16377 42b63a 16377->16000 16378->16369 16380 426876 16379->16380 16381 426884 16380->16381 16382 426850 send 16380->16382 16384 42688a 16380->16384 16386 42687a 16380->16386 16381->16372 16382->16380 16383 42686b WSAGetLastError 16382->16383 16383->16380 16385 42671c 2 API calls 16384->16385 16385->16381 16387 42671c 2 API calls 16386->16387 16387->16381 16388->16377 16399 42b103 16389->16399 16390 42b10e recv 16391 42b12d 16390->16391 16390->16399 16392 42671c 2 API calls 16391->16392 16403 42b134 16392->16403 16393 42b15a 16394 42671c 2 API calls 16393->16394 16394->16403 16396 42b1cd 16398 42671c 2 API calls 16396->16398 16398->16403 16399->16390 16399->16393 16399->16396 16400 42b234 16399->16400 16402 42b242 16399->16402 16399->16403 16405 426408 setsockopt 16399->16405 16406 42b66c 16399->16406 16411 426488 getsockopt 16399->16411 16401 42671c 2 API calls 16400->16401 16401->16403 16404 42671c 2 API calls 16402->16404 16403->16014 16404->16403 16405->16399 16407 4060e4 16406->16407 16408 42b684 EnterCriticalSection 16407->16408 16409 42b474 19 API calls 16408->16409 16410 42b6be LeaveCriticalSection 16409->16410 16410->16399 16411->16399 16412->16036 16413->16041 16414 43d9b0 16415 43d9f2 16414->16415 16416 43d9d0 16414->16416 16436 40a748 16415->16436 16417 43d9ed 16416->16417 16423 43d9e2 16416->16423 16424 43db1c 16416->16424 16420 43db3d DefWindowProcW 16417->16420 16419 43da1e 16421 40a748 CreateWindowExW 16419->16421 16422 406000 12 API calls 16420->16422 16425 43da4f 16421->16425 16426 43db69 16422->16426 16423->16417 16423->16420 16427 43db15 16423->16427 16450 43dd80 UnregisterClassW 16424->16450 16429 4063e8 12 API calls 16425->16429 16440 43d87c 16427->16440 16430 43da67 16429->16430 16433 43da7d SetWindowTextW 16430->16433 16434 406000 12 API calls 16433->16434 16435 43da9c 16434->16435 16452 404348 16436->16452 16438 40a75b CreateWindowExW 16439 40a795 16438->16439 16439->16419 16441 43d885 16440->16441 16441->16441 16442 43d88f SendMessageW 16441->16442 16443 43d8d1 16442->16443 16444 43d8d6 SendMessageW 16442->16444 16443->16444 16448 43d90b 16444->16448 16445 43d96b SetFocus 16446 406060 12 API calls 16445->16446 16447 43d993 16446->16447 16447->16420 16448->16445 16453 43ddc4 16448->16453 16451 43dd9f 16450->16451 16451->16417 16452->16438 16454 43ddd8 16453->16454 16455 43df3d 16453->16455 16456 43ddf3 16454->16456 16457 43de19 ShowWindow 16454->16457 16455->16445 16456->16455 16458 43de51 SetForegroundWindow SetForegroundWindow SetFocus 16456->16458 16457->16456 16459 43de6e SendMessageW 16458->16459 16459->16459 16461 43de80 16459->16461 16460 43dec7 16460->16455 16462 43decd Sleep 16460->16462 16461->16460 16463 43dea1 SendMessageW 16461->16463 16464 43deb4 SendMessageW 16461->16464 16465 43deee SetForegroundWindow SetFocus SendMessageW 16462->16465 16463->16461 16464->16461 16466 43df12 16465->16466 16466->16455 16467 43df22 SendMessageW 16466->16467 16467->16455 16467->16467 16468 407744 16469 407754 GetModuleFileNameW 16468->16469 16470 407770 16468->16470 16472 4089bc GetModuleFileNameW 16469->16472 16473 408a0a 16472->16473 16482 408898 16473->16482 16475 408a36 16476 408a50 16475->16476 16478 408a48 LoadLibraryExW 16475->16478 16477 406060 12 API calls 16476->16477 16479 408a6d 16477->16479 16478->16476 16480 406000 12 API calls 16479->16480 16481 408a75 16480->16481 16481->16470 16483 4088b9 16482->16483 16484 406000 12 API calls 16483->16484 16485 4088d6 16484->16485 16486 4063e8 12 API calls 16485->16486 16499 408941 16485->16499 16489 4088eb 16486->16489 16487 406060 12 API calls 16488 4089ae 16487->16488 16488->16475 16491 406bf0 12 API calls 16489->16491 16493 40891c 16489->16493 16491->16493 16508 4085d4 16493->16508 16494 408943 GetUserDefaultUILanguage 16528 407f84 EnterCriticalSection 16494->16528 16495 408934 16516 408700 16495->16516 16499->16487 16500 408700 14 API calls 16501 40895d 16500->16501 16502 408985 16501->16502 16503 40896b GetSystemDefaultUILanguage 16501->16503 16502->16499 16553 4087cc 16502->16553 16504 407f84 29 API calls 16503->16504 16506 408978 16504->16506 16507 408700 14 API calls 16506->16507 16507->16502 16509 4085f6 16508->16509 16513 408608 16508->16513 16571 4082b8 16509->16571 16511 408600 16597 408638 16511->16597 16514 406000 12 API calls 16513->16514 16515 40862a 16514->16515 16515->16494 16515->16495 16517 40871e 16516->16517 16518 406000 12 API calls 16517->16518 16526 40873b 16518->16526 16519 408799 16520 406000 12 API calls 16519->16520 16521 4087a0 16520->16521 16522 406060 12 API calls 16521->16522 16523 4087ba 16522->16523 16523->16499 16524 406bf0 12 API calls 16524->16526 16525 406a80 12 API calls 16525->16526 16526->16519 16526->16521 16526->16524 16526->16525 16620 408694 16526->16620 16529 407fd0 LeaveCriticalSection 16528->16529 16530 407fb0 16528->16530 16531 406000 12 API calls 16529->16531 16532 407fc1 LeaveCriticalSection 16530->16532 16533 407fe1 IsValidLocale 16531->16533 16534 408072 16532->16534 16535 407ff0 16533->16535 16536 40803f EnterCriticalSection 16533->16536 16541 406000 12 API calls 16534->16541 16537 408004 16535->16537 16538 407ff9 16535->16538 16543 408057 16536->16543 16646 407c6c 16537->16646 16627 407e68 GetThreadUILanguage 16538->16627 16545 408087 16541->16545 16547 408068 LeaveCriticalSection 16543->16547 16545->16500 16546 408017 16548 408028 GetSystemDefaultUILanguage 16546->16548 16549 406a28 12 API calls 16546->16549 16547->16534 16550 407c6c 15 API calls 16548->16550 16549->16548 16551 408035 16550->16551 16552 406a28 12 API calls 16551->16552 16552->16536 16554 4060e4 16553->16554 16555 4087e8 GetUserDefaultUILanguage GetLocaleInfoW 16554->16555 16556 40881c 16555->16556 16557 406a80 12 API calls 16556->16557 16558 408829 16557->16558 16559 408694 14 API calls 16558->16559 16561 408830 16559->16561 16560 408869 16562 406060 12 API calls 16560->16562 16561->16560 16563 406a80 12 API calls 16561->16563 16564 408883 16562->16564 16565 408857 16563->16565 16566 406000 12 API calls 16564->16566 16567 408694 14 API calls 16565->16567 16568 40888b 16566->16568 16569 40885e 16567->16569 16568->16499 16569->16560 16570 406000 12 API calls 16569->16570 16570->16560 16572 4082cf 16571->16572 16573 4082e3 GetModuleFileNameW 16572->16573 16574 4082f8 16572->16574 16573->16574 16575 408320 RegOpenKeyExW 16574->16575 16576 4084c7 16574->16576 16577 4083e1 16575->16577 16578 408347 RegOpenKeyExW 16575->16578 16580 406000 12 API calls 16576->16580 16604 4080c8 GetModuleHandleW 16577->16604 16578->16577 16581 408365 RegOpenKeyExW 16578->16581 16583 4084dc 16580->16583 16581->16577 16584 408383 RegOpenKeyExW 16581->16584 16582 4083ff RegQueryValueExW 16586 408450 RegQueryValueExW 16582->16586 16587 40841d 16582->16587 16583->16511 16584->16577 16585 4083a1 RegOpenKeyExW 16584->16585 16585->16577 16588 4083bf RegOpenKeyExW 16585->16588 16590 40844e 16586->16590 16591 40846c 16586->16591 16589 403f34 12 API calls 16587->16589 16588->16576 16588->16577 16592 408425 RegQueryValueExW 16589->16592 16594 4084b6 RegCloseKey 16590->16594 16596 403f50 12 API calls 16590->16596 16593 403f34 12 API calls 16591->16593 16592->16590 16595 408474 RegQueryValueExW 16593->16595 16594->16511 16595->16590 16596->16594 16598 408645 16597->16598 16599 40864f 16597->16599 16600 403f50 12 API calls 16598->16600 16601 408688 16599->16601 16602 403f34 12 API calls 16599->16602 16600->16599 16601->16513 16603 40866a 16602->16603 16603->16513 16605 4080f0 GetProcAddress 16604->16605 16606 408101 16604->16606 16605->16606 16608 408117 16606->16608 16614 408163 16606->16614 16616 4080a4 16606->16616 16608->16582 16610 4080a4 CharNextW 16610->16614 16611 4080a4 CharNextW 16611->16614 16612 4081e8 FindFirstFileW 16612->16608 16613 408204 FindClose lstrlenW 16612->16613 16613->16608 16613->16614 16614->16608 16614->16611 16614->16612 16615 408252 lstrlenW 16614->16615 16615->16614 16617 4080b2 16616->16617 16618 4080c0 16617->16618 16619 4080aa CharNextW 16617->16619 16618->16608 16618->16610 16619->16617 16621 4086a9 16620->16621 16622 4086c6 FindFirstFileW 16621->16622 16623 4086d6 FindClose 16622->16623 16624 4086dc 16622->16624 16623->16624 16625 406000 12 API calls 16624->16625 16626 4086f1 16625->16626 16626->16526 16628 407e84 16627->16628 16629 407edd 16627->16629 16658 407e24 GetThreadPreferredUILanguages 16628->16658 16630 407e24 14 API calls 16629->16630 16638 407ee5 16630->16638 16633 407f26 16634 407f7c 16633->16634 16635 407f2c SetThreadPreferredUILanguages 16633->16635 16634->16536 16637 407e24 14 API calls 16635->16637 16639 407f42 16637->16639 16638->16633 16640 403f50 12 API calls 16638->16640 16641 407f5d SetThreadPreferredUILanguages 16639->16641 16642 407f6d 16639->16642 16640->16633 16641->16642 16643 403f50 12 API calls 16642->16643 16644 407f74 16643->16644 16645 403f50 12 API calls 16644->16645 16645->16634 16647 406000 12 API calls 16646->16647 16652 407ca7 16647->16652 16648 407cfd 16649 407d10 IsValidLocale 16648->16649 16650 407db3 16648->16650 16649->16650 16651 407d23 GetLocaleInfoW GetLocaleInfoW 16649->16651 16653 406060 12 API calls 16650->16653 16656 407d5e 16651->16656 16652->16648 16663 407b8c 16652->16663 16654 407dd0 GetSystemDefaultUILanguage 16653->16654 16654->16536 16654->16546 16657 406b08 12 API calls 16656->16657 16657->16650 16659 407e45 16658->16659 16660 407e5e SetThreadPreferredUILanguages 16658->16660 16661 403f34 12 API calls 16659->16661 16660->16629 16662 407e4e GetThreadPreferredUILanguages 16661->16662 16662->16660 16664 407bb2 16663->16664 16665 4063e8 12 API calls 16664->16665 16666 407c34 16664->16666 16667 407bde 16665->16667 16669 406060 12 API calls 16666->16669 16668 406000 12 API calls 16667->16668 16674 407be5 16668->16674 16670 407c4e 16669->16670 16670->16648 16671 406b08 12 API calls 16671->16674 16672 4063e8 12 API calls 16672->16674 16674->16666 16674->16671 16674->16672 16675 406bf0 12 API calls 16674->16675 16676 407b20 16674->16676 16675->16674 16677 407b30 16676->16677 16678 406000 12 API calls 16677->16678 16679 407b7b 16678->16679 16679->16674 16680 4433fc 16681 443404 16680->16681 16681->16681 16688 4090fc GetModuleHandleW 16681->16688 16683 443417 16692 43f770 16683->16692 16689 409137 16688->16689 16870 405a8c 16689->16870 16693 43f778 16692->16693 16693->16693 17349 425f00 16693->17349 16697 43f7a5 17425 40bde8 16697->17425 16701 43f7af 17962 40b654 GetModuleHandleW 16701->17962 16705 43f7cd 16706 4063a0 12 API calls 16705->16706 16707 43f7db 16706->16707 17981 437530 16707->17981 16710 43f803 18102 43f5a0 16710->18102 16711 43f7e4 GetForegroundWindow 18201 40b5e8 16711->18201 16714 43f7fc 16714->16710 16716 43f811 16718 406a80 12 API calls 16716->16718 16719 43f823 16718->16719 16720 406a80 12 API calls 16719->16720 16721 43f835 16720->16721 16722 406a80 12 API calls 16721->16722 16723 43f847 16722->16723 16724 406a80 12 API calls 16723->16724 16725 43f859 16724->16725 16726 406a80 12 API calls 16725->16726 16727 43f86b 16726->16727 16728 406a80 12 API calls 16727->16728 16729 43f87d 16728->16729 18110 40b948 GetEnvironmentVariableW GetLongPathNameW 16729->18110 16731 43f88d 16732 406a80 12 API calls 16731->16732 16733 43f8a0 16732->16733 16734 40b7c0 GetModuleFileNameW 16733->16734 16735 43f8ab 16734->16735 16736 4063a0 12 API calls 16735->16736 16737 43f8b9 16736->16737 18112 43f440 16737->18112 16871 405ac4 16870->16871 16874 405a20 16871->16874 16875 405a68 16874->16875 16876 405a30 16874->16876 16875->16683 16876->16875 16878 443318 16876->16878 16879 4433a0 16878->16879 16880 443332 16878->16880 16879->16876 16894 405b8c 16880->16894 16882 44333c 16883 4063a0 12 API calls 16882->16883 16884 44335e 16882->16884 16883->16884 16900 408ab4 16884->16900 16888 443372 16905 41d238 GetModuleHandleW 16888->16905 16891 4085d4 31 API calls 16892 443383 16891->16892 16909 41cc28 16892->16909 16896 405b98 16894->16896 16899 405bc9 16896->16899 16919 405ad4 16896->16919 16924 405b28 16896->16924 16929 405b78 16896->16929 16899->16882 16901 403f34 12 API calls 16900->16901 16902 408ac1 16901->16902 16903 41c9bc GetVersionExW 16902->16903 16904 41c9d3 16903->16904 16904->16888 16906 41d254 16905->16906 16907 41d249 16905->16907 16906->16891 16946 40a4ac 16907->16946 16910 41cc30 16909->16910 16910->16910 16953 41cb94 GetThreadLocale 16910->16953 16916 41cc71 17042 406ee4 16916->17042 16932 408e5c 16919->16932 16921 405af7 16922 406000 12 API calls 16921->16922 16923 405b1b 16922->16923 16923->16896 16925 408e5c 58 API calls 16924->16925 16926 405b4b 16925->16926 16927 406000 12 API calls 16926->16927 16928 405b6a 16927->16928 16928->16896 16930 408e5c 58 API calls 16929->16930 16931 405b87 16930->16931 16931->16896 16933 408e64 16932->16933 16933->16933 16934 408eb1 16933->16934 16938 40778c 16933->16938 16934->16921 16937 406158 12 API calls 16937->16934 16940 40779b 16938->16940 16941 4077b1 LoadStringW 16938->16941 16940->16941 16942 407744 16940->16942 16941->16937 16943 407754 GetModuleFileNameW 16942->16943 16944 407770 16942->16944 16945 4089bc 56 API calls 16943->16945 16944->16941 16945->16944 16947 40a4ce GetProcAddress 16946->16947 16949 40a4d9 16946->16949 16948 40a4f9 16947->16948 16950 406024 12 API calls 16948->16950 16951 40a4f0 GetProcAddress 16949->16951 16952 40a50e 16950->16952 16951->16948 16952->16906 16954 41cbbf 16953->16954 16955 41cc00 16954->16955 17046 41cb38 GetCPInfo 16954->17046 16957 41a870 16955->16957 16958 41a878 16957->16958 16958->16958 16959 41a87f IsValidLocale 16958->16959 16960 41a8a0 GetThreadLocale 16959->16960 16961 41a8a7 16959->16961 16960->16961 17048 4076d4 16961->17048 16972 4063a0 12 API calls 16973 41a8f9 16972->16973 16974 41a7f8 13 API calls 16973->16974 16975 41a90e 16974->16975 16976 41a7f8 13 API calls 16975->16976 16977 41a930 16976->16977 17104 41a844 GetLocaleInfoW 16977->17104 16980 41a844 GetLocaleInfoW 16981 41a967 16980->16981 16982 41a7f8 13 API calls 16981->16982 16983 41a983 16982->16983 16984 41a844 GetLocaleInfoW 16983->16984 16985 41a9a0 16984->16985 17106 41b394 16985->17106 16988 4063a0 12 API calls 16989 41a9c7 16988->16989 16990 41b394 14 API calls 16989->16990 16991 41a9e1 16990->16991 16992 4063a0 12 API calls 16991->16992 16993 41a9ec 16992->16993 16994 41a844 GetLocaleInfoW 16993->16994 16995 41a9fc 16994->16995 16996 41a7f8 13 API calls 16995->16996 16997 41aa15 16996->16997 16998 4063a0 12 API calls 16997->16998 16999 41aa20 16998->16999 17000 41a7f8 13 API calls 16999->17000 17001 41aa35 17000->17001 17002 4063a0 12 API calls 17001->17002 17003 41aa40 17002->17003 17004 406000 12 API calls 17003->17004 17005 41aa48 17004->17005 17006 406000 12 API calls 17005->17006 17007 41aa50 17006->17007 17008 41a7f8 13 API calls 17007->17008 17009 41aa65 17008->17009 17010 41aa73 17009->17010 17011 41aa82 17009->17011 17013 4063e8 12 API calls 17010->17013 17012 4063e8 12 API calls 17011->17012 17014 41aa80 17012->17014 17013->17014 17015 41a7f8 13 API calls 17014->17015 17016 41aaa4 17015->17016 17018 41a7f8 13 API calls 17016->17018 17030 41aae2 17016->17030 17017 406b08 12 API calls 17019 41ab0c 17017->17019 17020 41aac7 17018->17020 17021 406b08 12 API calls 17019->17021 17024 41aad5 17020->17024 17025 41aae4 17020->17025 17022 41ab27 17021->17022 17023 41a844 GetLocaleInfoW 17022->17023 17027 41ab37 17023->17027 17028 4063e8 12 API calls 17024->17028 17026 4063e8 12 API calls 17025->17026 17026->17030 17029 406060 12 API calls 17027->17029 17028->17030 17031 41ab5e 17029->17031 17030->17017 17032 407068 17031->17032 17033 407197 17032->17033 17034 40708d 17032->17034 17033->16916 17034->17033 17037 4063a0 12 API calls 17034->17037 17039 4071b0 16 API calls 17034->17039 17040 407068 16 API calls 17034->17040 17278 40643c 17034->17278 17284 406414 17034->17284 17291 407050 17034->17291 17296 40771c 17034->17296 17037->17034 17039->17034 17040->17034 17043 406f13 17042->17043 17044 406efa 17042->17044 17043->16879 17044->17043 17305 406f34 17044->17305 17047 41cb51 17046->17047 17047->16955 17129 4074d0 17048->17129 17051 41b074 17185 405080 17051->17185 17058 4076d4 16 API calls 17059 41b0db 17058->17059 17060 41a7f8 13 API calls 17059->17060 17061 41b0f3 17060->17061 17062 41b10c GetThreadLocale EnumCalendarInfoW 17061->17062 17063 41b15f 17061->17063 17068 41b129 17062->17068 17064 41b233 17063->17064 17065 4076d4 16 API calls 17063->17065 17069 4076d4 16 API calls 17064->17069 17067 41b18c 17065->17067 17066 41b147 GetThreadLocale EnumCalendarInfoW 17066->17064 17070 4063a0 12 API calls 17067->17070 17068->17066 17068->17068 17071 41b256 17069->17071 17072 41b19e 17070->17072 17074 41b293 17071->17074 17079 407068 16 API calls 17071->17079 17210 41a778 17072->17210 17077 4076d4 16 API calls 17074->17077 17075 41b1cc 17076 41b1d1 GetThreadLocale EnumCalendarInfoW 17075->17076 17081 41b200 17076->17081 17078 41b2aa 17077->17078 17214 40532c 17078->17214 17079->17071 17080 41b220 GetThreadLocale EnumCalendarInfoW 17080->17064 17081->17080 17081->17081 17084 41ad5c 17087 41ad8f 17084->17087 17085 41b328 59 API calls 17085->17087 17086 4063a0 12 API calls 17086->17087 17087->17085 17087->17086 17088 41adec 17087->17088 17089 406060 12 API calls 17088->17089 17090 41a8d4 17089->17090 17091 41ae18 17090->17091 17094 41ae42 17091->17094 17092 4063a0 12 API calls 17092->17094 17093 41b328 59 API calls 17093->17094 17094->17092 17094->17093 17095 41ae92 17094->17095 17096 406060 12 API calls 17095->17096 17097 41a8dd 17096->17097 17098 41a7f8 GetLocaleInfoW 17097->17098 17099 41a831 17098->17099 17100 41a81f 17098->17100 17102 4063a0 12 API calls 17099->17102 17101 406158 12 API calls 17100->17101 17103 41a82f 17101->17103 17102->17103 17103->16972 17105 41a860 17104->17105 17105->16980 17107 406000 12 API calls 17106->17107 17108 41b3cf 17107->17108 17109 41a7f8 13 API calls 17108->17109 17110 41b3e0 17109->17110 17111 41a7f8 13 API calls 17110->17111 17112 41b3f5 17111->17112 17113 41b40e 17112->17113 17127 41b47d 17112->17127 17114 41b465 17113->17114 17122 41b42a 17113->17122 17115 4063a0 12 API calls 17114->17115 17117 41b463 17115->17117 17116 41d830 CompareStringW 17116->17127 17118 406060 12 API calls 17117->17118 17119 41b5bb 17118->17119 17121 406000 12 API calls 17119->17121 17123 41a9bc 17121->17123 17122->17117 17124 40683c 12 API calls 17122->17124 17125 406a28 12 API calls 17122->17125 17123->16988 17124->17122 17125->17122 17126 406a28 12 API calls 17126->17127 17127->17116 17127->17117 17127->17126 17128 40683c 12 API calls 17127->17128 17275 41da50 17127->17275 17128->17127 17130 4074f3 17129->17130 17134 40750e 17129->17134 17131 4074fe 17130->17131 17148 404070 17130->17148 17151 4074c8 17131->17151 17135 40755d 17134->17135 17136 404070 12 API calls 17134->17136 17137 40756b 17135->17137 17138 404070 12 API calls 17135->17138 17136->17135 17139 407579 17137->17139 17140 4075b5 17137->17140 17138->17137 17141 403f68 12 API calls 17139->17141 17142 403f34 12 API calls 17140->17142 17145 4075ad 17141->17145 17143 4075c1 17142->17143 17143->17145 17154 4072d8 17143->17154 17144 407509 17144->17051 17145->17144 17146 4074d0 16 API calls 17145->17146 17146->17145 17149 404024 12 API calls 17148->17149 17150 404083 17149->17150 17150->17131 17157 4076e0 17151->17157 17163 4071b0 17154->17163 17156 4072e3 17156->17145 17158 4076e6 17157->17158 17161 4074cd 17157->17161 17160 406f34 14 API calls 17158->17160 17158->17161 17162 407711 17158->17162 17159 403f50 12 API calls 17159->17161 17160->17162 17161->17144 17162->17159 17164 4071c5 17163->17164 17181 4071f4 17163->17181 17166 407216 17164->17166 17167 4071ca 17164->17167 17165 40643c 12 API calls 17165->17181 17168 406414 SysFreeString SysReAllocStringLen 17166->17168 17177 407211 17166->17177 17169 40722d 17167->17169 17170 4071cf 17167->17170 17168->17166 17171 4063a0 12 API calls 17169->17171 17169->17177 17172 4071d4 17170->17172 17175 407241 17170->17175 17171->17169 17174 4071d9 17172->17174 17176 407255 17172->17176 17173 407050 12 API calls 17173->17175 17178 4071e2 17174->17178 17183 407278 17174->17183 17175->17173 17175->17177 17176->17177 17179 4071b0 16 API calls 17176->17179 17177->17156 17178->17177 17178->17181 17182 4072a9 17178->17182 17179->17176 17180 407068 16 API calls 17180->17183 17181->17165 17181->17177 17182->17177 17184 40771c 14 API calls 17182->17184 17183->17177 17183->17180 17184->17182 17186 405090 17185->17186 17187 405089 17185->17187 17189 4053b4 17186->17189 17188 404070 12 API calls 17187->17188 17188->17186 17190 4053bb 17189->17190 17191 4053d6 17190->17191 17221 4050ac 17190->17221 17195 40514c 17191->17195 17193 4053c8 17193->17191 17194 403f50 12 API calls 17193->17194 17194->17191 17197 40515a 17195->17197 17198 405183 GetTickCount 17197->17198 17199 40522d GetTickCount 17197->17199 17200 40519b GetTickCount 17197->17200 17201 4051f6 GetTickCount 17197->17201 17202 4051a8 17197->17202 17204 4051cb GetCurrentThreadId 17197->17204 17235 4053e8 GetCurrentThreadId 17197->17235 17240 404efc 17197->17240 17198->17197 17247 405344 17199->17247 17200->17197 17200->17202 17201->17197 17201->17202 17202->17058 17204->17202 17206 405257 GetTickCount 17207 40523d 17206->17207 17207->17199 17207->17206 17208 4052c1 17207->17208 17208->17202 17209 4052c7 GetCurrentThreadId 17208->17209 17209->17202 17211 41a790 17210->17211 17212 41a79e 17211->17212 17251 4185e8 17211->17251 17212->17075 17215 405080 12 API calls 17214->17215 17216 405334 17215->17216 17217 4053b4 17 API calls 17216->17217 17218 40533b 17217->17218 17266 4052e4 17218->17266 17222 4050b5 17221->17222 17224 4050ba 17221->17224 17225 404f84 GetModuleHandleW GetProcAddress 17222->17225 17224->17193 17226 405002 17225->17226 17227 404fad GetLogicalProcessorInformation 17225->17227 17226->17224 17227->17226 17228 404fbc GetLastError 17227->17228 17228->17226 17229 404fc6 17228->17229 17230 403f34 12 API calls 17229->17230 17231 404fce GetLogicalProcessorInformation 17230->17231 17232 404ff5 17231->17232 17232->17226 17233 403f50 12 API calls 17232->17233 17234 40502f 17233->17234 17234->17224 17236 4053f5 17235->17236 17237 4053fc 17235->17237 17236->17197 17238 405423 17237->17238 17239 405410 GetCurrentThreadId 17237->17239 17238->17197 17239->17238 17241 404f07 17240->17241 17242 404f36 17241->17242 17243 404f2d Sleep 17241->17243 17246 404f55 17241->17246 17244 404f45 Sleep 17242->17244 17245 404f4e SwitchToThread 17242->17245 17243->17246 17244->17246 17245->17246 17246->17197 17248 405356 17247->17248 17249 40539d 17247->17249 17248->17249 17250 405384 Sleep 17248->17250 17249->17207 17250->17248 17256 41bb6c 17251->17256 17253 4185f9 17260 405724 17253->17260 17257 41bb73 17256->17257 17258 408e5c 58 API calls 17257->17258 17259 41bb8b 17258->17259 17259->17253 17261 405732 17260->17261 17262 405728 17260->17262 17264 405770 17261->17264 17265 40400c 12 API calls 17261->17265 17263 405e88 12 API calls 17262->17263 17263->17261 17264->17264 17265->17264 17271 405094 GetCurrentThreadId 17266->17271 17268 40531b 17268->17084 17270 405344 Sleep 17270->17268 17272 4050a1 17271->17272 17273 4050a8 17271->17273 17274 404070 12 API calls 17272->17274 17273->17268 17273->17270 17274->17273 17276 406bf0 12 API calls 17275->17276 17277 41da6c 17276->17277 17277->17127 17279 406440 17278->17279 17280 406454 17278->17280 17279->17280 17300 405f94 17279->17300 17281 406482 17280->17281 17283 403f50 12 API calls 17280->17283 17281->17034 17283->17281 17285 406418 17284->17285 17286 40643b 17284->17286 17287 405fe0 17285->17287 17290 40642b SysReAllocStringLen 17285->17290 17286->17034 17288 40605c 17287->17288 17289 40604e SysFreeString 17287->17289 17288->17034 17289->17288 17290->17286 17290->17287 17292 407060 17291->17292 17293 407059 17291->17293 17294 404070 12 API calls 17292->17294 17293->17034 17295 407067 17294->17295 17295->17034 17298 407723 17296->17298 17297 40773d 17297->17034 17298->17297 17299 4076e0 14 API calls 17298->17299 17299->17297 17301 405f98 17300->17301 17302 405fd6 17300->17302 17301->17302 17303 403f34 12 API calls 17301->17303 17302->17280 17304 405fa8 17303->17304 17304->17280 17306 406f3d 17305->17306 17332 406f7a 17305->17332 17307 406f52 17306->17307 17308 406f7f 17306->17308 17309 406f56 17307->17309 17310 406fb9 17307->17310 17311 406f90 17308->17311 17312 406f86 17308->17312 17313 406f5a 17309->17313 17314 406f9c 17309->17314 17315 406fc0 17310->17315 17316 406fc7 17310->17316 17336 406090 17311->17336 17317 406024 12 API calls 17312->17317 17321 406f5e 17313->17321 17330 406fd0 17313->17330 17319 406fa3 17314->17319 17320 406fad 17314->17320 17322 406000 12 API calls 17315->17322 17323 406060 12 API calls 17316->17323 17317->17332 17324 406048 SysFreeString 17319->17324 17340 4060c0 17320->17340 17326 406f62 17321->17326 17328 406fdf 17321->17328 17322->17332 17323->17332 17324->17332 17329 406ffd 17326->17329 17335 406f6a 17326->17335 17331 406f34 14 API calls 17328->17331 17328->17332 17329->17332 17333 406ee4 14 API calls 17329->17333 17330->17332 17344 406f1c 17330->17344 17331->17328 17332->17044 17333->17329 17334 4076e0 14 API calls 17334->17335 17335->17332 17335->17334 17338 406096 17336->17338 17337 4060bc 17337->17332 17338->17337 17339 403f50 12 API calls 17338->17339 17339->17338 17341 4060c6 17340->17341 17342 4060cc SysFreeString 17341->17342 17343 4060de 17341->17343 17342->17341 17343->17332 17345 406f2c 17344->17345 17347 406f25 17344->17347 17346 404070 12 API calls 17345->17346 17348 406f33 17346->17348 17347->17330 17348->17330 17350 425f08 17349->17350 17350->17350 17351 40adb8 13 API calls 17350->17351 17352 425f2b 17351->17352 17353 425f33 LoadLibraryW 17352->17353 17354 40adb8 13 API calls 17353->17354 17355 425f48 17354->17355 17356 40a4ac 14 API calls 17355->17356 17357 425f57 17356->17357 17358 40adb8 13 API calls 17357->17358 17359 425f69 17358->17359 17360 40a4ac 14 API calls 17359->17360 17361 425f78 17360->17361 17362 40adb8 13 API calls 17361->17362 17363 425f8a 17362->17363 17364 40a4ac 14 API calls 17363->17364 17365 425f99 17364->17365 17366 40adb8 13 API calls 17365->17366 17367 425fab 17366->17367 17368 40a4ac 14 API calls 17367->17368 17369 425fba 17368->17369 17370 40adb8 13 API calls 17369->17370 17371 425fcc 17370->17371 17372 40a4ac 14 API calls 17371->17372 17373 425fdb 17372->17373 17374 40adb8 13 API calls 17373->17374 17375 425fed 17374->17375 17376 40a4ac 14 API calls 17375->17376 17377 425ffc 17376->17377 17378 40adb8 13 API calls 17377->17378 17379 42600e 17378->17379 17380 40a4ac 14 API calls 17379->17380 17381 42601d 17380->17381 17382 40adb8 13 API calls 17381->17382 17383 42602f 17382->17383 17384 40a4ac 14 API calls 17383->17384 17385 42603e 17384->17385 17386 40adb8 13 API calls 17385->17386 17387 426050 17386->17387 17388 40a4ac 14 API calls 17387->17388 17389 42605f 17388->17389 17390 40adb8 13 API calls 17389->17390 17391 426071 17390->17391 17392 40a4ac 14 API calls 17391->17392 17393 426080 17392->17393 17394 40adb8 13 API calls 17393->17394 17395 426092 17394->17395 17396 40a4ac 14 API calls 17395->17396 17397 4260a1 17396->17397 17398 40adb8 13 API calls 17397->17398 17399 4260b3 17398->17399 17400 40a4ac 14 API calls 17399->17400 17401 4260c2 17400->17401 17402 40adb8 13 API calls 17401->17402 17403 4260d4 17402->17403 17404 40a4ac 14 API calls 17403->17404 17405 4260e3 17404->17405 17406 40adb8 13 API calls 17405->17406 17407 4260f5 17406->17407 17408 40a4ac 14 API calls 17407->17408 17409 426104 17408->17409 17410 40adb8 13 API calls 17409->17410 17411 426116 17410->17411 17412 40a4ac 14 API calls 17411->17412 17413 426125 17412->17413 17414 40adb8 13 API calls 17413->17414 17415 426137 17414->17415 17416 40a4ac 14 API calls 17415->17416 17417 426146 17416->17417 17418 40adb8 13 API calls 17417->17418 17419 426158 17418->17419 17420 40a4ac 14 API calls 17419->17420 17421 426167 17420->17421 17422 406060 12 API calls 17421->17422 17423 426186 17422->17423 17424 426564 WSAStartup 17423->17424 17424->16697 17426 40bdf0 17425->17426 17426->17426 17427 40adb8 13 API calls 17426->17427 17428 40be14 17427->17428 17429 40be1c LoadLibraryW 17428->17429 17430 40be2c 17429->17430 17816 40c205 17429->17816 17431 40adb8 13 API calls 17430->17431 17434 40be39 17431->17434 17432 40adb8 13 API calls 17433 40c217 17432->17433 17435 40c21f LoadLibraryW 17433->17435 17438 40a4ac 14 API calls 17434->17438 17436 40c24d 17435->17436 17437 40c22b 17435->17437 17440 40adb8 13 API calls 17436->17440 17439 40adb8 13 API calls 17437->17439 17441 40be48 17438->17441 17443 40c23b 17439->17443 17444 40c262 17440->17444 17442 40adb8 13 API calls 17441->17442 17445 40be5a 17442->17445 17447 40a4ac 14 API calls 17443->17447 17446 40c26d LoadLibraryW 17444->17446 17450 40a4ac 14 API calls 17445->17450 17448 40c27d 17446->17448 17954 40cc11 17446->17954 17447->17436 17449 40adb8 13 API calls 17448->17449 17452 40c28d 17449->17452 17453 40be69 17450->17453 17451 40adb8 13 API calls 17454 40cc26 17451->17454 17458 40a4ac 14 API calls 17452->17458 17455 40adb8 13 API calls 17453->17455 17457 40cc31 LoadLibraryW 17454->17457 17456 40be7b 17455->17456 17464 40a4ac 14 API calls 17456->17464 17459 40cc41 17457->17459 17699 40ce37 17457->17699 17461 40c29f 17458->17461 17460 40adb8 13 API calls 17459->17460 17466 40cc51 17460->17466 17463 40adb8 13 API calls 17461->17463 17462 40adb8 13 API calls 17465 40ce4c 17462->17465 17467 40c2b4 17463->17467 17468 40be8a 17464->17468 17469 40ce57 LoadLibraryW 17465->17469 17473 40a4ac 14 API calls 17466->17473 17477 40a4ac 14 API calls 17467->17477 17470 40adb8 13 API calls 17468->17470 17471 40ce63 17469->17471 17472 40ce85 17469->17472 17474 40be9c 17470->17474 17475 40adb8 13 API calls 17471->17475 17478 40adb8 13 API calls 17472->17478 17476 40cc63 17473->17476 17483 40a4ac 14 API calls 17474->17483 17479 40ce73 17475->17479 17480 40adb8 13 API calls 17476->17480 17481 40c2c6 17477->17481 17482 40ce9a 17478->17482 17490 40a4ac 14 API calls 17479->17490 17484 40cc78 17480->17484 17485 40adb8 13 API calls 17481->17485 17488 40cea5 LoadLibraryW 17482->17488 17486 40beab 17483->17486 17496 40a4ac 14 API calls 17484->17496 17487 40c2db 17485->17487 17489 40adb8 13 API calls 17486->17489 17497 40a4ac 14 API calls 17487->17497 17491 40d00f 17488->17491 17492 40ceb5 17488->17492 17494 40bebd 17489->17494 17490->17472 17495 40adb8 13 API calls 17491->17495 17493 40adb8 13 API calls 17492->17493 17498 40cec5 17493->17498 17504 40a4ac 14 API calls 17494->17504 17499 40d024 17495->17499 17500 40cc8a 17496->17500 17501 40c2ed 17497->17501 17508 40a4ac 14 API calls 17498->17508 17505 40d02f LoadLibraryW 17499->17505 17502 40adb8 13 API calls 17500->17502 17503 40adb8 13 API calls 17501->17503 17506 40cc9f 17502->17506 17507 40c302 17503->17507 17509 40becc 17504->17509 17510 40d0ab 17505->17510 17511 40d03b 17505->17511 17517 40a4ac 14 API calls 17506->17517 17522 40a4ac 14 API calls 17507->17522 17512 40ced7 17508->17512 17513 40adb8 13 API calls 17509->17513 17515 40adb8 13 API calls 17510->17515 17514 40adb8 13 API calls 17511->17514 17518 40adb8 13 API calls 17512->17518 17519 40bede 17513->17519 17520 40d04b 17514->17520 17516 40d0c0 17515->17516 17524 40d0cb LoadLibraryW 17516->17524 17521 40ccb1 17517->17521 17523 40ceec 17518->17523 17532 40a4ac 14 API calls 17519->17532 17527 40a4ac 14 API calls 17520->17527 17525 40adb8 13 API calls 17521->17525 17526 40c314 17522->17526 17536 40a4ac 14 API calls 17523->17536 17528 40d0d7 17524->17528 17529 40d147 17524->17529 17530 40ccc6 17525->17530 17531 40adb8 13 API calls 17526->17531 17533 40d05d 17527->17533 17534 40adb8 13 API calls 17528->17534 17540 406060 12 API calls 17529->17540 17544 40a4ac 14 API calls 17530->17544 17535 40c329 17531->17535 17537 40beed 17532->17537 17538 40adb8 13 API calls 17533->17538 17539 40d0e7 17534->17539 17549 40a4ac 14 API calls 17535->17549 17541 40cefe 17536->17541 17542 40adb8 13 API calls 17537->17542 17543 40d072 17538->17543 17552 40a4ac 14 API calls 17539->17552 17545 40d169 17540->17545 17546 40adb8 13 API calls 17541->17546 17547 40beff 17542->17547 17557 40a4ac 14 API calls 17543->17557 17548 40ccd8 17544->17548 17550 406060 12 API calls 17545->17550 17551 40cf13 17546->17551 17556 40a4ac 14 API calls 17547->17556 17553 40adb8 13 API calls 17548->17553 17554 40c33b 17549->17554 17555 40d176 17550->17555 17561 40a4ac 14 API calls 17551->17561 17558 40d0f9 17552->17558 17559 40cced 17553->17559 17560 40adb8 13 API calls 17554->17560 17955 43dc14 17555->17955 17562 40bf0e 17556->17562 17563 40d084 17557->17563 17564 40adb8 13 API calls 17558->17564 17573 40a4ac 14 API calls 17559->17573 17565 40c350 17560->17565 17566 40cf25 17561->17566 17567 40adb8 13 API calls 17562->17567 17568 40adb8 13 API calls 17563->17568 17569 40d10e 17564->17569 17574 40a4ac 14 API calls 17565->17574 17570 40adb8 13 API calls 17566->17570 17571 40bf20 17567->17571 17572 40d099 17568->17572 17578 40a4ac 14 API calls 17569->17578 17575 40cf3a 17570->17575 17581 40a4ac 14 API calls 17571->17581 17582 40a4ac 14 API calls 17572->17582 17576 40ccff 17573->17576 17577 40c362 17574->17577 17587 40a4ac 14 API calls 17575->17587 17579 40adb8 13 API calls 17576->17579 17580 40adb8 13 API calls 17577->17580 17583 40d120 17578->17583 17584 40cd14 17579->17584 17586 40c377 17580->17586 17588 40bf2f 17581->17588 17582->17510 17585 40adb8 13 API calls 17583->17585 17592 40a4ac 14 API calls 17584->17592 17589 40d135 17585->17589 17596 40a4ac 14 API calls 17586->17596 17590 40cf4c 17587->17590 17591 40adb8 13 API calls 17588->17591 17598 40a4ac 14 API calls 17589->17598 17593 40adb8 13 API calls 17590->17593 17594 40bf41 17591->17594 17595 40cd26 17592->17595 17597 40cf61 17593->17597 17603 40a4ac 14 API calls 17594->17603 17599 40adb8 13 API calls 17595->17599 17600 40c389 17596->17600 17605 40a4ac 14 API calls 17597->17605 17598->17529 17601 40cd3b 17599->17601 17602 40adb8 13 API calls 17600->17602 17610 40a4ac 14 API calls 17601->17610 17604 40c39e 17602->17604 17606 40bf50 17603->17606 17613 40a4ac 14 API calls 17604->17613 17608 40cf73 17605->17608 17607 40adb8 13 API calls 17606->17607 17609 40bf62 17607->17609 17611 40adb8 13 API calls 17608->17611 17618 40a4ac 14 API calls 17609->17618 17612 40cd4d 17610->17612 17614 40cf88 17611->17614 17615 40adb8 13 API calls 17612->17615 17616 40c3b0 17613->17616 17621 40a4ac 14 API calls 17614->17621 17619 40cd62 17615->17619 17617 40adb8 13 API calls 17616->17617 17620 40c3c5 17617->17620 17622 40bf71 17618->17622 17627 40a4ac 14 API calls 17619->17627 17628 40a4ac 14 API calls 17620->17628 17623 40cf9a 17621->17623 17624 40adb8 13 API calls 17622->17624 17625 40adb8 13 API calls 17623->17625 17626 40bf83 17624->17626 17629 40cfaf 17625->17629 17635 40a4ac 14 API calls 17626->17635 17630 40cd74 17627->17630 17632 40c3d7 17628->17632 17637 40a4ac 14 API calls 17629->17637 17631 40adb8 13 API calls 17630->17631 17633 40cd89 17631->17633 17634 40adb8 13 API calls 17632->17634 17641 40a4ac 14 API calls 17633->17641 17636 40c3ec 17634->17636 17638 40bf92 17635->17638 17645 40a4ac 14 API calls 17636->17645 17639 40cfc1 17637->17639 17640 40adb8 13 API calls 17638->17640 17642 40adb8 13 API calls 17639->17642 17643 40bfa4 17640->17643 17644 40cd9b 17641->17644 17646 40cfd6 17642->17646 17649 40a4ac 14 API calls 17643->17649 17647 40adb8 13 API calls 17644->17647 17648 40c3fe 17645->17648 17654 40a4ac 14 API calls 17646->17654 17650 40cdb0 17647->17650 17651 40adb8 13 API calls 17648->17651 17652 40bfb3 17649->17652 17659 40a4ac 14 API calls 17650->17659 17653 40c413 17651->17653 17655 40adb8 13 API calls 17652->17655 17660 40a4ac 14 API calls 17653->17660 17656 40cfe8 17654->17656 17658 40bfc5 17655->17658 17657 40adb8 13 API calls 17656->17657 17661 40cffd 17657->17661 17666 40a4ac 14 API calls 17658->17666 17662 40cdc2 17659->17662 17663 40c425 17660->17663 17669 40a4ac 14 API calls 17661->17669 17664 40adb8 13 API calls 17662->17664 17665 40adb8 13 API calls 17663->17665 17667 40cdd7 17664->17667 17668 40c43a 17665->17668 17670 40bfd4 17666->17670 17672 40a4ac 14 API calls 17667->17672 17675 40a4ac 14 API calls 17668->17675 17669->17491 17671 40adb8 13 API calls 17670->17671 17673 40bfe6 17671->17673 17674 40cde9 17672->17674 17680 40a4ac 14 API calls 17673->17680 17676 40adb8 13 API calls 17674->17676 17677 40c44c 17675->17677 17678 40cdfe 17676->17678 17679 40adb8 13 API calls 17677->17679 17684 40a4ac 14 API calls 17678->17684 17681 40c461 17679->17681 17682 40bff5 17680->17682 17687 40a4ac 14 API calls 17681->17687 17683 40adb8 13 API calls 17682->17683 17685 40c007 17683->17685 17686 40ce10 17684->17686 17690 40a4ac 14 API calls 17685->17690 17688 40adb8 13 API calls 17686->17688 17689 40c473 17687->17689 17691 40ce25 17688->17691 17692 40adb8 13 API calls 17689->17692 17693 40c016 17690->17693 17697 40a4ac 14 API calls 17691->17697 17694 40c488 17692->17694 17695 40adb8 13 API calls 17693->17695 17698 40a4ac 14 API calls 17694->17698 17696 40c028 17695->17696 17702 40a4ac 14 API calls 17696->17702 17697->17699 17700 40c49a 17698->17700 17699->17462 17701 40adb8 13 API calls 17700->17701 17703 40c4af 17701->17703 17704 40c037 17702->17704 17707 40a4ac 14 API calls 17703->17707 17705 40adb8 13 API calls 17704->17705 17706 40c049 17705->17706 17710 40a4ac 14 API calls 17706->17710 17708 40c4c1 17707->17708 17709 40adb8 13 API calls 17708->17709 17711 40c4d6 17709->17711 17712 40c058 17710->17712 17715 40a4ac 14 API calls 17711->17715 17713 40adb8 13 API calls 17712->17713 17714 40c06a 17713->17714 17718 40a4ac 14 API calls 17714->17718 17716 40c4e8 17715->17716 17717 40adb8 13 API calls 17716->17717 17719 40c4fd 17717->17719 17720 40c079 17718->17720 17723 40a4ac 14 API calls 17719->17723 17721 40adb8 13 API calls 17720->17721 17722 40c08b 17721->17722 17726 40a4ac 14 API calls 17722->17726 17724 40c50f 17723->17724 17725 40adb8 13 API calls 17724->17725 17727 40c524 17725->17727 17728 40c09a 17726->17728 17731 40a4ac 14 API calls 17727->17731 17729 40adb8 13 API calls 17728->17729 17730 40c0ac 17729->17730 17733 40a4ac 14 API calls 17730->17733 17732 40c536 17731->17732 17734 40adb8 13 API calls 17732->17734 17735 40c0bb 17733->17735 17736 40c54b 17734->17736 17737 40adb8 13 API calls 17735->17737 17739 40a4ac 14 API calls 17736->17739 17738 40c0cd 17737->17738 17742 40a4ac 14 API calls 17738->17742 17740 40c55d 17739->17740 17741 40adb8 13 API calls 17740->17741 17743 40c572 17741->17743 17744 40c0dc 17742->17744 17747 40a4ac 14 API calls 17743->17747 17745 40adb8 13 API calls 17744->17745 17746 40c0ee 17745->17746 17750 40a4ac 14 API calls 17746->17750 17748 40c584 17747->17748 17749 40adb8 13 API calls 17748->17749 17751 40c599 17749->17751 17752 40c0fd 17750->17752 17755 40a4ac 14 API calls 17751->17755 17753 40adb8 13 API calls 17752->17753 17754 40c10f 17753->17754 17757 40a4ac 14 API calls 17754->17757 17756 40c5ab 17755->17756 17816->17432 17954->17451 18429 404444 17955->18429 17958 43dcc5 17958->16701 17959 43dc5c KiUserCallbackDispatcher 17960 43dc70 17959->17960 17961 40a748 CreateWindowExW 17960->17961 17961->17958 17963 40b685 LoadLibraryW 17962->17963 17964 40b691 17962->17964 17963->17964 17965 40adb8 13 API calls 17964->17965 17978 40b70d 17964->17978 17966 40b6a6 17965->17966 17969 40a4ac 14 API calls 17966->17969 17967 406060 12 API calls 17968 40b733 17967->17968 17979 40b7c0 GetModuleFileNameW 17968->17979 17970 40b6b5 17969->17970 17971 40adb8 13 API calls 17970->17971 17972 40b6c4 17971->17972 17973 40a4ac 14 API calls 17972->17973 17974 40b6d3 17973->17974 17975 40b6d9 GetCurrentProcess 17974->17975 17974->17978 17976 40b6e6 17975->17976 17977 40b6fa GetNativeSystemInfo 17976->17977 17976->17978 17977->17978 17978->17967 17980 40b7e9 17979->17980 17980->16705 17982 437538 17981->17982 17982->17982 18431 40ba5c 17982->18431 17984 437564 17985 43756a 17984->17985 17986 40adb8 13 API calls 17984->17986 17987 406060 12 API calls 17985->17987 17988 43757c 17986->17988 17990 437b2e 17987->17990 17989 4063e8 12 API calls 17988->17989 17991 437587 17989->17991 17990->16710 17990->16711 17992 40ad0c 12 API calls 17991->17992 17993 43759c 17992->17993 17994 4063a0 12 API calls 17993->17994 17995 4375a6 17994->17995 17996 40ad0c 12 API calls 17995->17996 17997 4375bb 17996->17997 17998 40ad0c 12 API calls 17997->17998 17999 4375de 17998->17999 18000 40ad0c 12 API calls 17999->18000 18001 4375fe 18000->18001 18002 4063a0 12 API calls 18001->18002 18003 437609 18002->18003 18004 40ad0c 12 API calls 18003->18004 18005 43761e 18004->18005 18006 40ad0c 12 API calls 18005->18006 18007 43763f 18006->18007 18008 4063a0 12 API calls 18007->18008 18009 43764a 18008->18009 18010 40ad0c 12 API calls 18009->18010 18011 43765f 18010->18011 18012 40ad0c 12 API calls 18011->18012 18013 437680 18012->18013 18014 4063a0 12 API calls 18013->18014 18015 43768b 18014->18015 18016 40ad0c 12 API calls 18015->18016 18017 4376a0 18016->18017 18018 40ad0c 12 API calls 18017->18018 18019 4376c1 18018->18019 18020 4063a0 12 API calls 18019->18020 18021 4376cc 18020->18021 18022 40ad0c 12 API calls 18021->18022 18023 4376e1 18022->18023 18104 43f5bc 18102->18104 18103 404294 14 API calls 18103->18104 18104->18103 18107 43f5e5 18104->18107 18109 43f5fb 18104->18109 18105 406060 12 API calls 18106 43f61c 18105->18106 18106->16716 18205 43acb0 18106->18205 18451 404294 18107->18451 18109->18105 18111 40b986 18110->18111 18111->16731 18113 43f449 18112->18113 18113->18113 18465 43e940 18113->18465 18202 40b602 MessageBoxW 18201->18202 18203 40b5f3 MessageBoxW 18201->18203 18204 40b60b 18202->18204 18203->18204 18204->16714 18206 43acd1 18205->18206 18847 43a9d0 18205->18847 18859 43a870 18206->18859 18210 43ace2 18212 406000 12 API calls 18210->18212 18213 43acf7 18212->18213 18213->16716 18430 40444b GetModuleHandleW RegisterClassW 18429->18430 18430->17958 18430->17959 18432 40ba6e GetModuleHandleW 18431->18432 18433 406000 12 API calls 18431->18433 18449 406824 18432->18449 18433->18432 18435 40ba80 FindResourceW 18436 40ba91 LoadResource 18435->18436 18437 40badf 18435->18437 18438 40bac0 18436->18438 18439 40bab0 LockResource 18436->18439 18437->17984 18440 40bacd FreeResource 18438->18440 18439->18438 18440->17984 18450 40682a 18449->18450 18450->18435 18452 406000 12 API calls 18451->18452 18453 4042a8 18452->18453 18454 4042ca GetCommandLineW 18453->18454 18455 4042ac GetModuleFileNameW 18453->18455 18457 4042d1 18454->18457 18456 406158 12 API calls 18455->18456 18458 4042c8 18456->18458 18460 4042e8 18457->18460 18461 4041d8 18457->18461 18458->18460 18460->18109 18462 4041e0 18461->18462 18463 4069a8 12 API calls 18462->18463 18464 404247 18463->18464 18464->18457 18466 404294 14 API calls 18465->18466 18467 43e961 18466->18467 18848 40b8ec lstrlenW 18847->18848 18849 43a9f5 18848->18849 18850 43a9fb 18849->18850 18851 43aa1f 18849->18851 18852 406bf0 12 API calls 18850->18852 18853 406a80 12 API calls 18851->18853 18854 43aa0e 18852->18854 18855 43aa1d 18853->18855 18856 406a80 12 API calls 18854->18856 18857 406000 12 API calls 18855->18857 18856->18855 18858 43aa42 18857->18858 18858->18206 18860 43a896 18859->18860 18861 43a7b4 13 API calls 18860->18861 18862 43a89e 18861->18862 18863 40adb8 13 API calls 18862->18863 18882 43a96a 18862->18882 18866 43a8b1 18863->18866 18864 406060 12 API calls 18865 43a98a 18864->18865 18867 406060 12 API calls 18865->18867 18868 4063e8 12 API calls 18866->18868 18869 43a997 18867->18869 18870 43a8bc 18868->18870 18869->18210 18883 43aac0 18869->18883 18871 40ad0c 12 API calls 18870->18871 18872 43a8d3 18871->18872 18873 43a912 18872->18873 18875 40ad0c 12 API calls 18872->18875 18872->18882 18874 40ad0c 12 API calls 18873->18874 18873->18882 18878 43a931 18874->18878 18876 43a905 18875->18876 18877 4063a0 12 API calls 18876->18877 18877->18873 18879 40ad0c 12 API calls 18878->18879 18878->18882 18880 43a95d 18879->18880 18881 4063a0 12 API calls 18880->18881 18881->18882 18882->18864 18884 406000 12 API calls 18883->18884 18885 43aaeb 18884->18885 18910 43a6a0 18885->18910 18888 43ab1a 18890 43a6a0 14 API calls 18888->18890 18889 406b08 12 API calls 18889->18888 18891 43ab2b 18890->18891 18892 43ab54 18891->18892 18893 406b08 12 API calls 18891->18893 18893->18892 18911 43a6cf 18910->18911 18912 43a6e3 18911->18912 18913 43a6d8 18911->18913 18915 4063e8 12 API calls 18912->18915 18914 4063a0 12 API calls 18913->18914 18916 43a6e1 18914->18916 18917 43a6ed 18915->18917 18919 406000 12 API calls 18916->18919 18918 406000 12 API calls 18917->18918 18920 43a6f4 18918->18920 18921 43a762 18919->18921 18922 4042f4 2 API calls 18920->18922 18923 406060 12 API calls 18921->18923 18929 43a6f9 18922->18929 18924 43a76f 18923->18924 18924->18888 18924->18889 18925 40ad0c 12 API calls 18925->18929 18926 43a716 18927 406a28 12 API calls 18926->18927 18927->18916 18929->18925 18929->18926 18930 406b08 12 API calls 18929->18930 18941 40b86c 18929->18941 18930->18929 18942 40b871 18941->18942 18943 406158 12 API calls 18942->18943 19110 406288 19111 4062a3 19110->19111 19112 4062ac 19110->19112 19113 406048 SysFreeString 19111->19113 19114 4062e5 19112->19114 19125 40613c 19112->19125 19123 4062aa 19113->19123 19134 40677c 19114->19134 19119 40613c MultiByteToWideChar 19121 406302 19119->19121 19120 4062d4 19128 406188 19120->19128 19124 40677c 3 API calls 19121->19124 19124->19123 19140 408ef0 MultiByteToWideChar 19125->19140 19127 406150 19127->19114 19127->19120 19129 406190 SysAllocStringLen 19128->19129 19130 405fe0 19128->19130 19129->19130 19133 4061a1 SysFreeString 19129->19133 19131 40605c 19130->19131 19132 40604e SysFreeString 19130->19132 19131->19123 19132->19131 19133->19123 19135 406789 19134->19135 19139 406790 19134->19139 19141 405fe8 19135->19141 19147 4066fc 19139->19147 19140->19127 19142 405ffc 19141->19142 19143 405fec SysAllocStringLen 19141->19143 19142->19139 19143->19142 19144 405fe0 19143->19144 19145 40605c 19144->19145 19146 40604e SysFreeString 19144->19146 19145->19139 19146->19145 19148 406702 SysFreeString 19147->19148 19149 4062f1 19147->19149 19148->19149 19149->19119 19150 42a47b 19151 42a482 19150->19151 19153 42a7f0 19150->19153 19154 42a7f8 19153->19154 19154->19154 19155 42a81d OpenFileMappingW 19154->19155 19156 42ac06 19155->19156 19157 42a834 MapViewOfFile 19155->19157 19160 406060 12 API calls 19156->19160 19158 42abd9 19157->19158 19159 42a853 19157->19159 19163 42abfc CloseHandle 19158->19163 19165 40bae8 15 API calls 19159->19165 19161 42ac20 19160->19161 19162 406060 12 API calls 19161->19162 19164 42ac2d 19162->19164 19163->19156 19164->19151 19166 42a86d 19165->19166 19167 42a876 19166->19167 19168 42a885 19166->19168 19169 4063e8 12 API calls 19167->19169 19171 40aca4 13 API calls 19168->19171 19170 42a883 19169->19170 19195 40ab24 19170->19195 19172 42a8c5 19171->19172 19174 406b08 12 API calls 19172->19174 19174->19170 19175 42a903 19176 40aca4 13 API calls 19175->19176 19177 42a944 19176->19177 19178 40aca4 13 API calls 19177->19178 19179 42a985 19178->19179 19180 40aca4 13 API calls 19179->19180 19181 42a9cf 19180->19181 19182 40aca4 13 API calls 19181->19182 19183 42aa0c 19182->19183 19184 40aca4 13 API calls 19183->19184 19185 42aa49 19184->19185 19186 40aca4 13 API calls 19185->19186 19187 42aa86 19186->19187 19188 40aca4 13 API calls 19187->19188 19189 42aac3 19188->19189 19190 40683c 12 API calls 19189->19190 19191 42ab46 19190->19191 19192 40683c 12 API calls 19191->19192 19193 42ab69 19192->19193 19194 406b08 12 API calls 19193->19194 19194->19158 19196 40ab8d 19195->19196 19197 40ab4d 19195->19197 19198 40aca4 13 API calls 19196->19198 19199 40aca4 13 API calls 19197->19199 19200 40ab9f 19198->19200 19201 40ab5f 19199->19201 19202 40aca4 13 API calls 19200->19202 19203 40aca4 13 API calls 19201->19203 19204 40abb9 19202->19204 19205 40ab79 19203->19205 19206 40aca4 13 API calls 19204->19206 19207 406b08 12 API calls 19205->19207 19209 40abd2 19206->19209 19208 40ab88 19207->19208 19213 406060 12 API calls 19208->19213 19210 40aca4 13 API calls 19209->19210 19211 40abec 19210->19211 19212 40aca4 13 API calls 19211->19212 19215 40ac06 19212->19215 19214 40ac34 19213->19214 19214->19175 19216 406b08 12 API calls 19215->19216 19216->19208

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1523 40aee0-40aee7 1524 40af57-40af9d 1523->1524 1525 40aee9-40af43 1523->1525 1526 40af9e-40af9f 1524->1526 1527 40afb3-40afbb 1525->1527 1528 40af45-40af56 1525->1528 1529 40afa1-40afae 1526->1529 1530 40b00f-40b01e 1526->1530 1531 40afbd-40afcb 1527->1531 1532 40afee 1527->1532 1528->1524 1529->1527 1536 40b020-40b021 1530->1536 1537 40b08e-40b093 1530->1537 1533 40afcd-40afec 1531->1533 1534 40afff-40b00c 1531->1534 1532->1526 1535 40aff0-40affa 1532->1535 1533->1532 1541 40b07c-40b07e 1534->1541 1542 40b00e 1534->1542 1538 40b06a-40b079 1535->1538 1539 40affc-40affd 1535->1539 1543 40b023 1536->1543 1544 40b025-40b031 1536->1544 1547 40b097 1537->1547 1548 40b099-40b0a8 1537->1548 1538->1541 1539->1534 1545 40b080-40b08c 1541->1545 1546 40b0ef-40b12f call 406000 VirtualAlloc 1541->1546 1542->1530 1543->1544 1549 40b035 1544->1549 1550 40b037-40b047 1544->1550 1545->1537 1560 40b135-40b156 GetAdaptersInfo 1546->1560 1561 40b218-40b245 call 406000 call 406024 call 406048 call 406000 1546->1561 1547->1548 1551 40b0aa-40b0ae 1548->1551 1549->1550 1550->1551 1552 40b04b-40b064 1550->1552 1557 40b0cf-40b0d2 1551->1557 1556 40b066-40b068 1552->1556 1552->1557 1556->1538 1563 40b1d1-40b1d4 1560->1563 1564 40b158 1560->1564 1566 40b1f3-40b210 VirtualFree 1563->1566 1567 40b1d6-40b1ee call 406824 lstrlenW call 406bf0 1563->1567 1568 40b1a6-40b1aa 1564->1568 1567->1566 1568->1563 1572 40b1ac-40b1cf call 4068b8 call 406bb8 1568->1572 1572->1563 1583 40b15a-40b1a3 call 4065e4 call 406748 call 40690c call 406b08 1572->1583 1583->1568
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID:
                          • String ID: 0.0.0.0$F
                          • API String ID: 0-452060436
                          • Opcode ID: 2a6c131034388f8d9889459684d51d086998981654a91101e349bcbbc586d5cc
                          • Instruction ID: 7c67fad2cec015ab4b7a5546781026ce6c847b665e773b684073d7118db0c2e7
                          • Opcode Fuzzy Hash: 2a6c131034388f8d9889459684d51d086998981654a91101e349bcbbc586d5cc
                          • Instruction Fuzzy Hash: A4B1046114E3C15FD7139B7498A169ABFB0EE17214B1E00E7D4C0EF1E3D66C195AC3AA
                          APIs
                            • Part of subcall function 00427BF0: RegOpenKeyW.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce,?,?,00486680,?), ref: 00427C1A
                          • GetUserNameW.ADVAPI32(?,00000200), ref: 0043B72B
                            • Part of subcall function 0040B0EC: VirtualAlloc.KERNEL32(00000000,00001400,00001000,00000004,00000000,0040B246,?,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040B123
                            • Part of subcall function 0040B0EC: GetAdaptersInfo.IPHLPAPI(00000000,00001400,00000000,0040B211,?,00000000,00001400,00001000,00000004,00000000,0040B246,?,?,00000000,00000000,00000000), ref: 0040B152
                            • Part of subcall function 0040B0EC: lstrlenW.KERNEL32(00000000,?,?,00000000,00001400,00001000,00000004,00000000,0040B246,?,?,00000000,00000000,00000000,00000000,00000000), ref: 0040B1DF
                            • Part of subcall function 0040B0EC: VirtualFree.KERNEL32(00000000,00000000,00008000,0040B218,00001000,00000004,00000000,0040B246,?,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040B20B
                            • Part of subcall function 0040ACA4: lstrlenW.KERNEL32(00000000,?,?,00486730,?), ref: 0040ACDD
                            • Part of subcall function 0043C2AC: GlobalMemoryStatusEx.KERNEL32 ref: 0043C2B7
                            • Part of subcall function 0043C2D4: RegOpenKeyW.ADVAPI32(80000002,HARDWARE\DESCRIPTION\System\CentralProcessor,?,00000000,0043C469,?,00000002,00486680), ref: 0043C318
                            • Part of subcall function 0043C2D4: RegEnumKeyW.ADVAPI32(?,?,?,00000040,00000000,0043C447,?,?,00000002,00486680), ref: 0043C351
                            • Part of subcall function 0043C2D4: RegOpenKeyW.ADVAPI32(80000002,00000000,0000003A,?,?,00000002,00486680), ref: 0043C390
                            • Part of subcall function 0043C2D4: RegQueryValueExW.KERNEL32(0000003A,~MHz,00000000,00000000,?,00000040,00000000,0043C425,?,?,?,00000002,00486680), ref: 0043C3C4
                            • Part of subcall function 0043C658: InternetGetConnectedState.WININET(?,00000000,?,00486680,0043B873,0043BA34,00A4294C,0043BA34,00A4292C,0043BA34,?,0043BA34,?,0043BA34, MB,?), ref: 0043C66A
                            • Part of subcall function 0043B35C: GetForegroundWindow.USER32(?,000003FF,00486680,0043B8B9,0043BA34,?,00000000,00000000), ref: 0043B36F
                            • Part of subcall function 0043B35C: GetWindowTextW.USER32(00000000,?,000003FF), ref: 0043B375
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Open$VirtualWindowlstrlen$AdaptersAllocConnectedEnumForegroundFreeGlobalInfoInternetMemoryNameQueryStateStatusTextUserValue
                          • String ID: MB$@gH$@gH$C:\
                          • API String ID: 3434385230-2973181092
                          • Opcode ID: 4f48c9de3cda0115ec832ecf11d9d9feee6ff355f540fe7681a8a34cc361780f
                          • Instruction ID: 7cb58423bf7c1c3c0e2f814128eb90f27155dc95f18c3384b941ec3d68523260
                          • Opcode Fuzzy Hash: 4f48c9de3cda0115ec832ecf11d9d9feee6ff355f540fe7681a8a34cc361780f
                          • Instruction Fuzzy Hash: 51B15271A002189FCB11EB65CC42BDE77B5EF88308F5050BBB608B6192DB789E549F9D
                          APIs
                          • VirtualAlloc.KERNEL32(00000000,00001400,00001000,00000004,00000000,0040B246,?,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040B123
                          • GetAdaptersInfo.IPHLPAPI(00000000,00001400,00000000,0040B211,?,00000000,00001400,00001000,00000004,00000000,0040B246,?,?,00000000,00000000,00000000), ref: 0040B152
                          • lstrlenW.KERNEL32(00000000,?,?,00000000,00001400,00001000,00000004,00000000,0040B246,?,?,00000000,00000000,00000000,00000000,00000000), ref: 0040B1DF
                          • VirtualFree.KERNEL32(00000000,00000000,00008000,0040B218,00001000,00000004,00000000,0040B246,?,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040B20B
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Virtual$AdaptersAllocFreeInfolstrlen
                          • String ID: 0.0.0.0
                          • API String ID: 918083892-3771769585
                          • Opcode ID: 46efe75c8fefb3497d33d61d65303aa8220a8ebf35c6b56fbaafddf4be0a787a
                          • Instruction ID: d9e483307b11907a1b336cc8d58400cd9b3fb6a4ef8d040ba9d6bd8e813edc8e
                          • Opcode Fuzzy Hash: 46efe75c8fefb3497d33d61d65303aa8220a8ebf35c6b56fbaafddf4be0a787a
                          • Instruction Fuzzy Hash: DC419270A40209AFEB01EB95CC92B9E77B8EB48304F5044BAF101F72D1D778AE14DB99
                          APIs
                          • VirtualAlloc.KERNEL32(00000000,00001400,00001000,00000004,00000000,0040B246,?,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040B123
                          • GetAdaptersInfo.IPHLPAPI(00000000,00001400,00000000,0040B211,?,00000000,00001400,00001000,00000004,00000000,0040B246,?,?,00000000,00000000,00000000), ref: 0040B152
                          • lstrlenW.KERNEL32(00000000,?,?,00000000,00001400,00001000,00000004,00000000,0040B246,?,?,00000000,00000000,00000000,00000000,00000000), ref: 0040B1DF
                          • VirtualFree.KERNEL32(00000000,00000000,00008000,0040B218,00001000,00000004,00000000,0040B246,?,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040B20B
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Virtual$AdaptersAllocFreeInfolstrlen
                          • String ID: 0.0.0.0
                          • API String ID: 918083892-3771769585
                          • Opcode ID: 48b6070fba64015d418916281c6685b59ad927041b6f855332d054a9411848ba
                          • Instruction ID: 345194b246f3f78a7eeabf9d29f519d3052a89449da55eb1e22a777874124a90
                          • Opcode Fuzzy Hash: 48b6070fba64015d418916281c6685b59ad927041b6f855332d054a9411848ba
                          • Instruction Fuzzy Hash: 26217C70640204AFEB11EBA9CCA6BAE77A8EB49304F1044BAF500F73D1D778AD50C69D
                          APIs
                          • GetLogicalDriveStringsW.KERNEL32(00000202,?,00000000,00428009), ref: 00427F25
                          • QueryDosDeviceW.KERNEL32(00000000,?,?,00000072,00000202,?,00000000,00428009), ref: 00427F7B
                          • lstrlenW.KERNEL32(?,00000000,?,?,00000072,00000202,?,00000000,00428009), ref: 00427F87
                          • StrCmpNIW.SHLWAPI(?,?,00000000,?,00000000,?,?,00000072,00000202,?,00000000,00428009), ref: 00427F97
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: DeviceDriveLogicalQueryStringslstrlen
                          • String ID:
                          • API String ID: 243930641-0
                          • Opcode ID: a7e4fb706dae23cce2e3905365d5b76be73495882ece122b121f7eb275b18a5a
                          • Instruction ID: c93e83704bf87b4d3c7b7635578ed03522896ac4e1c9abb0733d05025df9e800
                          • Opcode Fuzzy Hash: a7e4fb706dae23cce2e3905365d5b76be73495882ece122b121f7eb275b18a5a
                          • Instruction Fuzzy Hash: 51318775A052189FDB60EB25DC49A9E73B8EB48300F5185FBF409E3251EE38DE548F58
                          APIs
                          • recv.WS2_32(?,?,?,00000000), ref: 0042B125
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: recv
                          • String ID: HfH$L'
                          • API String ID: 1507349165-3701047491
                          • Opcode ID: 0272ce9c849f8c6d811af1e5df7b7681194580765fc890da592de9060105d8cb
                          • Instruction ID: 49d7582d12393c64e2f5e9e79eb284682d70d8ba065f8d5d5eb48f77bec2bdeb
                          • Opcode Fuzzy Hash: 0272ce9c849f8c6d811af1e5df7b7681194580765fc890da592de9060105d8cb
                          • Instruction Fuzzy Hash: D5513E34700624DFC710DF99E884A6E73E4EF49354FA080AAF958D7361C738AD45DBA9
                          APIs
                          • GetUserDefaultUILanguage.KERNEL32(00000003,?,00000004,00000000,0040888C,?,?), ref: 004087FE
                          • GetLocaleInfoW.KERNEL32(?,00000003,?,00000004,00000000,0040888C,?,?), ref: 00408807
                            • Part of subcall function 00408694: FindFirstFileW.KERNEL32(00000000,?,00000000,004086F2,?,00000001), ref: 004086C7
                            • Part of subcall function 00408694: FindClose.KERNEL32(00000000,00000000,?,00000000,004086F2,?,00000001), ref: 004086D7
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Find$CloseDefaultFileFirstInfoLanguageLocaleUser
                          • String ID:
                          • API String ID: 3216391948-0
                          • Opcode ID: b74bd6e88f2ca2989f644b2d03fbc3aabc39af979b7b3b976e283b47028c6e25
                          • Instruction ID: 27674f643491317e8211ebe2d51140b4d1dfb9d7c3ccf30eb47042a46c7f6e4d
                          • Opcode Fuzzy Hash: b74bd6e88f2ca2989f644b2d03fbc3aabc39af979b7b3b976e283b47028c6e25
                          • Instruction Fuzzy Hash: 67116070A001099FDB04FBA6D982AAEB3B8EF44304F51847FF945B32C1DB785E148A69
                          APIs
                          • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,?,00486734,00486680), ref: 0043BC22
                          • AdjustTokenPrivileges.KERNELBASE(?,00000000,00000001,00000000,00000000,?), ref: 0043BC44
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AdjustLookupPrivilegePrivilegesTokenValue
                          • String ID:
                          • API String ID: 3615134276-0
                          • Opcode ID: b46e0a6c81155ca4765af0d3e3cb63a2714ab48b711c5c54f844778fbb357d1b
                          • Instruction ID: a9ba86f5f9e92247e91d8cbb9874f1db19a78722b72bb73f6d4517b978c5305e
                          • Opcode Fuzzy Hash: b46e0a6c81155ca4765af0d3e3cb63a2714ab48b711c5c54f844778fbb357d1b
                          • Instruction Fuzzy Hash: 6EF01272650118AFE700DB98DC81FBF73ECE749714F100165F914E7290DAB16E0487A5
                          APIs
                          • FindFirstFileW.KERNEL32(00000000,?,00000000,004086F2,?,00000001), ref: 004086C7
                          • FindClose.KERNEL32(00000000,00000000,?,00000000,004086F2,?,00000001), ref: 004086D7
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID:
                          • API String ID: 2295610775-0
                          • Opcode ID: d5e053f3a7f238d708fda4e07e630be6dcb5cbe159ac088ae637e70b0fe2281d
                          • Instruction ID: 4a504121526f8a262ed7674ff1de7294a9ef20f3b8a82b9cde2a0df277819a23
                          • Opcode Fuzzy Hash: d5e053f3a7f238d708fda4e07e630be6dcb5cbe159ac088ae637e70b0fe2281d
                          • Instruction Fuzzy Hash: 39F0E271500308AFC710FBB5CE1298EB7ECEB48314BA248BBB404F26C2EA3D9E10951C
                          APIs
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: InfoSystem
                          • String ID:
                          • API String ID: 31276548-0
                          • Opcode ID: 229177a228d713a9a14fcff98108d9cc5e97c52a54c35a4239ee1928f04f60af
                          • Instruction ID: 2d2288808e5448b03cee85edb9978ee3a4aa03205f7dde6b98229f7bffd1799a
                          • Opcode Fuzzy Hash: 229177a228d713a9a14fcff98108d9cc5e97c52a54c35a4239ee1928f04f60af
                          • Instruction Fuzzy Hash: CCA012104085020BC908E7294D4340F31801940118FC402247C5CA96C2E62D856442DB

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 40bde8-40bdeb 1 40bdf0-40bdf5 0->1 1->1 2 40bdf7-40be26 call 40adb8 call 406824 LoadLibraryW 1->2 7 40c20a-40c229 call 40adb8 call 406824 LoadLibraryW 2->7 8 40be2c-40c205 call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac 2->8 17 40c252-40c277 call 40adb8 call 406824 LoadLibraryW 7->17 18 40c22b-40c24d call 40adb8 call 406824 call 40a4ac 7->18 8->7 34 40cc16-40cc3b call 40adb8 call 406824 LoadLibraryW 17->34 35 40c27d-40cc11 call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac 17->35 18->17 51 40cc41-40ce37 call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac 34->51 52 40ce3c-40ce61 call 40adb8 call 406824 LoadLibraryW 34->52 35->34 51->52 69 40ce63-40ce85 call 40adb8 call 406824 call 40a4ac 52->69 70 40ce8a-40ceaf call 40adb8 call 406824 LoadLibraryW 52->70 69->70 98 40d014-40d039 call 40adb8 call 406824 LoadLibraryW 70->98 99 40ceb5-40d00f call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac 70->99 124 40d0b0-40d0d5 call 40adb8 call 406824 LoadLibraryW 98->124 125 40d03b-40d0ab call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac 98->125 99->98 152 40d0d7-40d147 call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac 124->152 153 40d14c-40d176 call 406060 * 2 124->153 125->124 152->153
                          APIs
                          • LoadLibraryW.KERNEL32(00000000,00000000,00000000,0040D177,?,00486680,00000040,00000000,00000000,?,0043F7AA,00000000,0043FD8B,?,?,00486664), ref: 0040C220
                          • LoadLibraryW.KERNEL32(00000000,00000000,00000000,00000000,0040D177,?,00486680,00000040,00000000,00000000,?,0043F7AA,00000000,0043FD8B), ref: 0040C26E
                          • LoadLibraryW.KERNEL32(00000000,00000000,00000000,00000000,00000000,0040D177,?,00486680,00000040,00000000,00000000,?,0043F7AA,00000000,0043FD8B), ref: 0040CC32
                          • LoadLibraryW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,0040D177,?,00486680,00000040,00000000,00000000,?,0043F7AA,00000000,0043FD8B), ref: 0040CE58
                          • LoadLibraryW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,0040D177,?,00486680,00000040,00000000,00000000,?,0043F7AA,00000000), ref: 0040CEA6
                          • LoadLibraryW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,0040D177,?,00486680,00000040,00000000,00000000,?,0043F7AA), ref: 0040D030
                          • LoadLibraryW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,0040D177,?,00486680,00000040,00000000,00000000), ref: 0040D0CC
                          • LoadLibraryW.KERNEL32(00000000,00000000,0040D177,?,00486680,00000040,00000000,00000000,?,0043F7AA,00000000,0043FD8B,?,?,00486664,00000000), ref: 0040BE1D
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,?), ref: 0040A4D0
                            • Part of subcall function 0040ADB8: lstrlenW.KERNEL32(00000000,?,?,00486734,00486680,00425F2B,00000000,00426187,?,00486680,00000000,00000000,?,0043F7A0,00000000,0043FD8B), ref: 0040ADD7
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,00000000), ref: 0040A4F2
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: LibraryLoad$AddressProc$lstrlen
                          • String ID: @g}l{gl}Fylg\{e^$@g}l{gl}Fylg^$@g}l{gl}JefzlAhgmel$@g}l{gl}Nl}Jffb`l^$@g}l{gl}Nl}Jfgglj}lmZ}h}l$@g}l{gl}Zl}Fy}`fg^$@g}l{gl}Zl}Jffb`l^$@g}l{gl}[lhmO`el$@yAeyHy`'MEE$A}}yX|l{p@gof^$Dhy_`l~FoO`el$Dhy_`{}|heBlp^$Efhm[lzf|{jl$Efjb[lzf|{jl$Fylg@gy|}Mlzb}fy$FylgD|}lq^$FylgJe`ykfh{m$FylgY{fjlzz$FylgY{fjlzz]fblg$JefzlAhgmel$JefzlJe`ykfh{m$JefzlMlzb}fy$Jefzl^`gmf~$JfypO`el^$J{lh}lD|}lq^$J{lh}lM`{lj}f{p^$J{lh}lO`elDhyy`gn^$J{lh}lO`el^$J{lh}lY`yl$J{lh}lY{fjlzz^$J{lh}l]a{lhm$Kefjb@gy|}$Lg|d^`gmf~z$Lq`}Y{fjlzz$Lq`}^`gmf~zLq$M`zyh}jaDlzzhnl^$Mlel}lO`el^$NefkheDldf{pZ}h}|z$Nl}BlpZ}h}l$Nl}Dfm|elO`elGhdl^$Nl}Dlzzhnl^$Nl}EfgnYh}aGhdl^$Nl}Hmhy}l{z@gof$Nl}HzpgjBlpZ}h}l$Nl}Je`ykfh{mMh}h$Nl}JehzzGhdl^$Nl}Jfdy|}l{Ghdl^$Nl}J|{{lg}Y{fjlzz$Nl}J|{{lg}Y{fjlzz@m$Nl}M`zbO{llZyhjlLq^$Nl}Mlzb}fy^`gmf~$Nl}O`elZ`sl$Nl}Y{fjlzz]`dlz$Nl}Zpz}ldDl}{`jz$Nl}Zpz}ld]`dlHzO`el]`dl$Nl}\zl{Ghdl^$Nl}]`jbJf|g}$Nl}]a{lhmJfg}lq}$Nl}^`gmf~]a{lhmY{fjlzz@m$Nl}_fe|dl@gof{dh}`fg^$Nl}_l{z`fgLq^$O`el]`dl]fEfjheO`el]`dl$O`el]`dl]fZpz}ld]`dl$O`gmGlq}O`el^$O`gmJefzl$O`gmO`{z}O`el^$O`gm[lzf|{jl^$O`gm^`gmf~Lq^$O`gm^`gmf~^$Oehza^`gmf~$O{ll[lzf|{jl$Yh}a@zM`{lj}f{p^$Yh}aO`elLq`z}z^$YllbGhdlmY`yl$ZANl}Yh}aO{fd@ME`z}^$ZANl}Zylj`heOfeml{Efjh}`fg$ZaleeLqlj|}l^$Zl}J|{zf{Yfz$Zl}L{{f{Dfml$Zl}O`elH}}{`k|}lz^$Zl}O`elYf`g}l{$Zl}Zpz}ldJ|{zf{$Zl}]a{lhmJfg}lq}$Zl}]a{lhmMlzb}fy$Zpz}ldYh{hdl}l{z@gof^$Z}{JdyG@^$[lelhzlD|}lq$[lelhzlMJ$[lhmO`el$[lhmY{fjlzzDldf{p$[lnFylgBlp^$[lnJefzlBlp$[lnJ{lh}lBlp^$[lnLg|dBlp^$[lnLg|d_he|l^$[lnMlel}lBlp^$[lnMlel}l_he|l^$[lnX|l{p_he|lLq^$[lnZl}_he|lLq^$[lz|dl]a{lhm$\[EDFG'MEE$\[EMf~gefhm]fO`el^$\gdhy_`l~FoO`el$]l{d`gh}lY{fjlzz$]l{d`gh}l]a{lhm$]{hgzeh}lDlzzhnl$^`gLqlj$^h`}Of{Z`gnelFkclj}$^{`}lO`el$^{`}lY{fjlzzDldf{p$_`{}|heHeefjLq$bl{gle:;'MEE$ez}{jyp^$zae~hy`'MEE$zalee:;'MEE$|zl{:;'MEE$~`g`gl}'MEE
                          • API String ID: 2738378989-3024355689
                          • Opcode ID: 425d9794fa0212803315e0c732f6b49e0cda1e53e6c546beca72f7af03797b15
                          • Instruction ID: 4438aff9bfd592f4c2ae5199af2438c9166828cfa366d28cfe1c4cb90c63c00d
                          • Opcode Fuzzy Hash: 425d9794fa0212803315e0c732f6b49e0cda1e53e6c546beca72f7af03797b15
                          • Instruction Fuzzy Hash: 19A2AFB49113049BC740BBB6CCC29DD76ADEF45318F40857BB405BB282DA7C9D648BAE

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 794 428f34-429bca call 404444 * 2 799 429bcd-429bdb Sleep 794->799 800 429bdd-429bef 799->800 802 429bf5-429c14 800->802 803 429c8c-429c94 800->803 820 429c36-429c44 802->820 821 429c16-429c1a 802->821 804 429c9a-429cb0 803->804 805 429e8f-429e95 803->805 808 429cb2-429cc6 804->808 809 429cc8-429ccb 804->809 805->800 806 429e9b 805->806 806->799 816 429d1f-429d26 call 428c28 808->816 810 429ce3-429ceb 809->810 811 429ccd-429ce1 809->811 813 429cf2-429cf3 810->813 814 429ced-429cf1 810->814 811->816 818 429cf5-429d09 813->818 819 429d0b-429d1b 813->819 814->813 827 429d2b-429d39 816->827 818->816 819->816 831 429c66-429c6a 820->831 832 429c46-429c4a 820->832 821->820 823 429c1c-429c1f 821->823 823->820 824 429c21-429c24 823->824 824->820 830 429c26-429c31 824->830 828 429d45-429d51 call 428efc 827->828 829 429d3b-429d40 827->829 839 429d57-429d8c call 43cfc4 call 406824 lstrlenW 828->839 840 429de5-429df1 call 428f18 828->840 829->799 830->805 835 429c7c-429c87 831->835 836 429c6c-429c77 831->836 832->831 834 429c4c-429c4f 832->834 834->831 838 429c51-429c54 834->838 835->805 836->805 838->831 841 429c56-429c61 838->841 854 429d8e-429d96 call 4064fc 839->854 855 429d9f-429de0 call 406824 lstrcatW * 2 call 428c28 839->855 845 429df7-429e2c call 43cfc4 call 406824 lstrlenW 840->845 846 429e85-429e8a 840->846 841->805 863 429e2e-429e36 call 4064fc 845->863 864 429e3f-429e80 call 406824 lstrcatW * 2 call 428c28 845->864 846->799 854->855 855->799 863->864 864->799
                          APIs
                          • Sleep.KERNEL32(0000000A,00000000,00429EB6), ref: 00429BCF
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID: [Alt]$[BackSpace]$[Back]$[CTRL]$[Clear]$[Delete]$[End]$[Enter]$[Esc]$[F10]$[F11]$[F12]$[F1]$[F2]$[F3]$[F4]$[F5]$[F6]$[F7]$[F8]$[F9]$[Home]$[Insert]$[Menu]$[Num Lock]$[PageDown]$[PageUp]$[PageuUp]$[Pause Break]$[Print Screen]$[Scroll Lock]$[Shift]$[Spacebar]$[Tab]$[WIN]$e
                          • API String ID: 3472027048-2255270817
                          • Opcode ID: 50002126579f975027b60eaadddd517dd50aebb1f2973432fdbf9623df31c46a
                          • Instruction ID: 7a769bc3b6039aef3f797a9a906739d524dcf141c6a805c23f595b0cd5203b06
                          • Opcode Fuzzy Hash: 50002126579f975027b60eaadddd517dd50aebb1f2973432fdbf9623df31c46a
                          • Instruction Fuzzy Hash: 6982BBB0B01A56AFD784CF38E544795FAE4FB09304F81822BA52CDB340D779A964CF99

                          Control-flow Graph

                          APIs
                          • LoadLibraryW.KERNEL32(00000000,00000000,00431AB5,?,00486680,00000000,00000000,?,00437EA6,?,00000000,00437F69,?,00000000,00000000,00000000), ref: 004318A4
                          • GetModuleHandleW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004319C9
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,?), ref: 0040A4D0
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,00000000), ref: 0040A4F2
                            • Part of subcall function 0040ADB8: lstrlenW.KERNEL32(00000000,?,?,00486734,00486680,00425F2B,00000000,00426187,?,00486680,00000000,00000000,?,0043F7A0,00000000,0043FD8B), ref: 0040ADD7
                          • LoadLibraryW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00431A4D
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc$HandleModulelstrlen
                          • String ID: J{lh}lJfdyh}`kelMJ$J{lh}lM@KZlj}`fg$K`}Ke}$M^DHY@'MEE$Mlel}lFkclj}$Mlel}lMJ$M~d@zJfdyfz`}`fgLghkelm$M~dLghkelJfdyfz`}`fg$Nl}J|{zf{@gof$Nl}J|{zf{Yfz$Nl}J|{{lg}Fkclj}$Nl}M@K`}z$Nl}MJ$Zlelj}Fkclj}$nm`:;'MEE$|zl{:;'MEE
                          • API String ID: 9417994-4209024249
                          • Opcode ID: 46f01f209ac1517e14f76089b48cfb9a6098342ea4fa0bf20f801332cc3d7d5f
                          • Instruction ID: d210e15e72295cd6b726f6c75a30a71111ee1474a08510ed185e98678324d597
                          • Opcode Fuzzy Hash: 46f01f209ac1517e14f76089b48cfb9a6098342ea4fa0bf20f801332cc3d7d5f
                          • Instruction Fuzzy Hash: CB517D759113049BCB40FBA6CC828DE77ADEF48318F41993BB401B6396EA7C98144BAD

                          Control-flow Graph

                          APIs
                          • GetForegroundWindow.USER32(00000000,00428E6C), ref: 00428C51
                          • GetWindowTextW.USER32(?,?,00000200), ref: 00428C9C
                            • Part of subcall function 00428094: IsWow64Process.KERNEL32(00000000,?,?,00000000,00428168), ref: 00428115
                          • EnterCriticalSection.KERNEL32(00486718,[,?,[,?,[,?,[), ref: 00428D2A
                          • lstrlenW.KERNEL32(00000000,00000000,00428DB4,?,00486718,[,?,[,?,[,?,[), ref: 00428D46
                          • SetFilePointer.KERNEL32(0000022C,00000000,00000000,00000002,00000000,00000000,00428DB4,?,00486718,[,?,[,?,[,?,[), ref: 00428D74
                          • WriteFile.KERNEL32(0000022C,00000000,00000000,?,00000000,?,00486718,[,?,[,?,[,?,[), ref: 00428D96
                          • LeaveCriticalSection.KERNEL32(00486718,00428DBB,?,[,?,[,?,[), ref: 00428DAE
                          • lstrlenW.KERNEL32(?,00000000,00428E6C), ref: 00428DBF
                          • EnterCriticalSection.KERNEL32(00486718,?,00000000,00428E6C), ref: 00428DDB
                          • SetFilePointer.KERNEL32(0000022C,00000000,00000000,00000002,00000000,00428E3F,?,00486718,?,00000000,00428E6C), ref: 00428E04
                          • WriteFile.KERNEL32(0000022C,?,00000000,?,00000000,?,00486718,?,00000000,00428E6C), ref: 00428E21
                          • LeaveCriticalSection.KERNEL32(00486718,00428E46,00000000,00428E6C), ref: 00428E39
                            • Part of subcall function 0040BAE8: FileTimeToLocalFileTime.KERNEL32(?,?,00000000,0040BC14,?,?,?,00486680), ref: 0040BB24
                            • Part of subcall function 0040BAE8: FileTimeToSystemTime.KERNEL32(?,?,?,?,?,00486680), ref: 0040BB3A
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: File$CriticalSectionTime$EnterLeavePointerWindowWritelstrlen$ForegroundLocalProcessSystemTextWow64
                          • String ID: [$[$[$[$4gH
                          • API String ID: 3089754618-4231738031
                          • Opcode ID: 516d951e6b0bf63265b8909b6487c8250a738bae045213ac14c3181f4215715e
                          • Instruction ID: cd6cea95f2fdff4dc38500494d2ec49a0396264a133fbde8197061e77fe4df3e
                          • Opcode Fuzzy Hash: 516d951e6b0bf63265b8909b6487c8250a738bae045213ac14c3181f4215715e
                          • Instruction Fuzzy Hash: B2511975700608AFDB00DF99DC85E8EBBF9EB49304F814069F504E72A2DB38ED548B68

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 997 4082b8-4082e1 call 4060e4 1000 4082e3-4082f6 GetModuleFileNameW 997->1000 1001 4082f8-40830d call 406824 call 407aec 997->1001 1002 408312-40831a 1000->1002 1001->1002 1005 408320-408341 RegOpenKeyExW 1002->1005 1006 4084c7-4084dc call 406000 1002->1006 1009 4083e1-40841b call 4080c8 RegQueryValueExW 1005->1009 1010 408347-408363 RegOpenKeyExW 1005->1010 1018 408450-40846a RegQueryValueExW 1009->1018 1019 40841d-40844e call 403f34 RegQueryValueExW call 40687c 1009->1019 1010->1009 1013 408365-408381 RegOpenKeyExW 1010->1013 1013->1009 1016 408383-40839f RegOpenKeyExW 1013->1016 1016->1009 1017 4083a1-4083bd RegOpenKeyExW 1016->1017 1017->1009 1020 4083bf-4083db RegOpenKeyExW 1017->1020 1022 40849b-4084ac 1018->1022 1023 40846c-408496 call 403f34 RegQueryValueExW call 40687c 1018->1023 1019->1022 1020->1006 1020->1009 1027 4084b6-4084bf RegCloseKey 1022->1027 1028 4084ae-4084b1 call 403f50 1022->1028 1023->1022 1028->1027
                          APIs
                          • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,004084DD,?,?), ref: 004082F1
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,004084DD,?,?), ref: 0040833A
                          • RegOpenKeyExW.ADVAPI32(80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,004084DD,?,?), ref: 0040835C
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000), ref: 0040837A
                          • RegOpenKeyExW.ADVAPI32(80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001), ref: 00408398
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002), ref: 004083B6
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001), ref: 004083D4
                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,004084C0,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,004084DD), ref: 00408414
                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,?,00000000,00000000,00000000,?,00000000,004084C0,?,80000001), ref: 0040843F
                          • RegCloseKey.ADVAPI32(?,004084C7,00000000,00000000,?,?,?,00000000,00000000,00000000,?,00000000,004084C0,?,80000001,Software\Embarcadero\Locales), ref: 004084BA
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Open$QueryValue$CloseFileModuleName
                          • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales$Software\CodeGear\Locales$Software\Embarcadero\Locales
                          • API String ID: 2701450724-3496071916
                          • Opcode ID: 014a0b9b99b7be46c737f40711a5b5c9164359921bb32e17d70cbc9f2a686574
                          • Instruction ID: f754047bae0af19bad0102a25d5850afbc03eb5733155dacdeeb846caf687fb8
                          • Opcode Fuzzy Hash: 014a0b9b99b7be46c737f40711a5b5c9164359921bb32e17d70cbc9f2a686574
                          • Instruction Fuzzy Hash: A5513975B402097FEB20DAA5CD46FAE73BCEB08704F50447BBA44F65C1EAB89A40865D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1034 43f770-43f773 1035 43f778-43f77d 1034->1035 1035->1035 1036 43f77f-43f7b1 call 425f00 call 426564 call 40bde8 call 43dc14 1035->1036 1045 43f7b3-43f7b5 call 43d50c 1036->1045 1046 43f7ba-43f7e2 call 40b654 call 40b7c0 call 4063a0 call 437530 1036->1046 1045->1046 1056 43f803-43f80a call 43f5a0 1046->1056 1057 43f7e4-43f7fe GetForegroundWindow call 40b5e8 call 43d50c 1046->1057 1063 43f811-43f8c5 call 406a80 * 6 call 40b948 call 406a80 call 40b7c0 call 4063a0 call 43f440 call 43e9c4 1056->1063 1064 43f80c call 43acb0 1056->1064 1057->1056 1090 43f8c7-43f8db call 406824 call 43a34c 1063->1090 1091 43f8e4-43f8e8 1063->1091 1064->1063 1090->1091 1108 43f8dd-43f8df call 43d50c 1090->1108 1092 43f8ea-43f8f8 call 4063a0 1091->1092 1093 43f8fd-43f90d call 40b918 1091->1093 1101 43fc9e-43fca5 call 43e9c4 1092->1101 1102 43f913-43f920 call 40b918 1093->1102 1103 43fa40-43fa50 call 40b918 1093->1103 1115 43fcb2-43fcc9 call 406824 call 43a34c 1101->1115 1116 43fca7-43fcad call 43ee98 1101->1116 1102->1103 1113 43f926-43f936 call 40b918 1102->1113 1103->1101 1114 43fa56-43fa61 call 43a2cc 1103->1114 1108->1091 1113->1103 1125 43f93c-43f968 call 428590 call 40adb8 call 406824 1113->1125 1126 43fa63-43fa84 call 406824 call 43d50c 1114->1126 1127 43fa89-43fa8d 1114->1127 1135 43fd17 call 437e38 1115->1135 1136 43fccb-43fcda call 437e1c 1115->1136 1116->1115 1182 43f982-43f989 call 43d72c 1125->1182 1183 43f96a-43f971 call 43d5d4 1125->1183 1126->1127 1129 43fa93-43faa8 call 406824 call 43a34c 1127->1129 1130 43fb4e-43fb55 1127->1130 1159 43fab1-43fab8 call 43e9c4 1129->1159 1160 43faaa-43faac call 43d50c 1129->1160 1130->1101 1138 43fb5b-43fb6b call 40b918 1130->1138 1148 43fd1c-43fd8a call 406060 call 406024 call 406060 call 406024 call 406060 call 406024 call 406060 1135->1148 1152 43fcee-43fcf0 1136->1152 1153 43fcdc-43fce0 1136->1153 1138->1101 1156 43fb71-43fb8a call 40b4dc call 43d258 1138->1156 1163 43fcf2-43fcfc call 43e060 1152->1163 1164 43fcfe-43fd02 1152->1164 1153->1152 1158 43fce2-43fcec call 43e060 1153->1158 1190 43fb90-43fb94 1156->1190 1191 43fc97-43fc99 call 40b564 1156->1191 1158->1135 1185 43faba-43fadd call 406824 * 2 call 43e810 1159->1185 1186 43faef-43fb3c call 43edd8 call 43ea38 call 406824 * 2 call 43e810 1159->1186 1160->1159 1163->1135 1165 43fd10-43fd12 call 43e060 1164->1165 1166 43fd04-43fd0e call 43e060 1164->1166 1165->1135 1166->1135 1204 43f98b-43f995 call 43dd30 call 43dd80 1182->1204 1205 43f99a-43f99e 1182->1205 1183->1182 1210 43f973-43f97d call 43dd30 call 43dd80 1183->1210 1185->1101 1251 43fae3-43faea call 43d50c 1185->1251 1186->1101 1283 43fb42-43fb49 call 43d50c 1186->1283 1198 43fb96-43fbb3 call 40adb8 call 42847c 1190->1198 1199 43fbb5-43fbb9 1190->1199 1191->1101 1198->1199 1218 43fbc7-43fbdd call 406824 call 43a454 1198->1218 1208 43fbbb 1199->1208 1209 43fbdf-43fbe6 call 43e9c4 1199->1209 1204->1148 1216 43f9a0-43f9a7 call 43f64c 1205->1216 1217 43f9b8-43f9bc 1205->1217 1208->1218 1233 43fc34-43fc8e call 43edd8 call 43ec2c call 4066e4 call 406654 1209->1233 1234 43fbe8-43fc29 call 43ebac call 4066e4 call 406654 1209->1234 1210->1148 1216->1217 1252 43f9a9-43f9b3 call 43dd30 call 43dd80 1216->1252 1223 43f9be-43f9cb call 43f11c 1217->1223 1224 43f9cd-43f9fd call 43f11c call 406824 * 2 call 43e810 1217->1224 1218->1209 1274 43fbbd-43fbc2 Sleep 1218->1274 1258 43fa2c-43fa30 1223->1258 1224->1258 1296 43f9ff-43fa28 call 4066e4 call 406654 1224->1296 1233->1191 1303 43fc90-43fc92 call 43d50c 1233->1303 1234->1191 1297 43fc2b-43fc32 call 43d50c 1234->1297 1251->1101 1252->1148 1268 43fa32-43fa34 call 43aec8 1258->1268 1269 43fa39-43fa3b call 43d50c 1258->1269 1268->1269 1269->1103 1274->1218 1283->1101 1296->1258 1297->1191 1303->1191
                          APIs
                          • GetForegroundWindow.USER32(00000030,00000000,0043FD8B,?,?,00486664,00000000,00000000,?,004436A7,00000000,004436EF,?,?,00000021,00000000), ref: 0043F7E6
                            • Part of subcall function 0040B918: CompareStringW.KERNEL32(00000400,00000001,00000000,000000FF,00000000,000000FF,00486680,?,00437D4A,?,00000000,00437DA0,?,?,?,00486680), ref: 0040B939
                            • Part of subcall function 00428590: LoadLibraryW.KERNEL32(00000000,00000000,004286D4,?,?,00486680,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0043F2F2), ref: 004285C3
                            • Part of subcall function 00428590: LoadLibraryW.KERNEL32(00000000,00000000,00000000,004286D4,?,?,00486680,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042866C
                            • Part of subcall function 0043DD30: ShowWindow.USER32(0002047E,00000001,00486734,00486680,0043F9AE), ref: 0043DD3F
                            • Part of subcall function 0043DD80: UnregisterClassW.USER32(Regedit_fast_jump,00400000), ref: 0043DD8B
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: LibraryLoadWindow$ClassCompareForegroundShowStringUnregister
                          • String ID: $0_$$1_$$2_$$5_$4gH$GGT$Not Config$SOFTWARE\XXX_$WINDIR$XXX_$_:E`}l'lql$j3U}lz}U}lz}
                          • API String ID: 954628970-2741076856
                          • Opcode ID: ba1b297a2c8828a05f1b56c25951aa478554327dd0a177c7e5a506aad0e9947b
                          • Instruction ID: 5e7b73b35abb561ea2aea0d9688f48cf422379d0deacb349a846aead5bae2168
                          • Opcode Fuzzy Hash: ba1b297a2c8828a05f1b56c25951aa478554327dd0a177c7e5a506aad0e9947b
                          • Instruction Fuzzy Hash: 37E1A870A002154BDF10FB72D88279A33A5AF49308F10A4BBFC45AB697CB3D9D598B5D

                          Control-flow Graph

                          APIs
                          • LoadLibraryW.KERNEL32(00000000,00000000,0043007B,?,00486680,00000005,00000000,00000000,?,00437EAB,?,00000000,00437F69,?,00000000,00000000), ref: 0042FED1
                          • LoadLibraryW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,0043007B,?,00486680,00000005,00000000,00000000,?,00437EAB,?), ref: 0042FF30
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,?), ref: 0040A4D0
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,00000000), ref: 0040A4F2
                            • Part of subcall function 0040ADB8: lstrlenW.KERNEL32(00000000,?,?,00486734,00486680,00425F2B,00000000,00426187,?,00486680,00000000,00000000,?,0043F7A0,00000000,0043FD8B), ref: 0040ADD7
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc$lstrlen
                          • String ID: @J@gof$@JFylg$@JJefzl$@JJfdy{lzzf{O{ll$@JNl}@gof$@JZlgmDlzzhnl$@JZlxJfdy{lzzO{hdl$@JZlxJfdy{lzzO{hdlLgm$@JZlxJfdy{lzzO{hdlZ}h{}$DZ_O^:;'MEE$H_@JHY:;'MEE$jhyJ{lh}lJhy}|{l^`gmf~^
                          • API String ID: 268393782-1352645916
                          • Opcode ID: 089b21e976e5bb31fd2e61345d4ec2166a8204ce257b80a6789a54d5fa0b185f
                          • Instruction ID: b421654733045ff7ed06dadf9d5dc222b4f2467a359c68ce7b13b02f7cc919b0
                          • Opcode Fuzzy Hash: 089b21e976e5bb31fd2e61345d4ec2166a8204ce257b80a6789a54d5fa0b185f
                          • Instruction Fuzzy Hash: AA416D75910304ABCB40FBA5DC8299E77BDEF48318F41853BB401B6296EA7C9D144BAE

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1386 43c2d4-43c31c call 406000 RegOpenKeyW 1389 43c322-43c336 1386->1389 1390 43c44e-43c468 call 406060 1386->1390 1391 43c339-43c355 RegEnumKeyW 1389->1391 1393 43c357-43c394 call 4068d0 call 406a80 call 406824 RegOpenKeyW 1391->1393 1394 43c338 1391->1394 1402 43c39a-43c3c8 RegQueryValueExW 1393->1402 1403 43c42c-43c446 RegCloseKey 1393->1403 1394->1391 1404 43c40a-43c424 1402->1404 1405 43c3ca-43c405 call 40aca4 * 2 call 406b08 1402->1405 1405->1404
                          APIs
                          • RegOpenKeyW.ADVAPI32(80000002,HARDWARE\DESCRIPTION\System\CentralProcessor,?,00000000,0043C469,?,00000002,00486680), ref: 0043C318
                          • RegEnumKeyW.ADVAPI32(?,?,?,00000040,00000000,0043C447,?,?,00000002,00486680), ref: 0043C351
                          • RegOpenKeyW.ADVAPI32(80000002,00000000,0000003A,?,?,00000002,00486680), ref: 0043C390
                          • RegQueryValueExW.KERNEL32(0000003A,~MHz,00000000,00000000,?,00000040,00000000,0043C425,?,?,?,00000002,00486680), ref: 0043C3C4
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Open$EnumQueryValue
                          • String ID: x $@$HARDWARE\DESCRIPTION\System\CentralProcessor$HARDWARE\DESCRIPTION\System\CentralProcessor\$MHz$~MHz
                          • API String ID: 2932278830-2698563692
                          • Opcode ID: 032ba24bc71f7c23bc6ff2f5b2645199532157326f691768a03b02e7855eee6c
                          • Instruction ID: 465dbdd7c3b0a8fd04efb47e2e56d6c7e569cc34325a4f915b8280196c181288
                          • Opcode Fuzzy Hash: 032ba24bc71f7c23bc6ff2f5b2645199532157326f691768a03b02e7855eee6c
                          • Instruction Fuzzy Hash: AC415275A00208AFD701DBE9CC91EAEB7F8EB8D704F118076F501E7294DA78AD15CB58

                          Control-flow Graph

                          APIs
                          • LoadLibraryW.KERNEL32(00000000,00000000,004286D4,?,?,00486680,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0043F2F2), ref: 004285C3
                          • LoadLibraryW.KERNEL32(00000000,00000000,00000000,004286D4,?,?,00486680,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042866C
                            • Part of subcall function 0040ADB8: lstrlenW.KERNEL32(00000000,?,?,00486734,00486680,00425F2B,00000000,00426187,?,00486680,00000000,00000000,?,0043F7A0,00000000,0043FD8B), ref: 0040ADD7
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,?), ref: 0040A4D0
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,00000000), ref: 0040A4F2
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc$lstrlen
                          • String ID: Lg|dY{fjlzzDfm|elz$Lg|dY{fjlzzlz$Nl}Dfm|elO`elGhdlLq^$Nl}Y{fjlzz@dhnlO`elGhdl^$YzHy`'MEE$^]ZLg|dl{h}lY{fjlzzlz^$^]ZO{llDldf{p$^}zhy`:;'mee
                          • API String ID: 268393782-2693748152
                          • Opcode ID: ffa61641ab19f340686b4a17e72a16458ca9a0a1770ddef71ab0c5d47f97fb7c
                          • Instruction ID: b2abc951f42fac8fa2330dbee562f4288950d046d5c14a321555204371fbe9ee
                          • Opcode Fuzzy Hash: ffa61641ab19f340686b4a17e72a16458ca9a0a1770ddef71ab0c5d47f97fb7c
                          • Instruction Fuzzy Hash: F7318075A123159BCB41FBA5DC428DE77A9EF85318B81813BB400B7682DB3C9D144BAE

                          Control-flow Graph

                          APIs
                          • EnterCriticalSection.KERNEL32(0044CB84,00000000,00408088,?,?,?,00000000,?,00408950,00000000,004089AF,?,?,00000000,00000000,00000000), ref: 00407FA2
                          • LeaveCriticalSection.KERNEL32(0044CB84,0044CB84,00000000,00408088,?,?,?,00000000,?,00408950,00000000,004089AF,?,?,00000000,00000000), ref: 00407FC6
                          • LeaveCriticalSection.KERNEL32(0044CB84,0044CB84,00000000,00408088,?,?,?,00000000,?,00408950,00000000,004089AF,?,?,00000000,00000000), ref: 00407FD5
                          • IsValidLocale.KERNEL32(00000000,00000002,0044CB84,0044CB84,00000000,00408088,?,?,?,00000000,?,00408950,00000000,004089AF), ref: 00407FE7
                          • EnterCriticalSection.KERNEL32(0044CB84,00000000,00000002,0044CB84,0044CB84,00000000,00408088,?,?,?,00000000,?,00408950,00000000,004089AF), ref: 00408044
                          • LeaveCriticalSection.KERNEL32(0044CB84,0044CB84,00000000,00000002,0044CB84,0044CB84,00000000,00408088,?,?,?,00000000,?,00408950,00000000,004089AF), ref: 0040806D
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CriticalSection$Leave$Enter$LocaleValid
                          • String ID: en-GB,en,en-US,
                          • API String ID: 975949045-3021119265
                          • Opcode ID: f6d86eee62b6bf2d3840db3cc2fcc52f00c729b128c34464cea3ae48f6cc2a76
                          • Instruction ID: 89e35a22fce1ca92aca6ca6f157c9b85d33dba724616c188b81eab689516efc9
                          • Opcode Fuzzy Hash: f6d86eee62b6bf2d3840db3cc2fcc52f00c729b128c34464cea3ae48f6cc2a76
                          • Instruction Fuzzy Hash: A421EE3470564157E710B7BA9D9371A3188CB45748F66407FB081B62D7CEBCAC04877E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1493 43d9b0-43d9ce 1494 43d9f2-43da4a call 40a748 * 2 1493->1494 1495 43d9d0-43d9d3 1493->1495 1510 43da4f-43da9c call 4063e8 call 406824 SetWindowTextW call 406000 1494->1510 1496 43d9d9-43d9dc 1495->1496 1497 43db2e-43db38 call 43d834 1495->1497 1500 43d9e2-43d9e7 1496->1500 1501 43db1c-43db2c call 43dd80 1496->1501 1503 43db3d-43db64 DefWindowProcW call 406000 1497->1503 1504 43db00-43db09 1500->1504 1505 43d9ed 1500->1505 1501->1503 1511 43db69 1503->1511 1504->1503 1508 43db0b-43db13 1504->1508 1505->1503 1508->1503 1512 43db15-43db1a call 43d87c 1508->1512 1512->1503
                          APIs
                          • SetWindowTextW.USER32(000402A6,00000000), ref: 0043DA7F
                          • DefWindowProcW.USER32(?,?,?,?,00000000,0043DB6A), ref: 0043DB4D
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Window$ProcText
                          • String ID: BUTTON$EDIT$Fast jump$HKEY_CURRENT_USER\Control Panel\Desktop$MZP
                          • API String ID: 2218353596-2216858624
                          • Opcode ID: e69d02082d12059add0810c350757150de9edb807d28e4ce6e4d838992b731ef
                          • Instruction ID: 29dd7edaff14d80a172b70b85ca7432f0e91f08ba1914f13b3f7aed7ea465baa
                          • Opcode Fuzzy Hash: e69d02082d12059add0810c350757150de9edb807d28e4ce6e4d838992b731ef
                          • Instruction Fuzzy Hash: A8316F75A04208ABEB10EF69EC52F6E73E8EB0C700F525436F900EB2D1D678ED109769

                          Control-flow Graph

                          APIs
                          • OpenFileMappingW.KERNEL32(000F001F,00000000,00000000,00000000,0042AC2E,?,?,?,00000001,0000000D,00000000,00000000,?,0042A482), ref: 0042A825
                          • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000000,000F001F,00000000,00000000,00000000,0042AC2E,?,?,?,00000001,0000000D,00000000), ref: 0042A847
                            • Part of subcall function 0040ACA4: lstrlenW.KERNEL32(00000000,?,?,00486730,?), ref: 0040ACDD
                          • CloseHandle.KERNEL32(00000000,?,?,?,00000001,0000000D,00000000,00000000,?,0042A482), ref: 0042AC04
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: File$CloseHandleMappingOpenViewlstrlen
                          • String ID: /f&TleQ $GG-Team$Hr,g:
                          • API String ID: 1577053069-1553010781
                          • Opcode ID: 4e8d2ed8e5dc330a495821ac6da8edd1e0c939cf8e47830b426858d943a3eded
                          • Instruction ID: 88ff79b281bd7af9570e5b325977c4e31f3e4296546c137c43f7e8822453c311
                          • Opcode Fuzzy Hash: 4e8d2ed8e5dc330a495821ac6da8edd1e0c939cf8e47830b426858d943a3eded
                          • Instruction Fuzzy Hash: 51B1D630740629AFDB04DBA2DD41FEEB3B6FF88705F904126B500B61C1D7BC69249B9A

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1675 4289d0-4289fc 1676 428a02-428a29 InitializeCriticalSection call 42890c call 406824 PathFileExistsW 1675->1676 1677 428b96-428bb0 call 406060 1675->1677 1684 428acb-428b0a call 42890c call 406824 CreateFileW 1676->1684 1685 428a2f-428a4b call 428864 call 406824 PathFileExistsW 1676->1685 1698 428b26-428b28 1684->1698 1699 428b0c-428b24 WriteFile 1684->1699 1685->1684 1694 428a4d-428a81 call 428864 call 406824 1685->1694 1694->1684 1713 428a83-428a96 1694->1713 1701 428b66-428b7c call 405edc 1698->1701 1702 428b2a-428b61 call 40ae14 call 40b644 1698->1702 1699->1698 1706 428b81-428b88 1701->1706 1702->1701 1708 428b90-428b92 1706->1708 1709 428b8a-428b8e 1706->1709 1708->1677 1709->1708 1712 428b94 1709->1712 1712->1677 1717 428a98-428aa4 call 40b634 1713->1717 1718 428abe-428ac7 1713->1718 1717->1718 1721 428aa6-428aba 1717->1721 1718->1684 1721->1718
                          APIs
                          • InitializeCriticalSection.KERNEL32(00486750,00000000,00428BB1,?,?,00486734,00486680,00000000,00000000,00000000,00000000,00000000,00000000,?,00437E88,?), ref: 00428A06
                          • PathFileExistsW.SHLWAPI(00000000,00486750,00000000,00428BB1,?,?,00486734,00486680,00000000,00000000,00000000,00000000,00000000,00000000,?,00437E88), ref: 00428A25
                          • PathFileExistsW.SHLWAPI(00000000,?,?,00486734,00486680,00000000,00000000,00000000,00000000,00000000,00000000,?,00437E88,?,00000000,00437F69), ref: 00428A47
                            • Part of subcall function 0040B634: VirtualAlloc.KERNEL32(00000000,00000000,00001000,00000004,00428AA0,?,?,00486734,00486680,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040B63E
                          • CreateFileW.KERNEL32(00000000,C0000000,00000003,00000000,00000004,00000080,00000000,?,?,00486734,00486680,00000000,00000000,00000000,00000000,00000000), ref: 00428AF5
                          • WriteFile.KERNEL32(0000022C,00448D58,00000002,?,00000000,?,?,00486734,00486680,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00428B24
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: File$ExistsPath$AllocCreateCriticalInitializeSectionVirtualWrite
                          • String ID: 4gH
                          • API String ID: 106481530-2392367260
                          • Opcode ID: 641a12213c002d202eb040d692c47d83a4d590f8a8e8c087d38c8d42ee72e603
                          • Instruction ID: 29819a5de8cda6a99f4655cf52bdc728baad44d093ff2e3fce99fad4ffdf4ba8
                          • Opcode Fuzzy Hash: 641a12213c002d202eb040d692c47d83a4d590f8a8e8c087d38c8d42ee72e603
                          • Instruction Fuzzy Hash: 00513870701205AFE760DBA9DC82F5E77F8AB49704F50457AB600E72A1DF74ED088B29

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1722 40b654-40b683 GetModuleHandleW 1723 40b691-40b693 1722->1723 1724 40b685-40b68f LoadLibraryW 1722->1724 1725 40b719-40b733 call 406060 1723->1725 1726 40b699-40b6d7 call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac 1723->1726 1724->1723 1726->1725 1742 40b6d9-40b6ea GetCurrentProcess 1726->1742 1744 40b6f0-40b6f2 1742->1744 1745 40b6ec-40b6ee 1742->1745 1747 40b6f6-40b6f8 1744->1747 1745->1744 1746 40b6f4 1745->1746 1746->1747 1747->1725 1748 40b6fa-40b70b GetNativeSystemInfo 1747->1748 1749 40b717 1748->1749 1750 40b70d-40b711 1748->1750 1749->1725 1750->1749 1751 40b713-40b715 1750->1751 1751->1725
                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,0040B734,?,?,00486734,00486680), ref: 0040B67A
                          • LoadLibraryW.KERNEL32(kernel32.dll,kernel32.dll,00000000,0040B734,?,?,00486734,00486680), ref: 0040B68A
                          • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,00000000,kernel32.dll,00000000,0040B734,?,?,00486734,00486680), ref: 0040B6DD
                          • GetNativeSystemInfo.KERNEL32(?,?,?,00486734,00486680), ref: 0040B6FE
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CurrentHandleInfoLibraryLoadModuleNativeProcessSystem
                          • String ID: @z^f~?=Y{fjlzz$kernel32.dll
                          • API String ID: 407697875-2470416289
                          • Opcode ID: cf400a607496727c57d8b79e2d90979a375013f491e65cfe34c017647f0dda60
                          • Instruction ID: cc312165b627e4cdb14975307c8c75a868c5ce4217f7475409fe1e9344262d1c
                          • Opcode Fuzzy Hash: cf400a607496727c57d8b79e2d90979a375013f491e65cfe34c017647f0dda60
                          • Instruction Fuzzy Hash: 2121BE31901315AEC712ABB98C51AEF72A8EB85718F954437F800B73C1EB3C8C1596EE
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,00486734,00486680,0043F7AF,00000000,0043FD8B,?,?,00486664,00000000,00000000,?,004436A7,00000000,004436EF), ref: 0043DC42
                          • RegisterClassW.USER32(00486C08), ref: 0043DC52
                          • KiUserCallbackDispatcher.NTDLL(00000000,00000000,00486734,00486680,0043F7AF,00000000,0043FD8B,?,?,00486664,00000000,00000000,?,004436A7,00000000,004436EF), ref: 0043DC65
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CallbackClassDispatcherHandleModuleRegisterUser
                          • String ID: Regedit fast jump V1.2$Regedit_fast_jump
                          • API String ID: 2026650474-4282503210
                          • Opcode ID: cc5dc9e7916a9fd9ffcc6e7132985b69ea0554bfb4b0e75fc1fa52871a3855d4
                          • Instruction ID: ff227f2102c6a89d754623d3dc831d9a7ff48536fe2538a773c3bd321e84cfba
                          • Opcode Fuzzy Hash: cc5dc9e7916a9fd9ffcc6e7132985b69ea0554bfb4b0e75fc1fa52871a3855d4
                          • Instruction Fuzzy Hash: 16113AB5B517105FE3A0DF68ED85B6A32E4EB08708F01593EF645DB2D0DBB9A8048B49
                          APIs
                            • Part of subcall function 004265CC: socket.WS2_32(00000002,00000001,00000000), ref: 004265DB
                          • htons.WS2_32(?), ref: 00426637
                          • gethostbyname.WS2_32(00000000), ref: 00426665
                          • connect.WS2_32(?,00000008,00000010), ref: 00426690
                          • WSAGetLastError.WS2_32(?,?,00000000,00000000), ref: 004266B9
                          • Sleep.KERNEL32(00000002,?,?,00000000,00000000), ref: 004266CA
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: ErrorLastSleepconnectgethostbynamehtonssocket
                          • String ID:
                          • API String ID: 2864911191-0
                          • Opcode ID: 0d525b8fed161735b1c2b0090c4469bf3a874fd080ef476f2429f5e45fdea166
                          • Instruction ID: 0dd1b41a93d19dc09989b8233b659783f6ed969359d15ac89dd0c57dc2224665
                          • Opcode Fuzzy Hash: 0d525b8fed161735b1c2b0090c4469bf3a874fd080ef476f2429f5e45fdea166
                          • Instruction Fuzzy Hash: 50319F74A002149FCB10DFA5D985A9E77B8FF48314F5284BAE904EB291D738CD44CB69
                          APIs
                            • Part of subcall function 0040ACA4: lstrlenW.KERNEL32(00000000,?,?,00486730,?), ref: 0040ACDD
                          • OpenFileMappingW.KERNEL32(000F001F,00000000,00000000,00000000,00000000,00000000,0042A3BA,?,00486734,00486680,00000000,?,00437ED9,?,00000000,00437F69), ref: 0042A356
                          • CreateFileMappingW.KERNELBASE(000000FF,00000000,00000004,00000000,000069D8,00000000,000F001F,00000000,00000000,00000000,00000000,00000000,0042A3BA,?,00486734,00486680), ref: 0042A390
                          • InitializeCriticalSection.KERNEL32(00465C80,?,00486734,00486680,00000000,?,00437ED9,?,00000000,00437F69,?,00000000,00000000,00000000,?,0043FD1C), ref: 0042A39F
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: FileMapping$CreateCriticalInitializeOpenSectionlstrlen
                          • String ID: _Share_GGT_
                          • API String ID: 3818311671-3867152089
                          • Opcode ID: fc406bb750eb4cddcf97fb9f4df053afcbc479497fae568b1b2a28301e04e8dc
                          • Instruction ID: ce4900a62e11ce9a572bac5c0a59808664cb2c3850396779e9c8bc1c065c1da5
                          • Opcode Fuzzy Hash: fc406bb750eb4cddcf97fb9f4df053afcbc479497fae568b1b2a28301e04e8dc
                          • Instruction Fuzzy Hash: F3118674740310AFE710EB69DC42F2A73D9EB49B18FA1443BFD01E76D1D9B85C24865A
                          APIs
                          • GetThreadUILanguage.KERNEL32(?,00000000), ref: 00407E79
                          • SetThreadPreferredUILanguages.KERNEL32(00000004,?,?), ref: 00407ED7
                          • SetThreadPreferredUILanguages.KERNEL32(00000000,00000000,?), ref: 00407F34
                          • SetThreadPreferredUILanguages.KERNEL32(00000008,?,?), ref: 00407F67
                            • Part of subcall function 00407E24: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,00000000,?,?,00407EE5), ref: 00407E3B
                            • Part of subcall function 00407E24: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,?,00407EE5), ref: 00407E58
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Thread$LanguagesPreferred$Language
                          • String ID:
                          • API String ID: 2255706666-0
                          • Opcode ID: 64e88a95cc42ba7287f90517dc0aa7ad91b6f4ea3144bac7362c88a4aa254beb
                          • Instruction ID: c64547fa24ced421637df5c0631d32c6e461f39fc0f139bc27309100008ee978
                          • Opcode Fuzzy Hash: 64e88a95cc42ba7287f90517dc0aa7ad91b6f4ea3144bac7362c88a4aa254beb
                          • Instruction Fuzzy Hash: 63317230E0511A9BDB10DFA5D885AAEB7B8FF04304F0045BAE515F72D1D778AE05CB99
                          APIs
                          • CreateWindowExW.USER32(00000000,Regedit_fast_jump,0043D9B0,?,?,?,00000005,?,?,?,?,?), ref: 0040A787
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CreateWindow
                          • String ID: Regedit fast jump V1.2$Regedit_fast_jump
                          • API String ID: 716092398-4282503210
                          • Opcode ID: 52ed684031a3f60b859464a8a3777d52d3d04c0f90a715adbf70d004a935ed74
                          • Instruction ID: a517241aa0c29f4206de9bdbe5aa9f665dbdabb8af3f7c10e9afbeb71ed45618
                          • Opcode Fuzzy Hash: 52ed684031a3f60b859464a8a3777d52d3d04c0f90a715adbf70d004a935ed74
                          • Instruction Fuzzy Hash: 1FF074B6700118AF8B44DE9DDC81DDF77ECEB8D264B054129BA08E3201D634ED1187A4
                          APIs
                          • EnterCriticalSection.KERNEL32(00465C80,00486734,00486680,?,00437EDE,?,00000000,00437F69,?,00000000,00000000,00000000,?,0043FD1C), ref: 0042A405
                          • MapViewOfFile.KERNEL32(00000298,00000002,00000000,00000000,00000000,00000000,0042A474,?,00465C80,00486734,00486680,?,00437EDE,?,00000000,00437F69), ref: 0042A42D
                          • LeaveCriticalSection.KERNEL32(00465C80,0042A47B,00486680,?,00437EDE,?,00000000,00437F69,?,00000000,00000000,00000000,?,0043FD1C), ref: 0042A46E
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterFileLeaveView
                          • String ID:
                          • API String ID: 4211325400-0
                          • Opcode ID: 0d9f7f40c9d7ea83eeb8b38dac8d25be34085f6cc11532efc3bdb7fca5f7cb44
                          • Instruction ID: 8bcca562de0659576e544f917722c751e79bc37380bef6d5bc26bb2733c4fdf1
                          • Opcode Fuzzy Hash: 0d9f7f40c9d7ea83eeb8b38dac8d25be34085f6cc11532efc3bdb7fca5f7cb44
                          • Instruction Fuzzy Hash: C101F7753417106FE310BBA9AC42B1573D9E785714F90807BF900E76D1CAF89C24865F
                          APIs
                          • SysFreeString.OLEAUT32(00000000), ref: 00406056
                          • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00406193
                          • SysFreeString.OLEAUT32(?), ref: 004061A5
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: String$Free$Alloc
                          • String ID:
                          • API String ID: 986138563-0
                          • Opcode ID: d42786cc01202ac8c23bd76360906db4bd554bbf72aedcf7f9264658cf042870
                          • Instruction ID: 807d5b284fdb83f8e106d4bf72ef5d77e4b48e4457f3ca37c9d18d6d77b33670
                          • Opcode Fuzzy Hash: d42786cc01202ac8c23bd76360906db4bd554bbf72aedcf7f9264658cf042870
                          • Instruction Fuzzy Hash: FCE0ECB81052016DEA196E319915B372329AF91700B64847EAE01BA2D6D6BE9801552C
                          APIs
                          • lstrlenW.KERNEL32(00000000,00000000,00438F20,?,?,?,?,00000032,00000000,00000000), ref: 004381F0
                            • Part of subcall function 0042674C: recv.WS2_32(?,?,00000023,00000000), ref: 00426758
                            • Part of subcall function 0042674C: WSAGetLastError.WS2_32(?,0043830E,?,000003E8,00000002,00000000,00000000,00438F20,?,?,?,?,00000032,00000000,00000000), ref: 00426765
                          • Sleep.KERNEL32(00000000,00000000,00000000,00438F20,?,?,?,?,00000032,00000000,00000000), ref: 004383D6
                          • Sleep.KERNEL32(00000000,00000000,00438F20,?,?,?,?,00000032,00000000,00000000), ref: 00438418
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Sleep$ErrorLastlstrlenrecv
                          • String ID:
                          • API String ID: 3996653200-0
                          • Opcode ID: 927a0611222a8a65cb3c775a621b0e1e155c29f4f3cb73098f6324d9d0580529
                          • Instruction ID: 0d1a5bda4d6c6b9de2d10e32bc7ad702a1b5d6b6f24c3881c00fe5a691bfc029
                          • Opcode Fuzzy Hash: 927a0611222a8a65cb3c775a621b0e1e155c29f4f3cb73098f6324d9d0580529
                          • Instruction Fuzzy Hash: 3D713E74A002148FCB04EF69D881A9EB7F5EF59304F55906BF804AB396DB78ED11CB58
                          APIs
                          • IsWow64Process.KERNEL32(00000000,?,?,00000000,00428168), ref: 00428115
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: ProcessWow64
                          • String ID: 4gH
                          • API String ID: 2092917072-2392367260
                          • Opcode ID: 61c5414cba485c1269f8953de91e68ac7cc580cd0d63077f82f4cefd3cb140cc
                          • Instruction ID: 56777332dcb3f63b959ff86f62cf389278823c75343c10e79bd2b799f39e66af
                          • Opcode Fuzzy Hash: 61c5414cba485c1269f8953de91e68ac7cc580cd0d63077f82f4cefd3cb140cc
                          • Instruction Fuzzy Hash: 26213934700245AFE721DFA9DC81F5A77E8EB8A704F914479F544D7290EEB89D04CB58
                          APIs
                          • RegOpenKeyW.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce,?,?,00486680,?), ref: 00427C1A
                          Strings
                          • SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce, xrefs: 00427C11
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Open
                          • String ID: SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
                          • API String ID: 71445658-2256017818
                          • Opcode ID: e08dad67d0b0650943f26f123db1f80dc3a104914a0c84b7fd48843967ddd4c9
                          • Instruction ID: dbd1817951312129e823704a002e168db0ba3b3f48672b961da6198f4a169ccc
                          • Opcode Fuzzy Hash: e08dad67d0b0650943f26f123db1f80dc3a104914a0c84b7fd48843967ddd4c9
                          • Instruction Fuzzy Hash: 43111975604218AFD710CF99EC95E9EB7FCEB99310F5140B6F904D3390EA74AE048B68
                          APIs
                          • InternetGetConnectedState.WININET(?,00000000,?,00486680,0043B873,0043BA34,00A4294C,0043BA34,00A4292C,0043BA34,?,0043BA34,?,0043BA34, MB,?), ref: 0043C66A
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: ConnectedInternetState
                          • String ID: *gw
                          • API String ID: 97057780-3824414855
                          • Opcode ID: 097074b7753a585bd9b46b815b44bc7c2079c04e9b8b79d91b1b0e65f3e43132
                          • Instruction ID: 7475345d8b99e8fa3accaeba3c40ea5ea109b7619a8deb36e54877f1e8ca3b7c
                          • Opcode Fuzzy Hash: 097074b7753a585bd9b46b815b44bc7c2079c04e9b8b79d91b1b0e65f3e43132
                          • Instruction Fuzzy Hash: BEF017723050004B9A10EB5E89C352AA3C5EBAC718FA0B83BF446EB380C73CDC15676B
                          APIs
                          • GetVolumeInformationW.KERNEL32(C:\,00000000,00000000,00000000,?,?,00000000,00000000), ref: 0043D077
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: InformationVolume
                          • String ID: C:\
                          • API String ID: 2039140958-3404278061
                          • Opcode ID: aa89cf07ec3d2225497f1e78925457fa8028b756b0f7926a72dbf8a9feaf2cb0
                          • Instruction ID: e2840545e67906565d6833ba5e7da4f5bd5e4bc28f5d0448f3776f2bce82787f
                          • Opcode Fuzzy Hash: aa89cf07ec3d2225497f1e78925457fa8028b756b0f7926a72dbf8a9feaf2cb0
                          • Instruction Fuzzy Hash: 6EE048773542107FE310DA789C81F9B73DCDB49620F108936F668D71D0F67199048755
                          APIs
                          • GetUserDefaultUILanguage.KERNEL32(00000000,004089AF,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00408A36,00000000,?,00000105), ref: 00408943
                          • GetSystemDefaultUILanguage.KERNEL32(00000000,004089AF,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00408A36,00000000,?,00000105), ref: 0040896B
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: DefaultLanguage$SystemUser
                          • String ID:
                          • API String ID: 384301227-0
                          • Opcode ID: 3e333a8880a3a5e567c2e7b863fcc0508ba600fd06b8817ba67f4161b2b043f0
                          • Instruction ID: d299ade2d0cde5e0e6b4ac4308b209071da85b2919ee7819c01997859eb2786b
                          • Opcode Fuzzy Hash: 3e333a8880a3a5e567c2e7b863fcc0508ba600fd06b8817ba67f4161b2b043f0
                          • Instruction Fuzzy Hash: F8314C70A002099BDB10FBA9C981BAEB7B4AB44304F60447FE481B33D1DB7CAD45CB5A
                          APIs
                          • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,00408A76,?,00400000,00444C08), ref: 004089F8
                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,00408A76,?,00400000,00444C08), ref: 00408A49
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: FileLibraryLoadModuleName
                          • String ID:
                          • API String ID: 1159719554-0
                          • Opcode ID: 4b5f65d131dd44abe89ba08c5592b5a98fb8228b2147084425797af8f58d8da9
                          • Instruction ID: ff3da6a666be0d6ffa05517e973b0afc017d91cd30ce0c1a03a3bebe0d5e188f
                          • Opcode Fuzzy Hash: 4b5f65d131dd44abe89ba08c5592b5a98fb8228b2147084425797af8f58d8da9
                          • Instruction Fuzzy Hash: 03116031A4021C9BDB14EB60CD86BDD73B8DB04304F5140BBB509B22D1DA785E848AA8
                          APIs
                          • send.WS2_32(?,00000000,00000001,00000000), ref: 0042685E
                          • WSAGetLastError.WS2_32(?,00000000,00000000,00000000,0042B60B,00000000,0042B63B,?,00000000,00000000,0042B658,?,?,?,00000001), ref: 0042686B
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: ErrorLastsend
                          • String ID:
                          • API String ID: 1802528911-0
                          • Opcode ID: 79d38629eee673ff6eb1dc3b9f55717c317b0fde577c5294c1d74e9963d8f61c
                          • Instruction ID: eea7f73edd5889aa44c63be0e89ffae9a27acdcffa5b63b0f6d0306b76622c2c
                          • Opcode Fuzzy Hash: 79d38629eee673ff6eb1dc3b9f55717c317b0fde577c5294c1d74e9963d8f61c
                          • Instruction Fuzzy Hash: 72F081727062305BC6207EAABC8462B7798DB90775F66023BFD14C3380D76DAC4596AA
                          APIs
                          • setsockopt.WS2_32(?,0000FFFF,00000008,?,00000004), ref: 00426517
                          • WSAIoctl.WS2_32(?,98000004,?,0000000C,00000000,00000000,?,00000000,00000000), ref: 00426550
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Ioctlsetsockopt
                          • String ID:
                          • API String ID: 1903391676-0
                          • Opcode ID: 03644be328834875c1244788aae63f487b93a48ab88a38caa1f142fd73c9b7a2
                          • Instruction ID: b380039b2bc01e844831d0eb9d4097936793d745d484792cb81435d4e0b4e8fb
                          • Opcode Fuzzy Hash: 03644be328834875c1244788aae63f487b93a48ab88a38caa1f142fd73c9b7a2
                          • Instruction Fuzzy Hash: FFF06DB1248301BFE310DB288C85F5B7BECEB84721F158A39B6A9D62D0DBB49444CB56
                          APIs
                          • recv.WS2_32(?,?,00000023,00000000), ref: 00426758
                          • WSAGetLastError.WS2_32(?,0043830E,?,000003E8,00000002,00000000,00000000,00438F20,?,?,?,?,00000032,00000000,00000000), ref: 00426765
                            • Part of subcall function 0042671C: shutdown.WS2_32(?,00000002), ref: 00426730
                            • Part of subcall function 0042671C: closesocket.WS2_32(?), ref: 0042673A
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: ErrorLastclosesocketrecvshutdown
                          • String ID:
                          • API String ID: 1486353823-0
                          • Opcode ID: e60be1d18a4f465e31499d2ad4d553654dd02f45920f6680eb65059168611b32
                          • Instruction ID: 2ccd750e74ecc19f750fd273caaa8381b6e9293f8943de3bd2fab76ebbad5cdb
                          • Opcode Fuzzy Hash: e60be1d18a4f465e31499d2ad4d553654dd02f45920f6680eb65059168611b32
                          • Instruction Fuzzy Hash: A8E0207570123047C61037B87C4551A518C8B8436DF860577BD05D73C2D56CCC0013AD
                          APIs
                          • GetEnvironmentVariableW.KERNEL32(00000000,?,00000208,004866F8,0043D0E3,00000000,0043D13A,?,00486680,00000001,00000000,00000000,?,00437AE2,?,00000000), ref: 0040B95D
                          • GetLongPathNameW.KERNEL32(?,?,00000208), ref: 0040B972
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: EnvironmentLongNamePathVariable
                          • String ID:
                          • API String ID: 2057972008-0
                          • Opcode ID: 15b9029d297ef0175ab10ccc5325bcd8575cfd201a7f1f65d94be1b2a52fba4c
                          • Instruction ID: dc435742a546365fcd1a1d8ae548f6de60c2f229cc9ad4274613245ab6a971ca
                          • Opcode Fuzzy Hash: 15b9029d297ef0175ab10ccc5325bcd8575cfd201a7f1f65d94be1b2a52fba4c
                          • Instruction Fuzzy Hash: DAE086FAA0030067D3409794DC89C8B77AD9BC8710F04C53A7699C2291EA3899045762
                          APIs
                          • GetForegroundWindow.USER32(?,000003FF,00486680,0043B8B9,0043BA34,?,00000000,00000000), ref: 0043B36F
                          • GetWindowTextW.USER32(00000000,?,000003FF), ref: 0043B375
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Window$ForegroundText
                          • String ID:
                          • API String ID: 29597999-0
                          • Opcode ID: 3b3505a3a0ac42150d07072c85154a669ecb038c3fb3a63437e86ba52f1bcabf
                          • Instruction ID: b04caff63234f7f49ee665022c03383a1182fae9889a01cd521a3bb298639227
                          • Opcode Fuzzy Hash: 3b3505a3a0ac42150d07072c85154a669ecb038c3fb3a63437e86ba52f1bcabf
                          • Instruction Fuzzy Hash: 7CD0A791B4030013E20036A99C8261B729C8F94314F554939BE84D73D2EA3E893502AF
                          APIs
                          • EnterCriticalSection.KERNEL32(?,00000000,00438016), ref: 00437FB4
                            • Part of subcall function 0042B474: lstrlenW.KERNEL32(00000000,00000000,0042B658,?,?,?,00000001), ref: 0042B4AE
                          • LeaveCriticalSection.KERNEL32(?,00438000,?,?,00000000,00438016), ref: 00437FF3
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterLeavelstrlen
                          • String ID:
                          • API String ID: 3224049430-0
                          • Opcode ID: 0d7464473ba05cbbb2e82fef99e55768ca255a18160affc4f90ee55d651ccd01
                          • Instruction ID: f55897ce139089ab867502ac5b4fb763503053097d543c628563b233534a37de
                          • Opcode Fuzzy Hash: 0d7464473ba05cbbb2e82fef99e55768ca255a18160affc4f90ee55d651ccd01
                          • Instruction Fuzzy Hash: 2A01A274608344AFCB11DF69CC9295EBBF8EB0D70475244B6F800E3782DA38DA10DA65
                          APIs
                          • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0043A7D9
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CreateFile
                          • String ID:
                          • API String ID: 823142352-0
                          • Opcode ID: e6026e072492908bd2ac8bec586b219015e7024cba609ac1c8d8e6f45bb31c07
                          • Instruction ID: effb560f06ffb086691e009eb791961bbbf3811e5e89f95771296192e7b8b082
                          • Opcode Fuzzy Hash: e6026e072492908bd2ac8bec586b219015e7024cba609ac1c8d8e6f45bb31c07
                          • Instruction Fuzzy Hash: AD213A753402007FE220EB5DDC85F6B33D8EB89B20F504135FA58EB2E0DA70AD099769
                          APIs
                          • CreateThread.KERNEL32(?,?,00405EA4,00000000,?,?), ref: 00405F36
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CreateThread
                          • String ID:
                          • API String ID: 2422867632-0
                          • Opcode ID: d4c16be4ab22564aca3f1db8b54fc976ceab500ef82638a0386371b67865511e
                          • Instruction ID: b65f584a43c0bf9e7da64db86cd81b6158c014f4424037469d94041db21b4cff
                          • Opcode Fuzzy Hash: d4c16be4ab22564aca3f1db8b54fc976ceab500ef82638a0386371b67865511e
                          • Instruction Fuzzy Hash: 4F017C76A04615AFC710DF9D9880A8BBBECEB49365F10417AF508E73C1D678ED008BA8
                          APIs
                          • K32GetProcessImageFileNameW.KERNEL32(?,?,00000208,00000000,00428078), ref: 00428044
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: FileImageNameProcess
                          • String ID:
                          • API String ID: 3017713154-0
                          • Opcode ID: 44753aad1a822e409e58ed8457575a18b76babf8020968265b994119b94af591
                          • Instruction ID: 00bc4d1833600cf21b4bd5bd878e36f0b8a84f162ff77f5791b9df623770c608
                          • Opcode Fuzzy Hash: 44753aad1a822e409e58ed8457575a18b76babf8020968265b994119b94af591
                          • Instruction Fuzzy Hash: D8F02271309218AFD710CB66FC5286EB7ECE745724B7285BBE808D2640EA354D1489A8
                          APIs
                          • GetProcessTimes.KERNEL32(00000000,?,?,?,?), ref: 004281C4
                            • Part of subcall function 0040BAE8: FileTimeToLocalFileTime.KERNEL32(?,?,00000000,0040BC14,?,?,?,00486680), ref: 0040BB24
                            • Part of subcall function 0040BAE8: FileTimeToSystemTime.KERNEL32(?,?,?,?,?,00486680), ref: 0040BB3A
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Time$File$LocalProcessSystemTimes
                          • String ID:
                          • API String ID: 2224436155-0
                          • Opcode ID: e01253d6c9a6667fa1fcfca1fb66cbb1702a9f989d8597fc01d8182e358f5cc2
                          • Instruction ID: c0f96d77b7cdf6fef9d78a379c25be5386df188f29ecbee95136ee4c353147ac
                          • Opcode Fuzzy Hash: e01253d6c9a6667fa1fcfca1fb66cbb1702a9f989d8597fc01d8182e358f5cc2
                          • Instruction Fuzzy Hash: 16F037753002116FD300DB9CDC80EAB73DCAB89214F40453ABA28D73A0EE74ED148B99
                          APIs
                          • GetModuleFileNameW.KERNEL32(00400000,?,0000020A), ref: 00407762
                            • Part of subcall function 004089BC: GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,00408A76,?,00400000,00444C08), ref: 004089F8
                            • Part of subcall function 004089BC: LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,00408A76,?,00400000,00444C08), ref: 00408A49
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: FileModuleName$LibraryLoad
                          • String ID:
                          • API String ID: 4113206344-0
                          • Opcode ID: 358e5c818d4021d8e6dfb070530815b4a7e06f116bb450956073f4b4dbaad43c
                          • Instruction ID: 0c0d8af671378e37ef2f8f11867f171fa8a64e733914af962fdd6609c9811da0
                          • Opcode Fuzzy Hash: 358e5c818d4021d8e6dfb070530815b4a7e06f116bb450956073f4b4dbaad43c
                          • Instruction Fuzzy Hash: 84E0C9B1A003109BCB14EFA8CAC5A563794AB18754F0445AAED68DF386D375E910C7D6
                          APIs
                          • setsockopt.WS2_32(?,00000006,00000001,?,00000004), ref: 004264C7
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: setsockopt
                          • String ID:
                          • API String ID: 3981526788-0
                          • Opcode ID: 6f620cc0493e7550235cd532137eb6fc8c417d51ecbc718e29ec7d6162a63254
                          • Instruction ID: dac38774c12ad157a662963cdbbf63fcac60a701ab0a03f3ad73e4cf0346f0d6
                          • Opcode Fuzzy Hash: 6f620cc0493e7550235cd532137eb6fc8c417d51ecbc718e29ec7d6162a63254
                          • Instruction Fuzzy Hash: 49D0A7F4644700A9E610BF00DC81B67769AABC0701F41C418B2C14A284C7BE0045864A
                          APIs
                          • socket.WS2_32(00000002,00000001,00000000), ref: 004265DB
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: socket
                          • String ID:
                          • API String ID: 98920635-0
                          • Opcode ID: 1c0be28f3114f568c886b964665f0d94fee9638e7b33bccbcf00a0272f5473c6
                          • Instruction ID: 6bb6142a94c5a099761c66cc421a218867242c07cdce3739f4e60fa7620a48eb
                          • Opcode Fuzzy Hash: 1c0be28f3114f568c886b964665f0d94fee9638e7b33bccbcf00a0272f5473c6
                          • Instruction Fuzzy Hash: F8D0C974241321DBDB205F746D8E744BA546708732F14C7A5A6395F1D6D2B1C4819525
                          APIs
                          • GlobalMemoryStatusEx.KERNEL32 ref: 0043C2B7
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: GlobalMemoryStatus
                          • String ID:
                          • API String ID: 1890195054-0
                          • Opcode ID: ad0ee5a14db9f8d35ea5e052034d939f1592ab2900357ceb092edfa78fdaa2ba
                          • Instruction ID: 745979406293098b998b21dc8bc2544273246259db0e0677c0bcf9ce87b2224a
                          • Opcode Fuzzy Hash: ad0ee5a14db9f8d35ea5e052034d939f1592ab2900357ceb092edfa78fdaa2ba
                          • Instruction Fuzzy Hash: 66C012B054430057D200EB11DC03B0A73906B90744F800E19B9D4763C4D77DA914469B
                          APIs
                          • setsockopt.WS2_32(?,0000FFFF,00001002,?,00000004), ref: 0042645E
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: setsockopt
                          • String ID:
                          • API String ID: 3981526788-0
                          • Opcode ID: 90b101a2a0573660a928b05228da2c3784fef589de541a589e3b69617d637554
                          • Instruction ID: bb8a9b4648efff138e9f474982d846f9cc4f0d96350c3f9ea27ce7a000e96af9
                          • Opcode Fuzzy Hash: 90b101a2a0573660a928b05228da2c3784fef589de541a589e3b69617d637554
                          • Instruction Fuzzy Hash: 86C08CF0288301BAE2006B009C0AE7A72A8DBC8B02F40C938B3848A0C887B048489616
                          APIs
                          • setsockopt.WS2_32(?,0000FFFF,00001006,?,00000004), ref: 0042641E
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: setsockopt
                          • String ID:
                          • API String ID: 3981526788-0
                          • Opcode ID: 4eb0adef7ceac2b22505375c602b20f11d6d6d2e8f1cb8d7bcabd21d17a25561
                          • Instruction ID: 701e4707a96d052bc1b10243d43104cad9535a7c74554599590351426dfedfe6
                          • Opcode Fuzzy Hash: 4eb0adef7ceac2b22505375c602b20f11d6d6d2e8f1cb8d7bcabd21d17a25561
                          • Instruction Fuzzy Hash: 72C08CF0288301BAE2106B009C05E7A72A8DBC8B02F00C938B3848A0C887B044489616
                          APIs
                          • CreateMutexW.KERNEL32(00000000,00000001,00000000,0043A380,?,?,00486680,0043F162,00000000,0043F406,?,00486734,00486680,00000000,00000000,00000000), ref: 0040B294
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CreateMutex
                          • String ID:
                          • API String ID: 1964310414-0
                          • Opcode ID: b859bd4616cb6dd907c98fc490d86ff8af2ee78a39d944d8233d32dc93cfa400
                          • Instruction ID: eda8243675ec38aac7cca1f5942d914f989ef7de6786f736835ed049ce2af6ae
                          • Opcode Fuzzy Hash: b859bd4616cb6dd907c98fc490d86ff8af2ee78a39d944d8233d32dc93cfa400
                          • Instruction Fuzzy Hash: 2DB012F1D714405DDE0807308D49C6E342FD1C1A0B718C265F0018001CD83944044020
                          APIs
                          • WSAStartup.WS2_32(00000202,0045F0B0), ref: 0042656E
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Startup
                          • String ID:
                          • API String ID: 724789610-0
                          • Opcode ID: 3edcd535bb5d69f2c68979e5168ea0cfe4d657896c45878ceb297bf3764585b6
                          • Instruction ID: 44ae0b0028eb01218a78a6d63e91cbd5235d5447584bcb4ff0911ab5febe76ad
                          • Opcode Fuzzy Hash: 3edcd535bb5d69f2c68979e5168ea0cfe4d657896c45878ceb297bf3764585b6
                          • Instruction Fuzzy Hash: C3B01232362340CED6002B711D0EB4B2E544701ED3F0C40BA7840C50F3C594C00C8B2F
                          APIs
                          • lstrlenW.KERNEL32(00000000,00000000,0042B658,?,?,?,00000001), ref: 0042B4AE
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: lstrlen
                          • String ID:
                          • API String ID: 1659193697-0
                          • Opcode ID: 4b2752ea6813bc4d6d3ea2b833f7aa0f835c0d73c1b6eed2a5df22c0c15b692c
                          • Instruction ID: 13ca886a8ed0d5ec0d195ec816cb4a6fadfe92b0cde49bbda9ade18e8d2c3fc5
                          • Opcode Fuzzy Hash: 4b2752ea6813bc4d6d3ea2b833f7aa0f835c0d73c1b6eed2a5df22c0c15b692c
                          • Instruction Fuzzy Hash: 8151C371B002599FDB00EBA4D881AEEB7B5EF85304F15807AE501F7381D7389E11CBAA
                          APIs
                            • Part of subcall function 0043BC08: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,?,00486734,00486680), ref: 0043BC22
                            • Part of subcall function 0043BC08: AdjustTokenPrivileges.KERNELBASE(?,00000000,00000001,00000000,00000000,?), ref: 0043BC44
                            • Part of subcall function 0040ADB8: lstrlenW.KERNEL32(00000000,?,?,00486734,00486680,00425F2B,00000000,00426187,?,00486680,00000000,00000000,?,0043F7A0,00000000,0043FD8B), ref: 0040ADD7
                          • CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,?,00437EA1,?,00000000,00437F69,?,00000000,00000000,00000000,?,0043FD1C), ref: 0043BCDB
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AdjustCloseHandleLookupPrivilegePrivilegesTokenValuelstrlen
                          • String ID:
                          • API String ID: 2571840792-0
                          • Opcode ID: 991721a17c7baba6eec0b44cd81d84c56b0229ae4b6ac257835551f99c18bcdf
                          • Instruction ID: 56cfc1f9d9a126ba73abe90030d394327abc895aaaabf02c77f1afeaf98aefc6
                          • Opcode Fuzzy Hash: 991721a17c7baba6eec0b44cd81d84c56b0229ae4b6ac257835551f99c18bcdf
                          • Instruction Fuzzy Hash: 6E113034700204AFD710EB99DC52B5D73E9EB49700F5094BAF900E7391DF78AE049759
                          APIs
                          • VirtualAlloc.KERNEL32(00000000,0013FFF0,00001000,00000004,?,00402DBB,FFFFFFDC,00402A8C), ref: 004027BE
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: 6e83b55374e38ba348886defc969fcf363bb13e5c12b6dfeb1a80ee92d75bf7a
                          • Instruction ID: d7f275c02b8ff420755371fd827dccc32f36ce75ba3383e112499b9bd2685023
                          • Opcode Fuzzy Hash: 6e83b55374e38ba348886defc969fcf363bb13e5c12b6dfeb1a80ee92d75bf7a
                          • Instruction Fuzzy Hash: 4AF049B1B803404BEB09DF798E853027AD6A78A304F24803EE508FB7E9E6B48415CB09
                          APIs
                          • VirtualFree.KERNEL32(00000000,00000000,00008000,0040B218,00001000,00000004,00000000,0040B246,?,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040B20B
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: FreeVirtual
                          • String ID:
                          • API String ID: 1263568516-0
                          • Opcode ID: 4e520fd87c1f03c42c6ee2a2e84f959edf21d4391d1962ea3ddc91060453bdf3
                          • Instruction ID: e8c454c9f37c4267a3a7746dfe8ce229ffa12ee5dc60596a9f49732140231103
                          • Opcode Fuzzy Hash: 4e520fd87c1f03c42c6ee2a2e84f959edf21d4391d1962ea3ddc91060453bdf3
                          • Instruction Fuzzy Hash: 4AB01224640708B1EE10E1904C16F0E21147704700FA00495B2007A0C1C57D5500174D
                          APIs
                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000004,00000000,0042D53E,?,?,00000BCA,00000000,00000000), ref: 0042D204
                          • EnumServicesStatusExW.ADVAPI32(00000000,00000000,00000030,00000003,?,00005800,?,?,?,00000000,00000000,0042D519,?,?,?,00000BCA), ref: 0042D258
                          • OpenServiceW.ADVAPI32(00000000,?,80000000,0042D558,?,0042D558,?,0042D558,?,?,00000000,0042D558,?,0042D558,?,?), ref: 0042D338
                          • QueryServiceConfigW.ADVAPI32(?,?,00000608,?,00000000,0042D4EC,?,?,?,?,00000BCA,00000000,00000000), ref: 0042D362
                          • QueryServiceConfig2W.ADVAPI32(?,00000001,?,00000608,?), ref: 0042D42E
                          • CloseServiceHandle.ADVAPI32(?,0042D4F3,?,\Parameters,?,SYSTEM\CurrentControlSet\Services\,?,?), ref: 0042D4E5
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Service$OpenQuery$CloseConfigConfig2EnumHandleManagerServicesStatus
                          • String ID: SYSTEM\CurrentControlSet\Services\$ServiceDll$\Parameters
                          • API String ID: 876170868-2801189604
                          • Opcode ID: e3187046fb30eae6e42c4959e321805dde99f8cc8d963a26136a116fbf37876b
                          • Instruction ID: 9384077c3cc053152125fa4c488302ce4d68f398f94affc140d1868f48c8ae01
                          • Opcode Fuzzy Hash: e3187046fb30eae6e42c4959e321805dde99f8cc8d963a26136a116fbf37876b
                          • Instruction Fuzzy Hash: B7917F31A00668AFDB11EB94DC45F9FBBB9EB48705F6040A6F504B7281D6B8AF90CF54
                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,00416CA8,?,?), ref: 004080E5
                          • GetProcAddress.KERNEL32(00000000,GetLongPathNameW), ref: 004080F6
                          • FindFirstFileW.KERNEL32(?,?,kernel32.dll,00416CA8,?,?), ref: 004081F6
                          • FindClose.KERNEL32(?,?,?,kernel32.dll,00416CA8,?,?), ref: 00408208
                          • lstrlenW.KERNEL32(?,?,?,?,kernel32.dll,00416CA8,?,?), ref: 00408214
                          • lstrlenW.KERNEL32(?,?,?,?,?,kernel32.dll,00416CA8,?,?), ref: 00408259
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Findlstrlen$AddressCloseFileFirstHandleModuleProc
                          • String ID: GetLongPathNameW$\$kernel32.dll
                          • API String ID: 1930782624-3908791685
                          • Opcode ID: c0075b3f116daeefb17eaddd3ceca8e9c16820536a0e8076f9c9bbe445cf2216
                          • Instruction ID: 9b698579dee47a5ce6c7e6d575a683c27756de6a4c8f4362d234e3b766aaeab0
                          • Opcode Fuzzy Hash: c0075b3f116daeefb17eaddd3ceca8e9c16820536a0e8076f9c9bbe445cf2216
                          • Instruction Fuzzy Hash: 6F41B431E006189BCB10EBA9CD85ADE73B5AF44310F1445FE9944F72D4EBBCAE41CA59
                          APIs
                          • OpenSCManagerW.ADVAPI32(00000000,00000000,000F003F), ref: 0042D622
                          • OpenServiceW.ADVAPI32(00000000,?,000F01FF,00000000,0042D714), ref: 0042D64D
                          • StartServiceW.ADVAPI32(00000000,00000000,?,00000000,0042D6F5,?,?,000F01FF,00000000,0042D714), ref: 0042D687
                          • ControlService.ADVAPI32(00000000,?,?,00000000,0042D6F5,?,?,000F01FF,00000000,0042D714), ref: 0042D69F
                          • DeleteService.ADVAPI32(00000000,00000000,0042D6F5,?,?,000F01FF,00000000,0042D714), ref: 0042D6AE
                          • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,?,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,0042D6F5,?,?,000F01FF), ref: 0042D6D4
                          • CloseServiceHandle.ADVAPI32(00000000,0042D6FC,00000000,0042D714), ref: 0042D6EE
                          • CloseServiceHandle.ADVAPI32(00000000,0042D71B,0042D714), ref: 0042D70D
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Service$CloseHandleOpen$ChangeConfigControlDeleteManagerStart
                          • String ID:
                          • API String ID: 4289576418-0
                          • Opcode ID: 2160bc710cf6ce5fa40d14bcf6b49b17236948c5e440c8f43311568ad2f9ccbd
                          • Instruction ID: 00d6b0ea2340d184e4ac602b8d2d9b3dcc352b1e864844e6011df15c9d578a2f
                          • Opcode Fuzzy Hash: 2160bc710cf6ce5fa40d14bcf6b49b17236948c5e440c8f43311568ad2f9ccbd
                          • Instruction Fuzzy Hash: 48316275F04328AFDB50CFA4EC48BBEBBB8EB09310F514966F515E3291D6794900CB28
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,?,00486680,00000001,0000000F,?,00437564,00000000,00437B2F,?,00486734,00486680,00000000,00000000,?,0043F7E0), ref: 0040BA70
                          • FindResourceW.KERNEL32(00000000,00000000,0000000A,00000000,?,00486680,00000001,0000000F,?,00437564,00000000,00437B2F,?,00486734,00486680,00000000), ref: 0040BA82
                          • LoadResource.KERNEL32(00000000,00000000,00000000,0040BAD8,?,?,00486680,00000001,0000000F,?,00437564,00000000,00437B2F,?,00486734,00486680), ref: 0040BAA4
                          • LockResource.KERNEL32(00000000,?,?,00486680,00000001,0000000F,?,00437564,00000000,00437B2F,?,00486734,00486680,00000000,00000000), ref: 0040BAB1
                          • FreeResource.KERNEL32(00000000,0040BADF,00000001,0000000F,?,00437564,00000000,00437B2F,?,00486734,00486680,00000000,00000000,?,0043F7E0,00000000), ref: 0040BAD1
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Resource$FindFreeHandleLoadLockModule
                          • String ID:
                          • API String ID: 2355082082-0
                          • Opcode ID: 42ae530f8878b1a679c5bb975ed892b2aba36b703ce15ae7888e2b82efbc6652
                          • Instruction ID: 7bba7a99e39e5116ed02c681e27dab3f3a696a6cdaaff79990abd0375f4619b6
                          • Opcode Fuzzy Hash: 42ae530f8878b1a679c5bb975ed892b2aba36b703ce15ae7888e2b82efbc6652
                          • Instruction Fuzzy Hash: 2201A2B5B41300BFE711ABB59C99B2B7AECDB49704F154436F502E3291D6B89D008A6C
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID:
                          • String ID: header crc mismatch$incorrect header check$invalid window size$unknown compression method$unknown header flags set
                          • API String ID: 0-3633268661
                          • Opcode ID: e421627b6d3ef4813b9cd1cb7e4e93ecca93056e609e004e2c6e571c8664583d
                          • Instruction ID: 5aa6cc173b3391f6acc93418eb06beab7e704764d6cad50eead2ed0394f17092
                          • Opcode Fuzzy Hash: e421627b6d3ef4813b9cd1cb7e4e93ecca93056e609e004e2c6e571c8664583d
                          • Instruction Fuzzy Hash: 53429C70608351CFDB19CF18D48471ABBE2BF94304F558A9EE8958B39AC378D985CF86
                          APIs
                          • IsValidLocale.KERNEL32(?,00000002,00000000,00407DD1,?,00416CA8,?,00000000), ref: 00407D16
                          • GetLocaleInfoW.KERNEL32(00000000,00000059,?,00000055,?,00000002,00000000,00407DD1,?,00416CA8,?,00000000), ref: 00407D32
                          • GetLocaleInfoW.KERNEL32(00000000,0000005A,?,00000055,00000000,00000059,?,00000055,?,00000002,00000000,00407DD1,?,00416CA8,?,00000000), ref: 00407D43
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Locale$Info$Valid
                          • String ID:
                          • API String ID: 1826331170-0
                          • Opcode ID: 9cff0d3348290ca2a90f4383b7475f1b890a15e121f1c26136eb9ab308403985
                          • Instruction ID: cb6f84242b6bd7eb567289af83c8d0b6ce4ec7fb6fccd1f7e095b64bd6960065
                          • Opcode Fuzzy Hash: 9cff0d3348290ca2a90f4383b7475f1b890a15e121f1c26136eb9ab308403985
                          • Instruction Fuzzy Hash: BB319370908618ABDB21DF65DC41BEF77B9EF45700F5100BAA509B32D0D6386E40DA2A
                          APIs
                          • lstrlenW.KERNEL32(00000000,?,00000000,0042CF0D), ref: 0042CE4D
                            • Part of subcall function 0042CF20: LoadLibraryW.KERNEL32(00000000,00000000,0042D072,?,00000000,00000000,00000000,00000000,00000000,00000000,?,0042C75E,00000000,0042CB8F), ref: 0042CF4F
                          • GetProcessHeap.KERNEL32(00000002,00000002,00000000,0042CF0D), ref: 0042CDB9
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: HeapLibraryLoadProcesslstrlen
                          • String ID:
                          • API String ID: 2291779644-0
                          • Opcode ID: a4ad016c7aadfe64fa50f34d65b76e8dfdd09318eb685b5a3bc3574a8b7af209
                          • Instruction ID: af40e136eb8a80b2c807ab81720f25aca7d12571b2d8b63e57f36ef82cf8eefa
                          • Opcode Fuzzy Hash: a4ad016c7aadfe64fa50f34d65b76e8dfdd09318eb685b5a3bc3574a8b7af209
                          • Instruction Fuzzy Hash: 0151AE30B002599FDB10DFA8D889BAEBBB6EF04318F55456AE550E72D2D7389D40CB98
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID:
                          • String ID: @
                          • API String ID: 0-2766056989
                          • Opcode ID: b96ea4d795e52e0cbc28a4f6c6dc946e769f731dce4a6bc4f008eae8c63e5877
                          • Instruction ID: b9ef98d5a4b80ae8891dd039f04c528f5d66e671782ec5683b84e093ee49c4ec
                          • Opcode Fuzzy Hash: b96ea4d795e52e0cbc28a4f6c6dc946e769f731dce4a6bc4f008eae8c63e5877
                          • Instruction Fuzzy Hash: 22F18A30E00229EFCF14CF98D6906EEB7B2FF88314F64816AD815A7350D7B95A81CB59
                          APIs
                          • GetDiskFreeSpaceW.KERNEL32(0043D5C8,?,?,?,?), ref: 0043D55B
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: DiskFreeSpace
                          • String ID:
                          • API String ID: 1705453755-0
                          • Opcode ID: e87e138e4647938174f2fb1c71107ea3d34bf100f4757f2c66dfeab1f907a810
                          • Instruction ID: 722191c768b93adc3ee7384d8ae8d85cce96b81de28fd7b043a1ed70963e2dba
                          • Opcode Fuzzy Hash: e87e138e4647938174f2fb1c71107ea3d34bf100f4757f2c66dfeab1f907a810
                          • Instruction Fuzzy Hash: 0101DBB6908305AF8300CF25D94454BB7E8FB88718F018E2EF499D2250E734D6649F97
                          APIs
                          • GetLocaleInfoW.KERNEL32(?,?,?,00000100), ref: 0041A816
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: InfoLocale
                          • String ID:
                          • API String ID: 2299586839-0
                          • Opcode ID: 717e442d9ba59f080960d8c1af65eb908c4d522835428e411fe5605ce704592d
                          • Instruction ID: d2677e7c0692ec905221d20ee55997995fee871a34f49f2f45da0795f110d223
                          • Opcode Fuzzy Hash: 717e442d9ba59f080960d8c1af65eb908c4d522835428e411fe5605ce704592d
                          • Instruction Fuzzy Hash: F9E09231B0031417D714A5594C86AEAB25C9B48304F40417FBD05D7383EDB89DA546EA
                          APIs
                          • GetVersionExW.KERNEL32(?,00443372,00000000,004433AE), ref: 0041C9CA
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Version
                          • String ID:
                          • API String ID: 1889659487-0
                          • Opcode ID: 410daf95ed0a469dd512ef5a5967b7ccbf0efea800e537d36b1624eb76be447d
                          • Instruction ID: fd2dafa55c2e6acee7043c9d3444ebc36f4af6900e2dab5189e4adadca447262
                          • Opcode Fuzzy Hash: 410daf95ed0a469dd512ef5a5967b7ccbf0efea800e537d36b1624eb76be447d
                          • Instruction Fuzzy Hash: D5F03A78604302AFD300DF29E881B5677E4FB85354F25883EE4A5C7790D3B89844CB6A
                          APIs
                          • EnumSystemLocalesW.KERNEL32(0041D2C4,00000002,?,?,0041D825,0041ACC9,?,00000000,0041AD0A,?,?,?,00000000,00000000), ref: 0041D4F5
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: EnumLocalesSystem
                          • String ID:
                          • API String ID: 2099609381-0
                          • Opcode ID: 32ce9e885527816f9e09a1f86bc2d3d4f3c5158a372c670a0bd60f4d724a60a4
                          • Instruction ID: 8e98f53c9f9b7e88f3d7b8dd49ee88ba54752af6f9b13f34fc451e0c690c828a
                          • Opcode Fuzzy Hash: 32ce9e885527816f9e09a1f86bc2d3d4f3c5158a372c670a0bd60f4d724a60a4
                          • Instruction Fuzzy Hash: 80E026E3B41A5047C110B3AA0C43B9766015F80FA8F088137B6549B3C7DA3E4C4442EF
                          APIs
                          • GetLocaleInfoW.KERNEL32(?,0000000F,0041A950,00000002,0000002C,?,?,?,0041A950), ref: 0041A857
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: InfoLocale
                          • String ID:
                          • API String ID: 2299586839-0
                          • Opcode ID: 58987645bfbbee6fc28fe0b4ed17b5a5fde59b998e684a8b31a1635996b276c1
                          • Instruction ID: b9449ca555f2f2ccec25807d7e44655e4db0c9481b156a35af3152a2306382e1
                          • Opcode Fuzzy Hash: 58987645bfbbee6fc28fe0b4ed17b5a5fde59b998e684a8b31a1635996b276c1
                          • Instruction Fuzzy Hash: 7FD0A7B630A36037F214615B6D85DBB56DCCBC9B71F14483BBA4CC6242E264CC56D3B6
                          APIs
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: LocalTime
                          • String ID:
                          • API String ID: 481472006-0
                          • Opcode ID: cc63837cd0e0228cc7dad83b21aadb2e0b0c518d6fe40878e2d736c4f10d41c3
                          • Instruction ID: 06318e0a978b251f7552ce83099d137f2a78b4a7f7d4c002c409463ba53a5027
                          • Opcode Fuzzy Hash: cc63837cd0e0228cc7dad83b21aadb2e0b0c518d6fe40878e2d736c4f10d41c3
                          • Instruction Fuzzy Hash: B5E0AEA0409622A1C244AF56C94147EBBE5AEC4B42F408C5EF8D8801E2EA38C5E8D367
                          APIs
                          • GetLocaleInfoW.KERNEL32(00000000,00000003,?,00000400,?,0041D384,?,00000000,0041D491,?,?,?,00000000,00000000,?,0041D2DA), ref: 0041D2FB
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: InfoLocale
                          • String ID:
                          • API String ID: 2299586839-0
                          • Opcode ID: 546146c88b4468738698108138840791addf51eebf06498012cf86390d029840
                          • Instruction ID: 0bc421e85727c7e5c995c04e8cc11c701060a9d54ec275e9e26de52d8a6d5cbb
                          • Opcode Fuzzy Hash: 546146c88b4468738698108138840791addf51eebf06498012cf86390d029840
                          • Instruction Fuzzy Hash: 57D0A7D1B1420013E20466549C42B2632989B84718F10403C7784973C1EE7C581592BF
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7bb131cff54dac0a17fa0430d97710fb3fbaca081f14c2dfb00f25ea5c265502
                          • Instruction ID: 48ccd76fde1caefed0a1bafca9e47237c15715bce1ea54867a43199c5f3efdce
                          • Opcode Fuzzy Hash: 7bb131cff54dac0a17fa0430d97710fb3fbaca081f14c2dfb00f25ea5c265502
                          • Instruction Fuzzy Hash: 34522C78204200CFCB69CF19D5C4AA77BA1FB55314F1485AADC564F34BC738E896CBAA
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c8108c0919ebe0a62dc1a3c0d770a967296a6d4281c4cff3fe8e85353f61d94c
                          • Instruction ID: ccbc9e3b3b988b1a2639bc40e96ceb9ede32833eaa6386f207492ac60acdb363
                          • Opcode Fuzzy Hash: c8108c0919ebe0a62dc1a3c0d770a967296a6d4281c4cff3fe8e85353f61d94c
                          • Instruction Fuzzy Hash: ACC12531705AA18FDB19CE7CA5E417EBBA1EF5B3107A843AEC9939B341C6355C41C358
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 992f9ef4ac75f0517e4f103bd5ebd9b15839cc245a363fac5098010588fc42f0
                          • Instruction ID: 83d69f7e7a0d40b843f9f77534f9b243b6506894ec7929cfbb6302e3d9f63b00
                          • Opcode Fuzzy Hash: 992f9ef4ac75f0517e4f103bd5ebd9b15839cc245a363fac5098010588fc42f0
                          • Instruction Fuzzy Hash: DAB1C631B056A68FEB058EB8D4A43BEBFB1EF56300F9841B9C6969B382D6750C41C758
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 53218ac9c3402bc8f8af1589c54b9bace25acbaa702a47eb739fe7649f1e299b
                          • Instruction ID: 0b6a3a904b3c2a65084a4f42e216b6bebd6507ce2b08fb90d32a0940a8a6e108
                          • Opcode Fuzzy Hash: 53218ac9c3402bc8f8af1589c54b9bace25acbaa702a47eb739fe7649f1e299b
                          • Instruction Fuzzy Hash: CB717F2174A9D14EE3158A3CA5942767F53DEEB2083FD81FEC5D78B72AD43A484AC314
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a46a25728c0e4dbe5aa0a1433bd48846487817f0c63754d6310f19dcd07371b1
                          • Instruction ID: 39f3ea260ff6f3da6e90f99155dd58d696b832892f746bc686792a1460b815df
                          • Opcode Fuzzy Hash: a46a25728c0e4dbe5aa0a1433bd48846487817f0c63754d6310f19dcd07371b1
                          • Instruction Fuzzy Hash: 4A61403238969103E33D8E7E5CE02F7DAD35FC621872ED57D94DAC3F42E86AA4564108
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 55a0c9c45a1588e48286f93ff0363a089bf508e03ed3182d1f2667a37a43aa9a
                          • Instruction ID: fc66ac791adbdaa746e195e9219ab8b7eff2d2fcd351ac04a69530b87842b3f9
                          • Opcode Fuzzy Hash: 55a0c9c45a1588e48286f93ff0363a089bf508e03ed3182d1f2667a37a43aa9a
                          • Instruction Fuzzy Hash: 50815E73E104374BEB628EA89C443A16392EFCC39EF9B45B0ED05BB646D538BD5186C0
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: cede2845c3c078565989d8b19d2722a88f11da72bd50b5e794d6115143c99bdb
                          • Instruction ID: c076ae4ec7e98f079aa73721ed259bcdda166da481f5d85c57de931fd6df4a6b
                          • Opcode Fuzzy Hash: cede2845c3c078565989d8b19d2722a88f11da72bd50b5e794d6115143c99bdb
                          • Instruction Fuzzy Hash: 77712973E214775BEB609EA898443617392EFC925CF9F46B0CE05BB646C638BC5296C0
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ff4b5aa407d26def04aa93fcbed6af8a13554df28c9671371980bedb7aa4fc29
                          • Instruction ID: 6fbe61cb5ea202d4d7eb47eef63c2e9d999fae2c3a580790453706e6268bd6a9
                          • Opcode Fuzzy Hash: ff4b5aa407d26def04aa93fcbed6af8a13554df28c9671371980bedb7aa4fc29
                          • Instruction Fuzzy Hash: A531533278969103E72DCE6DACE12A7EBD3AFC531432FD57DA4DAC3F42D869A4114148
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ae0e43f82692c6785844f3e70bb209c8b319b1924ab6e756aa91dc1deac9637f
                          • Instruction ID: a4e46bec99a474ce8606889887d9032a08aa3b3c2d828dc17b03fe1f6695e101
                          • Opcode Fuzzy Hash: ae0e43f82692c6785844f3e70bb209c8b319b1924ab6e756aa91dc1deac9637f
                          • Instruction Fuzzy Hash: D7D012EA63110217F766C02D58A0BA31547E7C2315F25CD3AA905E5FD1E1BECCB08018
                          APIs
                          • LoadLibraryW.KERNEL32(00000000,00000000,00426187,?,00486680,00000000,00000000,?,0043F7A0,00000000,0043FD8B,?,?,00486664,00000000,00000000), ref: 00425F34
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,?), ref: 0040A4D0
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,00000000), ref: 0040A4F2
                            • Part of subcall function 0040ADB8: lstrlenW.KERNEL32(00000000,?,?,00486734,00486680,00425F2B,00000000,00426187,?,00486680,00000000,00000000,?,0043F7A0,00000000,0043FD8B), ref: 0040ADD7
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AddressProc$LibraryLoadlstrlen
                          • String ID: ^ZH@fj}e$^ZHNl}Ehz}L{{f{$^ZHZ}h{}|y$`gl}Vg}fh$`gl}Vhmm{$a}fgz$g}faz$jefzlzfjbl}$jfgglj}$nl}afz}kpghdl$nl}zfjbfy}$za|}mf~g$zfjbl}$zlelj}$zlgm$zl}zfjbfy}$~z;V:;'MEE
                          • API String ID: 1729337914-1815106237
                          • Opcode ID: 8f734a74b5820445d690829d2c52daff7a50941e13d6a135ceb200ec9b92a943
                          • Instruction ID: 5c4a131c88f9612ba7b75e74eb8d09919213aae810613ce822a12766d2a0e463
                          • Opcode Fuzzy Hash: 8f734a74b5820445d690829d2c52daff7a50941e13d6a135ceb200ec9b92a943
                          • Instruction Fuzzy Hash: A66153B56113049ACB00FBB5DC828DE77ADEF44319B81857BB401B7297DA7C98148BAE
                          APIs
                          • LoadCursorW.USER32(00000000,00007F00), ref: 00432373
                          • LoadCursorW.USER32(00000000,00007F01), ref: 00432385
                          • LoadCursorW.USER32(00000000,00007F02), ref: 00432397
                          • LoadCursorW.USER32(00000000,00007F03), ref: 004323A9
                          • LoadCursorW.USER32(00000000,00007F04), ref: 004323BB
                          • LoadCursorW.USER32(00000000,00007F80), ref: 004323CD
                          • LoadCursorW.USER32(00000000,00007F81), ref: 004323DF
                          • LoadCursorW.USER32(00000000,00007F82), ref: 004323F1
                          • LoadCursorW.USER32(00000000,00007F83), ref: 00432403
                          • LoadCursorW.USER32(00000000,00007F84), ref: 00432415
                          • LoadCursorW.USER32(00000000,00007F85), ref: 00432427
                          • LoadCursorW.USER32(00000000,00007F86), ref: 00432439
                          • LoadCursorW.USER32(00000000,00007F88), ref: 0043244B
                          • LoadCursorW.USER32(00000000,00007F89), ref: 0043245D
                          • LoadCursorW.USER32(00000000,00007F8A), ref: 0043246F
                          • LoadCursorW.USER32(00000000,00007F8B), ref: 00432481
                          • DestroyIcon.USER32(?,00000000,00007F8B,00000000,00007F8A,00000000,00007F89,00000000,00007F88,00000000,00007F86,00000000,00007F85,00000000,00007F84,00000000), ref: 00432496
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CursorLoad$DestroyIcon
                          • String ID: d
                          • API String ID: 4160882069-2564639436
                          • Opcode ID: bf7c25c0758c83dd8361d29cf79b8cbd3adabcf9f3f7ee9b71b899f0064be9ea
                          • Instruction ID: eca3b65f90c1fbf3b1966a39f07301b07b48cd0bd549073b7d2622b705562fcd
                          • Opcode Fuzzy Hash: bf7c25c0758c83dd8361d29cf79b8cbd3adabcf9f3f7ee9b71b899f0064be9ea
                          • Instruction Fuzzy Hash: 54315974A9C3016AF7507F614883BB639619B00B05F09457AFF4C6E2C7EBB914544BAB
                          APIs
                            • Part of subcall function 0040B4DC: GetModuleHandleW.KERNEL32(kernel32.dll,?,00486680,0043F20A,00000001,00000000,?,00486734,00486680,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040B4E5
                          • OutputDebugStringW.KERNEL32(00000000), ref: 004370E3
                          • Sleep.KERNEL32(000003E8,00000000), ref: 004370ED
                          • OutputDebugStringW.KERNEL32(00000000), ref: 00437113
                          • DuplicateHandle.KERNEL32(00000000), ref: 00437150
                          • Sleep.KERNEL32(0000000A,00000000), ref: 004371B6
                            • Part of subcall function 00436E28: Sleep.KERNEL32(0000000A), ref: 00436E53
                          • DuplicateHandle.KERNEL32(00000000), ref: 004371AD
                          • OutputDebugStringW.KERNEL32(00000000), ref: 00437072
                            • Part of subcall function 0040B918: CompareStringW.KERNEL32(00000400,00000001,00000000,000000FF,00000000,000000FF,00486680,?,00437D4A,?,00000000,00437DA0,?,?,?,00486680), ref: 0040B939
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: String$DebugHandleOutputSleep$Duplicate$CompareModule
                          • String ID: 4gH$BH---------------------$D$NO $OK $SysWOW64\cmd.exe$SysWOW64\conime.exe$SysWOW64\wbem\WmiPrvSE.exe$system32\cmd.exe$wbem\WmiPrvSE.exe
                          • API String ID: 1574471335-2317324235
                          • Opcode ID: f6a6e7bae677c8132e6ba9494dda6be8392fda42d5b7d85d582f24808f4848ca
                          • Instruction ID: f05568c7d4dfcf692034845640a9875653ac5b9122fc9bc2ab6e3659e48a1b66
                          • Opcode Fuzzy Hash: f6a6e7bae677c8132e6ba9494dda6be8392fda42d5b7d85d582f24808f4848ca
                          • Instruction Fuzzy Hash: BCB15F74604205AFDB10EFA9C885B9E77E8EF49304F10407AF949EB395DB38AD04DB69
                          APIs
                          • ShowWindow.USER32(?,00000001), ref: 0043DE20
                          • SetForegroundWindow.USER32(?), ref: 0043DE58
                          • SetForegroundWindow.USER32(00000000), ref: 0043DE5E
                          • SetFocus.USER32(00000000,00000000,?), ref: 0043DE64
                          • SendMessageW.USER32(00000000,00000100,00000027,00000000), ref: 0043DE78
                          • SendMessageW.USER32(00000000,00000102,?,00000000), ref: 0043DEAD
                          • SendMessageW.USER32(00000000,00000100,00000027,00000000), ref: 0043DEBE
                          • Sleep.KERNEL32(000000C8,00000000,00000100,00000027,00000000,00000000,00000000,?), ref: 0043DED2
                          • SetForegroundWindow.USER32(00000000), ref: 0043DEF1
                          • SetFocus.USER32(00000000,00000000), ref: 0043DEF7
                          • SendMessageW.USER32(00000000,00000100,00000024,00000000), ref: 0043DF06
                          • SendMessageW.USER32(00000000,00000102,?,00000000), ref: 0043DF34
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: MessageSend$Window$Foreground$Focus$ShowSleep
                          • String ID: RegEdit_RegEdit$SysListView32$SysTreeView32$regedit.exe
                          • API String ID: 2024206484-319980174
                          • Opcode ID: ba715b5f51fbc91f1544afe809a9ddc58d0da2c7aeeb399d06efcbd992129322
                          • Instruction ID: ba1137598a63224ba6c654e925c15ac110f6c28f76abf197ed28cf60a58f3b56
                          • Opcode Fuzzy Hash: ba715b5f51fbc91f1544afe809a9ddc58d0da2c7aeeb399d06efcbd992129322
                          • Instruction Fuzzy Hash: CF41A370A44301BBE221EB58DCC6F3F36E4AB99B04F10442AF584EF2D1D6B8DC40931A
                          APIs
                          • CreateFontW.GDI32(0000000C,00000006,00000000,00000000,000000C8,00000000,00000000,00000000,00000086,00000000,00000000,00000000,00000000,Arial), ref: 0042BC24
                          • SendMessageW.USER32(?,00000030,?,00000000), ref: 0042BC35
                          • SendMessageW.USER32(00000000,00000030,?,00000000), ref: 0042BC48
                          • SendMessageW.USER32(00000000,00000030,?,00000000), ref: 0042BC5B
                          • DefWindowProcW.USER32(?,?,?,?), ref: 0042BD17
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: MessageSend$CreateFontProcWindow
                          • String ID: Arial$BUTTON$EDIT$sQ
                          • API String ID: 369421526-1325858889
                          • Opcode ID: 91081239d773ded964b170543547179827420fda9424dc9f98072b94967eb520
                          • Instruction ID: a2bb92f48b7c9c5c0a2ca1f4238ce0aeea9e52c4f4215f0c1d5f0f2e55f97722
                          • Opcode Fuzzy Hash: 91081239d773ded964b170543547179827420fda9424dc9f98072b94967eb520
                          • Instruction Fuzzy Hash: 185112713903147BF720AA59AC56FAB2768E700B44FA44427F700BF2D1DBB9AC01879E
                          APIs
                          • RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00409200
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: ExceptionRaise
                          • String ID: @Y
                          • API String ID: 3997070919-2635300530
                          • Opcode ID: 2ff4fce7c77f293058c68d3cc450b499553666d9f0ef4978638c54b6cd64c25f
                          • Instruction ID: 102a0f0c3ce5befaca2a965e61597f0f4c621f32d06faf9af7fb97871bd771b6
                          • Opcode Fuzzy Hash: 2ff4fce7c77f293058c68d3cc450b499553666d9f0ef4978638c54b6cd64c25f
                          • Instruction Fuzzy Hash: 0CA16F759012099FDB15DFA8D8C0BAEB7B5AB88300F14453EE905B73C2DB78AD45CB58
                          APIs
                          • lstrcatW.KERNEL32(?, /c "), ref: 0042DD92
                          • lstrcatW.KERNEL32(?,00000000,?, /c "), ref: 0042DDA7
                          • lstrcatW.KERNEL32(?,0042DF9C,?,00000000,?, /c "), ref: 0042DDB8
                            • Part of subcall function 0042B474: lstrlenW.KERNEL32(00000000,00000000,0042B658,?,?,?,00000001), ref: 0042B4AE
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: lstrcat$lstrlen
                          • String ID: /c "$8[B$COMSPEC$D$HfH$|aH
                          • API String ID: 751011610-206186839
                          • Opcode ID: 3fd42765af6cd0e49e37bf4326e02f1654d9d2902df654bd2d7dff41fd898852
                          • Instruction ID: 81ed9846a7d3f65a68619d801d78e7a443c993b2260b494b6be705ed66106b92
                          • Opcode Fuzzy Hash: 3fd42765af6cd0e49e37bf4326e02f1654d9d2902df654bd2d7dff41fd898852
                          • Instruction Fuzzy Hash: 9AA14B70A002199FDB11DBA9DC81F9EB3F8FB48304F91417AF544EB291DB79A944CB68
                          APIs
                          • IsValidLocale.KERNEL32(?,00000001,00000000,0041AB5F,?,?,?,?,00000000,00000000), ref: 0041A897
                          • GetThreadLocale.KERNEL32(?,00000001,00000000,0041AB5F,?,?,?,?,00000000,00000000), ref: 0041A8A0
                            • Part of subcall function 0041A844: GetLocaleInfoW.KERNEL32(?,0000000F,0041A950,00000002,0000002C,?,?,?,0041A950), ref: 0041A857
                            • Part of subcall function 0041A7F8: GetLocaleInfoW.KERNEL32(?,?,?,00000100), ref: 0041A816
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Locale$Info$ThreadValid
                          • String ID: AMPM$2$:mm$:mm:ss$AMPM $m/d/yy$mmmm d, yyyy
                          • API String ID: 233154393-3379564615
                          • Opcode ID: 94823e5df3ed155d42373aeca29090d4622e880d401ed27dd137ea8507bc74b4
                          • Instruction ID: 5b46dc006f98231a26cae34b1307f24b2f5ea33c94de3b4259bcb689306f24a8
                          • Opcode Fuzzy Hash: 94823e5df3ed155d42373aeca29090d4622e880d401ed27dd137ea8507bc74b4
                          • Instruction Fuzzy Hash: C77154347011585BDB01EBA5C841BDE76BAEF48304F50807BF515AB286DB3CDEA2879E
                          APIs
                            • Part of subcall function 0040514C: GetTickCount.KERNEL32 ref: 00405183
                            • Part of subcall function 0040514C: GetTickCount.KERNEL32 ref: 0040519B
                            • Part of subcall function 0041A7F8: GetLocaleInfoW.KERNEL32(?,?,?,00000100), ref: 0041A816
                          • GetThreadLocale.KERNEL32(00000000,00000004), ref: 0041B10F
                          • EnumCalendarInfoW.KERNEL32(0041AF60,00000000,00000000,00000004), ref: 0041B11A
                          • GetThreadLocale.KERNEL32(00000000,00000003,0041AF60,00000000,00000000,00000004), ref: 0041B14A
                          • EnumCalendarInfoW.KERNEL32(0041AFEC,00000000,00000000,00000003,0041AF60,00000000,00000000,00000004), ref: 0041B155
                          • GetThreadLocale.KERNEL32(00000000,00000004), ref: 0041B1E6
                          • EnumCalendarInfoW.KERNEL32(0041AF60,00000000,00000000,00000004), ref: 0041B1F1
                          • GetThreadLocale.KERNEL32(00000000,00000003,0041AF60,00000000,00000000,00000004), ref: 0041B223
                          • EnumCalendarInfoW.KERNEL32(0041AFEC,00000000,00000000,00000003,0041AF60,00000000,00000000,00000004), ref: 0041B22E
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: InfoLocale$CalendarEnumThread$CountTick
                          • String ID: B.C.
                          • API String ID: 1601775584-621294921
                          • Opcode ID: bc8247d33fe5370433e2fd6ccc15e77975c242f0979f0cb17630a33c32e31ca2
                          • Instruction ID: d5467c5867d662d48c46f78aef8c8699bdd0855b3e6aaee3d787cd1117f7295e
                          • Opcode Fuzzy Hash: bc8247d33fe5370433e2fd6ccc15e77975c242f0979f0cb17630a33c32e31ca2
                          • Instruction Fuzzy Hash: 2B51F474A016005FD310EB29DC85BAE7766EB49318F14817AF800AB3E2C77E9D55878E
                          APIs
                            • Part of subcall function 0041B6FC: VirtualQuery.KERNEL32(?,?,0000001C,00000000,0041B8A8), ref: 0041B72F
                            • Part of subcall function 0041B6FC: GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 0041B753
                            • Part of subcall function 0041B6FC: GetModuleFileNameW.KERNEL32(MZP,?,00000105), ref: 0041B76E
                            • Part of subcall function 0041B6FC: LoadStringW.USER32(00000000,0000FFEA,?,00000100), ref: 0041B809
                          • WideCharToMultiByte.KERNEL32(00000001,00000000,?,00000000,00000000,00000000,00000000,00000000,00000400,00000000,0041BA19), ref: 0041B955
                          • WideCharToMultiByte.KERNEL32(00000001,00000000,?,00000000,?,00000000,00000000,00000000), ref: 0041B988
                          • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,00000001,00000000,?,00000000,?,00000000,00000000,00000000), ref: 0041B99A
                          • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000,00000001,00000000,?,00000000,?,00000000,00000000,00000000), ref: 0041B9A0
                          • GetStdHandle.KERNEL32(000000F4,0041BA34,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,00000001,00000000,?,00000000,?), ref: 0041B9B4
                          • WriteFile.KERNEL32(00000000,000000F4,0041BA34,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,00000001,00000000,?,00000000), ref: 0041B9BA
                          • LoadStringW.USER32(00000000,0000FFEB,?,00000040), ref: 0041B9DE
                          • MessageBoxW.USER32(00000000,?,?,00002010), ref: 0041B9F8
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: File$ByteCharHandleLoadModuleMultiNameStringWideWrite$MessageQueryVirtual
                          • String ID: @
                          • API String ID: 135118572-216407459
                          • Opcode ID: 5e5b58603649367f128015842687fb9cd620b316ebe1d037fa3627f5dde79ee1
                          • Instruction ID: f4c401843c9c291ca3b94f10bb34d76506db394776c8f349b425d2b96d247647
                          • Opcode Fuzzy Hash: 5e5b58603649367f128015842687fb9cd620b316ebe1d037fa3627f5dde79ee1
                          • Instruction Fuzzy Hash: A43170B5640204BFE710EB95CC82FDA73ACEB04704F6041BAB644F71D1DAB46E80876D
                          APIs
                            • Part of subcall function 00431DDC: EnumDisplayDevicesW.USER32(00000000,00000000,?,00000000), ref: 00431E54
                          • GetDC.USER32(00000000), ref: 00432084
                          • CreateCompatibleDC.GDI32(?), ref: 004320B2
                          • CreateCompatibleBitmap.GDI32(?,00000001,00000001), ref: 004320C9
                          • SelectObject.GDI32(?,00000000), ref: 004320DE
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CompatibleCreate$BitmapDevicesDisplayEnumObjectSelect
                          • String ID:
                          • API String ID: 3994296461-0
                          • Opcode ID: cd8d25ca6401adaf94d6438fc56196398246b38be6df3099ab2b650cbc4650d4
                          • Instruction ID: 8dcfbefafd19e944f8a09ce47fb504a4e5e56d55f8274aa27d748321d57cd7eb
                          • Opcode Fuzzy Hash: cd8d25ca6401adaf94d6438fc56196398246b38be6df3099ab2b650cbc4650d4
                          • Instruction Fuzzy Hash: E5612775701A02AFD308DFA9C984BD6F7E8BF4D305F40862AE628C7755D774A821CB85
                          APIs
                          • LoadLibraryW.KERNEL32(00000000,00000000,0042D072,?,00000000,00000000,00000000,00000000,00000000,00000000,?,0042C75E,00000000,0042CB8F), ref: 0042CF4F
                            • Part of subcall function 0040ADB8: lstrlenW.KERNEL32(00000000,?,?,00486734,00486680,00425F2B,00000000,00426187,?,00486680,00000000,00000000,?,0043F7A0,00000000,0043FD8B), ref: 0040ADD7
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,?), ref: 0040A4D0
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,00000000), ref: 0040A4F2
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AddressProc$LibraryLoadlstrlen
                          • String ID: @yAeyHy`'MEE$Heefjh}lHgmNl}\myLq]hkelO{fdZ}hjb$Heefjh}lHgmNl}]jyLq]hkelO{fdZ}hjb$Nl}Lq}lgmlm\my]hkel$Nl}Lq}lgmlm]jy]hkel$Zl}]jyLg}{p
                          • API String ID: 1729337914-77311109
                          • Opcode ID: 24fcab706ba486010333c345a5a4c1ee916a8591a563e09837591bfc18d52602
                          • Instruction ID: e9226c6078ce630d9dc907993224ef77e34ecd6abfb291ef623e07e235766894
                          • Opcode Fuzzy Hash: 24fcab706ba486010333c345a5a4c1ee916a8591a563e09837591bfc18d52602
                          • Instruction Fuzzy Hash: 5C318571A102009FC780FBADED89A5E37E9EB45318F81493EB441B72A3D77C59148B6D
                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,GetLogicalProcessorInformation), ref: 00404F9A
                          • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00404FA0
                          • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 00404FB3
                          • GetLastError.KERNEL32(00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 00404FBC
                          • GetLogicalProcessorInformation.KERNEL32(?,?,00000000,00405030,?,00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 00404FE7
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: InformationLogicalProcessor$AddressErrorHandleLastModuleProc
                          • String ID: GetLogicalProcessorInformation$kernel32.dll
                          • API String ID: 1184211438-812649623
                          • Opcode ID: 35201d4d745a74f346a6d86facebae3d15b37a8ffc1e75ce2ae731f58a1f64b0
                          • Instruction ID: 54b7ebe99e7f302da2557309956b5d9292d5a3a304b6d3c4cb150c26000b97f2
                          • Opcode Fuzzy Hash: 35201d4d745a74f346a6d86facebae3d15b37a8ffc1e75ce2ae731f58a1f64b0
                          • Instruction Fuzzy Hash: 8A118471904604AEDF10EBA5CD46B5FB7ACEB44318F2040BBE504B21C2D67D9A80DE5D
                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,GetLogicalProcessorInformation), ref: 00404F9A
                          • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00404FA0
                          • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 00404FB3
                          • GetLastError.KERNEL32(00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 00404FBC
                          • GetLogicalProcessorInformation.KERNEL32(?,?,00000000,00405030,?,00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 00404FE7
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: InformationLogicalProcessor$AddressErrorHandleLastModuleProc
                          • String ID: GetLogicalProcessorInformation$kernel32.dll
                          • API String ID: 1184211438-812649623
                          • Opcode ID: bd05037c37d740ab1b4dc7fa39a3e26f1e2793f84830334b598c92dfe34fff13
                          • Instruction ID: 8199570454523d895cc0032b24ada9d2fbf36891f81a90a2ad8e621ecca28dd4
                          • Opcode Fuzzy Hash: bd05037c37d740ab1b4dc7fa39a3e26f1e2793f84830334b598c92dfe34fff13
                          • Instruction Fuzzy Hash: DC016571904604AADF10EBA18D45A5FB7ACEB04318F20407BF504F61C1D67D9A809E5D
                          APIs
                          • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000,?,?,00405E86,00404023,0040406A,00000000,?), ref: 00405CF1
                          • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000,?,?,00405E86,00404023,0040406A,00000000), ref: 00405CF7
                          • GetStdHandle.KERNEL32(000000F5,00000000,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000,?), ref: 00405D12
                          • WriteFile.KERNEL32(00000000,000000F5,00000000,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000), ref: 00405D18
                          • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00405D36
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: FileHandleWrite$Message
                          • String ID: Error$Runtime error at 00000000
                          • API String ID: 1570097196-2970929446
                          • Opcode ID: 9da2a348520ae705558052009ceb975953c61fbff1b85c89fbedfe3754430604
                          • Instruction ID: 8e6b3ae1d0950b207053b0f6b2d9b368760f02a7951139c7a1ba30855beff3be
                          • Opcode Fuzzy Hash: 9da2a348520ae705558052009ceb975953c61fbff1b85c89fbedfe3754430604
                          • Instruction Fuzzy Hash: CEF096A168578039F710B7A44D0FF5B2248AB85F19F24857FB610B40D2D6FC48D4DA2E
                          APIs
                          • Sleep.KERNEL32(00000000,?), ref: 00402EDA
                          • Sleep.KERNEL32(0000000A,00000000,?), ref: 00402EF4
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: eb1b30fa2819bb7e9c26078b3c9538032f65093cedfba747be72939952c37498
                          • Instruction ID: 3880d568d444d35d86371686d009cb09ec6d1a72a8af32c9c49ca4f9918148e7
                          • Opcode Fuzzy Hash: eb1b30fa2819bb7e9c26078b3c9538032f65093cedfba747be72939952c37498
                          • Instruction Fuzzy Hash: 1471E2716443008FD715DF29CB88B16BBE4AB86314F18817FE488AB3D2D7F89945C79A
                          APIs
                            • Part of subcall function 0040ADB8: lstrlenW.KERNEL32(00000000,?,?,00486734,00486680,00425F2B,00000000,00426187,?,00486680,00000000,00000000,?,0043F7A0,00000000,0043FD8B), ref: 0040ADD7
                          • Sleep.KERNEL32(000001F4), ref: 0043E2BF
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Sleeplstrlen
                          • String ID: D\ymh}l;'lql$HEPhj'hpl$HPHnlg}'hpl$HP]hzb'hpl$HZM\y'lql$_:E`}l'lql$_:E`}lLqy'lql
                          • API String ID: 404571708-2566769197
                          • Opcode ID: 3e7e9006f540cc56e08598e30fd9b1653691ed4bc20626883697585d71805dc7
                          • Instruction ID: acd5230c7a7213d7fe97c03c0ffc7f1d30c64ff60ca5bdd317cc2c1716e60a4c
                          • Opcode Fuzzy Hash: 3e7e9006f540cc56e08598e30fd9b1653691ed4bc20626883697585d71805dc7
                          • Instruction Fuzzy Hash: A4716134A00248DFDB00DB99C181BCDB7B5EF49308F645096E841BB382C779EE54DBAA
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ebb56015c37a3f9fb8dd09f6843bc0f113a4137dadc24ef096fcc9bb47d10006
                          • Instruction ID: d6e953f600fa62a4cb01c07aad8c81ca5a5721795a0ae764ee1700970c6b3899
                          • Opcode Fuzzy Hash: ebb56015c37a3f9fb8dd09f6843bc0f113a4137dadc24ef096fcc9bb47d10006
                          • Instruction Fuzzy Hash: DDC139727102000BD7149E7D9E8932EB7899BC5315F18827FE254EB3D6DABCCD458399
                          APIs
                          • GetProcessHeap.KERNEL32(00000002,00000002,00000000,0042CB8F,?,?,?,?,00000008,00000000,00000000), ref: 0042C7BC
                          • lstrlenW.KERNEL32(00000000,?,00000000,0042CB8F,?,?,?,?,00000008,00000000,00000000), ref: 0042C864
                          • lstrlenW.KERNEL32(00000000,?,00000000,0042CB8F,?,?,?,?,00000008,00000000,00000000), ref: 0042CA7A
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: lstrlen$HeapProcess
                          • String ID: System$TCP$UDP
                          • API String ID: 3046081391-2438800281
                          • Opcode ID: 88694d2fbdde943c0435eec5de8f80067a2fcd43472a4ab3c4714087f239bddd
                          • Instruction ID: 35f293c671a670b9e6b81fc65c15e8a90b22f42eb6ca05dc6d7e89f087aa4173
                          • Opcode Fuzzy Hash: 88694d2fbdde943c0435eec5de8f80067a2fcd43472a4ab3c4714087f239bddd
                          • Instruction Fuzzy Hash: 57D18F31B40219AFDB00EBA5EC86FAEBBB5AF48704F504466F510F7292D778A905CB58
                          APIs
                          • MessageBoxA.USER32(00000000,?,004024F8,00002010), ref: 00403CA0
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Message
                          • String ID: $0$@$7$\$@$$@
                          • API String ID: 2030045667-1228603798
                          • Opcode ID: ac19fcd5adda951769c91ee1a6c17dc81187d7c120c71253a4f0a3854113e247
                          • Instruction ID: e812cd3dc2fef7569f4f822b6a4b970610b3f81895bdd3cedabc248f3003e63a
                          • Opcode Fuzzy Hash: ac19fcd5adda951769c91ee1a6c17dc81187d7c120c71253a4f0a3854113e247
                          • Instruction Fuzzy Hash: 18B1CA30B042548BDB21DF2DC885B997BF8AB4A709F0441FAE449F7382CB785E85CB59
                          APIs
                          • lstrlenW.KERNEL32(00000000,00000000,0042E424,?,?,00000000,00000000), ref: 0042E0BD
                          • lstrlenW.KERNEL32(?,00000000,00000000,0042E424,?,?,00000000,00000000), ref: 0042E0C8
                          • Sleep.KERNEL32(00000001), ref: 0042E263
                            • Part of subcall function 0042DFF8: lstrlenW.KERNEL32(00000000,?,0042E25D), ref: 0042E004
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: lstrlen$Sleep
                          • String ID: *.*$.$\
                          • API String ID: 429307061-3468707253
                          • Opcode ID: 9f9bcafb5e9fb64157171f683f2fc74301651e60c6e824bc7875f9f762880367
                          • Instruction ID: 874b38f9c15a16064f5124428c196f5401a35f00216acdfa7908766dcb98f518
                          • Opcode Fuzzy Hash: 9f9bcafb5e9fb64157171f683f2fc74301651e60c6e824bc7875f9f762880367
                          • Instruction Fuzzy Hash: BDA193306002299FDB60EB65EC85B9D77F8EB48304F9145F6E409E32A1DB789E84CF58
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterExistsFileLeavePath
                          • String ID: " "$.exe$/Update$HfH
                          • API String ID: 3310751803-1929450815
                          • Opcode ID: 8181cd79e1e3e5ac8fd14cff0b35ed8bd52b1d0ecc790f0d4226f329b4ffdd8c
                          • Instruction ID: 609c13bec061a5d4637fb112db9b101bfdfe75ff76c94aae5f827595d8871324
                          • Opcode Fuzzy Hash: 8181cd79e1e3e5ac8fd14cff0b35ed8bd52b1d0ecc790f0d4226f329b4ffdd8c
                          • Instruction Fuzzy Hash: 6951A374604205AFDB10EBA9C8A2B9F73E4EB0D344F105066FA10D7391DB7DAD049B99
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000), ref: 0043CDCF
                          • LoadLibraryW.KERNEL32(00000000,00000000), ref: 0043CE1C
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: HandleLibraryLoadModule
                          • String ID: *.*$XXX_InfoW$XXX_Plugs\$XXX_Starting
                          • API String ID: 4133054770-2785245216
                          • Opcode ID: f71acd30243d42f49c7826a7ce0a7bd6944551d3629e193985cfb457d1c80ab8
                          • Instruction ID: 5c59f4733bd3e6e152ae9da63c784154abf35261a6166e2ebc2e54f53956f2ea
                          • Opcode Fuzzy Hash: f71acd30243d42f49c7826a7ce0a7bd6944551d3629e193985cfb457d1c80ab8
                          • Instruction Fuzzy Hash: 9F518471A056199FCB10EB65DC89A8EB7F5EF48304F1181FBA409F3291DB389E548F58
                          APIs
                            • Part of subcall function 004265F0: htons.WS2_32(?), ref: 00426637
                            • Part of subcall function 004265F0: gethostbyname.WS2_32(00000000), ref: 00426665
                            • Part of subcall function 004265F0: connect.WS2_32(?,00000008,00000010), ref: 00426690
                            • Part of subcall function 004265F0: WSAGetLastError.WS2_32(?,?,00000000,00000000), ref: 004266B9
                            • Part of subcall function 004265F0: Sleep.KERNEL32(00000002,?,?,00000000,00000000), ref: 004266CA
                            • Part of subcall function 004264A8: setsockopt.WS2_32(?,00000006,00000001,?,00000004), ref: 004264C7
                            • Part of subcall function 00426468: setsockopt.WS2_32(?,0000FFFF,00001001,?,00000004), ref: 0042647E
                            • Part of subcall function 0042B474: lstrlenW.KERNEL32(00000000,00000000,0042B658,?,?,?,00000001), ref: 0042B4AE
                            • Part of subcall function 0040B948: GetEnvironmentVariableW.KERNEL32(00000000,?,00000208,004866F8,0043D0E3,00000000,0043D13A,?,00486680,00000001,00000000,00000000,?,00437AE2,?,00000000), ref: 0040B95D
                            • Part of subcall function 0040B948: GetLongPathNameW.KERNEL32(?,?,00000208), ref: 0040B972
                          • Sleep.KERNEL32(000001F4,0042E635,?,00000064,00000000,00000000,0042E65B,?,00000000,0042E67D), ref: 0042E61E
                            • Part of subcall function 0042E088: lstrlenW.KERNEL32(00000000,00000000,0042E424,?,?,00000000,00000000), ref: 0042E0BD
                            • Part of subcall function 0042E088: lstrlenW.KERNEL32(?,00000000,00000000,0042E424,?,?,00000000,00000000), ref: 0042E0C8
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: lstrlen$Sleepsetsockopt$EnvironmentErrorLastLongNamePathVariableconnectgethostbynamehtons
                          • String ID: 8[B$:$HfH$WINDIR$\$\Temp
                          • API String ID: 916843999-738507572
                          • Opcode ID: 0f366920236b2224c0a61124d64c3d71f0ecbd4b1a67fa2613579e386c5848ab
                          • Instruction ID: ba3bdb42cb812209f095133bc7201274ca052839750dfdcc6e646bdf85a6b18d
                          • Opcode Fuzzy Hash: 0f366920236b2224c0a61124d64c3d71f0ecbd4b1a67fa2613579e386c5848ab
                          • Instruction Fuzzy Hash: E2515AB4B10610AFD741EFAAEC51A5A37E5FB19308F82847AE400973E1EB789C41CB5C
                          APIs
                            • Part of subcall function 004053E8: GetCurrentThreadId.KERNEL32 ref: 004053EB
                          • GetTickCount.KERNEL32 ref: 00405183
                          • GetTickCount.KERNEL32 ref: 0040519B
                          • GetCurrentThreadId.KERNEL32 ref: 004051CB
                          • GetTickCount.KERNEL32 ref: 004051F6
                          • GetTickCount.KERNEL32 ref: 0040522D
                          • GetTickCount.KERNEL32 ref: 00405257
                          • GetCurrentThreadId.KERNEL32 ref: 004052C7
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CountTick$CurrentThread
                          • String ID:
                          • API String ID: 3968769311-0
                          • Opcode ID: f9d61921e35b482ef1f14d4eaeacaa075d63589b9816c89e841c04f0b3fb69e2
                          • Instruction ID: e96b3358484ed09efb32f7bf407c562274a0588feb759182786de9b46f441b21
                          • Opcode Fuzzy Hash: f9d61921e35b482ef1f14d4eaeacaa075d63589b9816c89e841c04f0b3fb69e2
                          • Instruction Fuzzy Hash: EF418D30608B419FD721EE78C58431FBAD1EF94354F15897EE8D89B3C1EA7898818F5A
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID:
                          • String ID: ,fH
                          • API String ID: 0-2243322645
                          • Opcode ID: 1d201e2f3158f48b80e96ba174cdfec9ebc3d6a068077817cc3a2737f294f5eb
                          • Instruction ID: 3e325106465cb2dd41976618392b57abfc7347bc5e4f7f75e8d06feff1e239a5
                          • Opcode Fuzzy Hash: 1d201e2f3158f48b80e96ba174cdfec9ebc3d6a068077817cc3a2737f294f5eb
                          • Instruction Fuzzy Hash: A7414D357052409FDB01DF99C9C0FE737A4AB0A750F1801BAFE499F68AC3A898418B76
                          APIs
                          • InternetOpenW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0040BC87
                          • InternetOpenUrlW.WININET(00000000,?,00000000,00000000,40000000,00000000), ref: 0040BCB8
                          • HttpQueryInfoW.WININET(00000000,20000005,?,00000004,?), ref: 0040BCFA
                          • InternetCloseHandle.WININET(00000000), ref: 0040BD8F
                            • Part of subcall function 0040B634: VirtualAlloc.KERNEL32(00000000,00000000,00001000,00000004,00428AA0,?,?,00486734,00486680,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040B63E
                          • InternetReadFile.WININET(00000000,?,?,?), ref: 0040BD2F
                            • Part of subcall function 0040B644: VirtualFree.KERNEL32(00000000,00000000,00008000,00428B66,?,?,00486734,00486680,00000000,00000000,00000000,00000000,00000000,00000000,?,00437E88), ref: 0040B64C
                          • InternetCloseHandle.WININET(00000000), ref: 0040BDAE
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Internet$CloseHandleOpenVirtual$AllocFileFreeHttpInfoQueryRead
                          • String ID:
                          • API String ID: 436716311-0
                          • Opcode ID: 3e7517a180f2519e9ef8862004f9ea7d21659a34cfeb77de3d18cea408e80831
                          • Instruction ID: 2d81d751fc6afc2710d3bfc5214d13ec27d882b95dc00282e94316269f0eb743
                          • Opcode Fuzzy Hash: 3e7517a180f2519e9ef8862004f9ea7d21659a34cfeb77de3d18cea408e80831
                          • Instruction Fuzzy Hash: 90417975A04208AFDB11DFA4DC95BAEB7B8EB49700F114476F505E3290DB389900CB68
                          APIs
                          • Sleep.KERNEL32(00000000,FFFFFFDC,00402A8C), ref: 00402B77
                          • Sleep.KERNEL32(0000000A,00000000,FFFFFFDC,00402A8C), ref: 00402B8D
                          • Sleep.KERNEL32(00000000,?,?,FFFFFFDC,00402A8C), ref: 00402BBB
                          • Sleep.KERNEL32(0000000A,00000000,?,?,FFFFFFDC,00402A8C), ref: 00402BD1
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: 00e817329ed30a61a1e3ce9785030074bf56165d3748735972e8587115fb55d2
                          • Instruction ID: e9b8b7081cf30ab9f8610f5ddeb7dffbd4721761cd41d76955e75723a6189a5d
                          • Opcode Fuzzy Hash: 00e817329ed30a61a1e3ce9785030074bf56165d3748735972e8587115fb55d2
                          • Instruction Fuzzy Hash: 89C149766013108FDB19CF29DB88316BBE0AB86314F18827FD444AB3D5C7B8D955CB9A
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID:
                          • String ID: $0$@$7$\$@
                          • API String ID: 0-4266993835
                          • Opcode ID: 0898838d16f207543cc06ffe88efb152eba2014c6d30357a487cafd616e18d10
                          • Instruction ID: b3e4678ffb9dae527c939fda3aba35b48a12a95a819a0055bfac3d4281ef8523
                          • Opcode Fuzzy Hash: 0898838d16f207543cc06ffe88efb152eba2014c6d30357a487cafd616e18d10
                          • Instruction Fuzzy Hash: 1881C730B042548FDB21DF2DC885B99BBF8AB4A709F0441F6E049F7382DB785A85CB59
                          APIs
                          • VirtualQuery.KERNEL32(?,?,0000001C,00000000,0041B8A8), ref: 0041B72F
                          • GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 0041B753
                          • GetModuleFileNameW.KERNEL32(MZP,?,00000105), ref: 0041B76E
                          • LoadStringW.USER32(00000000,0000FFEA,?,00000100), ref: 0041B809
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: FileModuleName$LoadQueryStringVirtual
                          • String ID: MZP
                          • API String ID: 3990497365-2889622443
                          • Opcode ID: 33485dccd570a2a0afe39b740a752237986253bc9c59ef7515bff66579f2bf26
                          • Instruction ID: c27a278696c1af428c112a5138f6c708912e0e629acd6ed950e1bdc93ff39661
                          • Opcode Fuzzy Hash: 33485dccd570a2a0afe39b740a752237986253bc9c59ef7515bff66579f2bf26
                          • Instruction Fuzzy Hash: 19411F70A002589FDB20EF65CC81BCAB7B9EB88314F0040FAE508E7281D7799E95CF59
                          APIs
                          • GetWindowTextW.USER32(?,00485D2C,00000200), ref: 0042C179
                            • Part of subcall function 00428094: IsWow64Process.KERNEL32(00000000,?,?,00000000,00428168), ref: 00428115
                          • IsWindowVisible.USER32(?), ref: 0042C239
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Window$ProcessTextVisibleWow64
                          • String ID: (]H$,]H$,_H
                          • API String ID: 855330406-2296990632
                          • Opcode ID: 8494e179cabbb1639a2a86b9c0db99363ec066141d2bbb155df1d5a4e22ab67b
                          • Instruction ID: d95932ed8a37d93c08fe9a1a55fadeb8aae1f262f1f2142a84b6d5f9324e449e
                          • Opcode Fuzzy Hash: 8494e179cabbb1639a2a86b9c0db99363ec066141d2bbb155df1d5a4e22ab67b
                          • Instruction Fuzzy Hash: 7C319D31B00214AFEB01EBA1DC82EAE77B5EF48704F518477B50172191CA7D9D15972C
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,?,00465CA0,0042C023,?,00000064,00000000,00000000,0042C0D8), ref: 0042BDB6
                          • RegisterClassW.USER32(00465CD8), ref: 0042BDC6
                          • ShowWindow.USER32(00000000,00000001,00000000,00000000,00000000,00000000,0000015E,000001F4,00000000,00000000,100F0080), ref: 0042BE64
                          • SetForegroundWindow.USER32(00000000), ref: 0042BE6F
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Window$ClassForegroundHandleModuleRegisterShow
                          • String ID: RAT_Chat
                          • API String ID: 3776541383-1508558188
                          • Opcode ID: 3da53fab4287da6ac28a1f121945f4a6c5748e60b917b128f9c393c7511c022f
                          • Instruction ID: e3e0ff72afeb0ca95b62b861ee8d58a389ac77bdb3e2b56e9a420627b55a5118
                          • Opcode Fuzzy Hash: 3da53fab4287da6ac28a1f121945f4a6c5748e60b917b128f9c393c7511c022f
                          • Instruction Fuzzy Hash: DA211D75740B109BE710DF68EC45BA633E4EB04708F94853AF644DB3D1EBB9A804878E
                          APIs
                          • GetUserObjectInformationW.USER32(00000000,00000002,?,00000100,?,?,004328AD,?,00000000,0043294A), ref: 0040E886
                          • OpenWindowStationW.USER32(winsta0,00000000,0000037F), ref: 0040E8A8
                          • SetProcessWindowStation.USER32(00000000,?,004328AD,?,00000000,0043294A), ref: 0040E8B4
                          • OpenDesktopW.USER32(?,00000000,00000000,000001FF), ref: 0040E8CB
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: OpenStationWindow$DesktopInformationObjectProcessUser
                          • String ID: winsta0
                          • API String ID: 3539518509-3440837585
                          • Opcode ID: 159005afdda627ef5a1ff0f0402107ecf24fb7b8575005aeb33b992befac07c1
                          • Instruction ID: 07935d2aa83b5d675ff6c58e78f2920d5cf53bccb1719f4e7f0ccf1e20ed6600
                          • Opcode Fuzzy Hash: 159005afdda627ef5a1ff0f0402107ecf24fb7b8575005aeb33b992befac07c1
                          • Instruction Fuzzy Hash: 5C1124752443016FE310EBA9DC81F6B73EC6B45700F44483AB984EB3D1DAB9ED14972A
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,?,00486680,00000001,0000000F,?,00437564,00000000,00437B2F,?,00486734,00486680,00000000,00000000,?,0043F7E0), ref: 0040BA70
                          • FindResourceW.KERNEL32(00000000,00000000,0000000A,00000000,?,00486680,00000001,0000000F,?,00437564,00000000,00437B2F,?,00486734,00486680,00000000), ref: 0040BA82
                          • LoadResource.KERNEL32(00000000,00000000,00000000,0040BAD8,?,?,00486680,00000001,0000000F,?,00437564,00000000,00437B2F,?,00486734,00486680), ref: 0040BAA4
                          • LockResource.KERNEL32(00000000,?,?,00486680,00000001,0000000F,?,00437564,00000000,00437B2F,?,00486734,00486680,00000000,00000000), ref: 0040BAB1
                          • FreeResource.KERNEL32(00000000,0040BADF,00000001,0000000F,?,00437564,00000000,00437B2F,?,00486734,00486680,00000000,00000000,?,0043F7E0,00000000), ref: 0040BAD1
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Resource$FindFreeHandleLoadLockModule
                          • String ID:
                          • API String ID: 2355082082-0
                          • Opcode ID: 3f0eb233740970fe425e4189b138455d4fb9001c1d9e8dd3634329448ef4e4b8
                          • Instruction ID: 1a3ff52bf1ac6d4834992fad00352ded9c14d174eaf5e093c7de7b05a94e74d9
                          • Opcode Fuzzy Hash: 3f0eb233740970fe425e4189b138455d4fb9001c1d9e8dd3634329448ef4e4b8
                          • Instruction Fuzzy Hash: 3101F776B41304BFE701ABB9AC85B2ABBECDB89715F150436F506E3281DA799D00866C
                          APIs
                          • lstrlenW.KERNEL32(00000000,00000000,0042716D), ref: 00426FCA
                          • CharUpperW.USER32(?,00000000,00000000,0042716D), ref: 00426FEE
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CharUpperlstrlen
                          • String ID: :$|/Is\|
                          • API String ID: 108730823-2327451341
                          • Opcode ID: ba4b3e01cebbaa481af6e6a77b06f47b08762847adc1fc8c6b2a5010666fc814
                          • Instruction ID: 93d54500de09d398291ab5124b2714aa455b2298479d6696639ba076840c05b2
                          • Opcode Fuzzy Hash: ba4b3e01cebbaa481af6e6a77b06f47b08762847adc1fc8c6b2a5010666fc814
                          • Instruction Fuzzy Hash: 24514934A041299BDB00EF99D841AEEBBB5FF48304F51807BF405B3351D7799A25CBA9
                          APIs
                          • GetCurrentThreadId.KERNEL32 ref: 00405D81
                          • FreeLibrary.KERNEL32(00400000,?,00000000,?,?,00405E86,00404023,0040406A,00000000,?,00404083,?,?,?,?,00486734), ref: 00405E22
                          • ExitProcess.KERNEL32(00000000,?,00000000,?,?,00405E86,00404023,0040406A,00000000,?,00404083,?,?,?,?,00486734), ref: 00405E5E
                            • Part of subcall function 00405CB8: GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000,?,?,00405E86,00404023,0040406A,00000000,?), ref: 00405CF1
                            • Part of subcall function 00405CB8: WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000,?,?,00405E86,00404023,0040406A,00000000), ref: 00405CF7
                            • Part of subcall function 00405CB8: GetStdHandle.KERNEL32(000000F5,00000000,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000,?), ref: 00405D12
                            • Part of subcall function 00405CB8: WriteFile.KERNEL32(00000000,000000F5,00000000,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000), ref: 00405D18
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: FileHandleWrite$CurrentExitFreeLibraryProcessThread
                          • String ID: MZP
                          • API String ID: 3490077880-2889622443
                          • Opcode ID: d90ee3a893a0dc72c3848248a1873dcb725225a210599cc20fd1a5d12a6e168f
                          • Instruction ID: e92a30f647e059f84c3662a5853805e55c155ad4ddc6fc357ea8e0081ace97c3
                          • Opcode Fuzzy Hash: d90ee3a893a0dc72c3848248a1873dcb725225a210599cc20fd1a5d12a6e168f
                          • Instruction Fuzzy Hash: 62315C34601B418BE761ABB9A48935B76E0EF45318F14483FE581A72D2D77CA884CF5E
                          APIs
                          • GetCurrentThreadId.KERNEL32 ref: 00405D81
                          • FreeLibrary.KERNEL32(00400000,?,00000000,?,?,00405E86,00404023,0040406A,00000000,?,00404083,?,?,?,?,00486734), ref: 00405E22
                          • ExitProcess.KERNEL32(00000000,?,00000000,?,?,00405E86,00404023,0040406A,00000000,?,00404083,?,?,?,?,00486734), ref: 00405E5E
                            • Part of subcall function 00405CB8: GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000,?,?,00405E86,00404023,0040406A,00000000,?), ref: 00405CF1
                            • Part of subcall function 00405CB8: WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000,?,?,00405E86,00404023,0040406A,00000000), ref: 00405CF7
                            • Part of subcall function 00405CB8: GetStdHandle.KERNEL32(000000F5,00000000,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000,?), ref: 00405D12
                            • Part of subcall function 00405CB8: WriteFile.KERNEL32(00000000,000000F5,00000000,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000), ref: 00405D18
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: FileHandleWrite$CurrentExitFreeLibraryProcessThread
                          • String ID: MZP
                          • API String ID: 3490077880-2889622443
                          • Opcode ID: 476567bd706faa08b2860b4bdb782b6af1774b5e27a4e3545c261a0e26a7b744
                          • Instruction ID: b38e6e20968f9dd51013dd86da7a5adcd4d42222583a8947ff30ec8df154a19c
                          • Opcode Fuzzy Hash: 476567bd706faa08b2860b4bdb782b6af1774b5e27a4e3545c261a0e26a7b744
                          • Instruction Fuzzy Hash: 7E316D34600B418BE760AB69E48971B76E4EF45318F14443FE580A73D2D77CA884CF5D
                          APIs
                          • MessageBoxW.USER32(00000000,Not Config,0040B610,?), ref: 0040B5FB
                          • MessageBoxW.USER32(00000000,Not Config,GGT,?), ref: 0040B606
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Message
                          • String ID: GGT$Not Config
                          • API String ID: 2030045667-3135470170
                          • Opcode ID: 4b8a4c59b1f7a2e123fa8cac472319ef520fd058445deb380fb68a97e84f0c4a
                          • Instruction ID: 09803daf9443879b7dc9e8754dbd7872eb60d7eb9ad1f4574c2174cc229b4f7d
                          • Opcode Fuzzy Hash: 4b8a4c59b1f7a2e123fa8cac472319ef520fd058445deb380fb68a97e84f0c4a
                          • Instruction Fuzzy Hash: 0FD0A9A112432875D4202A130C02DB32A2CCC917A03088C3BB90472182863BAC2040FF
                          APIs
                          • EnterCriticalSection.KERNEL32(0048664C,00000000,00439427,?,?,?,?,00000000,00000000), ref: 004392B4
                          • lstrlenW.KERNEL32(00000000,?,00439448,?,00439448,?,00439448,?,?,0048664C,00000000,00439427), ref: 00439396
                          • LeaveCriticalSection.KERNEL32(0048664C,00439404,00439427,?,?,?,?,00000000,00000000), ref: 004393F7
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterLeavelstrlen
                          • String ID: 4gH
                          • API String ID: 3224049430-2392367260
                          • Opcode ID: 47defe703287ea594ae1c07abb13b2d47f8dddb316f1a99fff683f0de99b3499
                          • Instruction ID: 4ccfdad5408f303f1bc6ef96d1109fe59f5890f2a7af6574d1485d49e1ed1b7c
                          • Opcode Fuzzy Hash: 47defe703287ea594ae1c07abb13b2d47f8dddb316f1a99fff683f0de99b3499
                          • Instruction Fuzzy Hash: 9541A031604208AFDB01EBA5CC42F9E77F8EB4D714F614076F500F72D1DAB9AE119A69
                          APIs
                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0042BA43
                          • SendMessageW.USER32(00000000,0000000D,?,00465D1C), ref: 0042BA86
                          • SetWindowTextW.USER32(00000000,00000000), ref: 0042BACA
                          • SetFocus.USER32(00000000,00000000,00000000,?,00000000,0000000E,00000000,00000000,00000000,0042BAF0,?,00000000), ref: 0042BAD5
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: MessageSend$FocusTextWindow
                          • String ID:
                          • API String ID: 2333564098-0
                          • Opcode ID: 14eaf776a827c111dba999793b4b2e13d356559fd8bd16515faad1c53ea696ad
                          • Instruction ID: c5c6d1f71d7d5abd3f140a9d873e570a62db933a69622a8a51123b3dec96c00d
                          • Opcode Fuzzy Hash: 14eaf776a827c111dba999793b4b2e13d356559fd8bd16515faad1c53ea696ad
                          • Instruction Fuzzy Hash: 97112E74640704ABD710EB55FC5AB5A73F8E748704FA0883AF5009B2E1D7F9A950875D
                          APIs
                          • FreeLibrary.KERNEL32(00000000), ref: 004094F7
                          • LocalFree.KERNEL32(0059E840,00000000), ref: 00409511
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Free$LibraryLocal
                          • String ID: @Y
                          • API String ID: 3007483513-2635300530
                          • Opcode ID: f1440c9207516d799bff01a95fb1b780083962cb9caf534dbe967da67f6cd1a4
                          • Instruction ID: 794add6f56abb578411f7ef61ae6dacc1c24b6d74e6f65c8e1d29d9f289a045b
                          • Opcode Fuzzy Hash: f1440c9207516d799bff01a95fb1b780083962cb9caf534dbe967da67f6cd1a4
                          • Instruction Fuzzy Hash: 4731A472900105ABCB14DFA6D8C19BFB3B8AF84314B14453EE904B7382DB39DD41CBA8
                          APIs
                            • Part of subcall function 0040B948: GetEnvironmentVariableW.KERNEL32(00000000,?,00000208,004866F8,0043D0E3,00000000,0043D13A,?,00486680,00000001,00000000,00000000,?,00437AE2,?,00000000), ref: 0040B95D
                            • Part of subcall function 0040B948: GetLongPathNameW.KERNEL32(?,?,00000208), ref: 0040B972
                            • Part of subcall function 0040ACA4: lstrlenW.KERNEL32(00000000,?,?,00486730,?), ref: 0040ACDD
                          • PathFileExistsW.SHLWAPI(00000000,?,?,00000000,00000000,Temp,?,00000000,0040B377,?,?,00486680,00000000,00000000,00000000,00000000), ref: 0040B31D
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Path$EnvironmentExistsFileLongNameVariablelstrlen
                          • String ID: Temp$Temp
                          • API String ID: 2856746939-245102275
                          • Opcode ID: fc830c92589ad5342fd4e66cf01ed2c17b86b29a44920e7f029c1e3a9a43f651
                          • Instruction ID: 46c15489f3eb44522c785d134b2f827a4a98169e1fe77a71831a75c28b8f49eb
                          • Opcode Fuzzy Hash: fc830c92589ad5342fd4e66cf01ed2c17b86b29a44920e7f029c1e3a9a43f651
                          • Instruction Fuzzy Hash: 46215A70A00119AFDB01EBA1CC52DBFB7B9EF84304B61C47BB941B3690D77C9D1196A8
                          APIs
                            • Part of subcall function 0040B948: GetEnvironmentVariableW.KERNEL32(00000000,?,00000208,004866F8,0043D0E3,00000000,0043D13A,?,00486680,00000001,00000000,00000000,?,00437AE2,?,00000000), ref: 0040B95D
                            • Part of subcall function 0040B948: GetLongPathNameW.KERNEL32(?,?,00000208), ref: 0040B972
                            • Part of subcall function 0040ACA4: lstrlenW.KERNEL32(00000000,?,?,00486730,?), ref: 0040ACDD
                          • PathFileExistsW.SHLWAPI(00000000,?,?,00000000,00000000,Temp,?,00000000,0040B498,?,?,00486680,00000000,00000000,00000000,00000000), ref: 0040B43E
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Path$EnvironmentExistsFileLongNameVariablelstrlen
                          • String ID: Temp$Temp
                          • API String ID: 2856746939-245102275
                          • Opcode ID: 7237d7c97321785c44f2b4371a02576726028b20681e666b8d51949dfb1120e9
                          • Instruction ID: 320bcaab7f7199f54f19ef5aa5192f16669c5e948fce9d3d7dddb2f051f29b96
                          • Opcode Fuzzy Hash: 7237d7c97321785c44f2b4371a02576726028b20681e666b8d51949dfb1120e9
                          • Instruction Fuzzy Hash: 46215D70A001196FDB01EBA1CC51D6FB7B9EF84704F21C477B501B3295D77C9A1596A8
                          APIs
                          • LoadLibraryW.KERNEL32(00000000,00000000,004274B0,?,?,00486680,00000000,00000000,?,0043F226,?,00486734,00486680,00000000,00000000,00000000), ref: 00427469
                            • Part of subcall function 0040ADB8: lstrlenW.KERNEL32(00000000,?,?,00486734,00486680,00425F2B,00000000,00426187,?,00486680,00000000,00000000,?,0043F7A0,00000000,0043FD8B), ref: 0040ADD7
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,?), ref: 0040A4D0
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProclstrlen
                          • String ID: ZAO`elFyl{h}`fg^$zalee:;'MEE
                          • API String ID: 2991167014-1447228337
                          • Opcode ID: c820523d15c9dbf95b80c6cde00e35f83b407bfca9d4687b59677f06df80f873
                          • Instruction ID: 077bc46651e9a40de25fcd03cddb1c768f49804e1acef1ba0aff0074e990fe41
                          • Opcode Fuzzy Hash: c820523d15c9dbf95b80c6cde00e35f83b407bfca9d4687b59677f06df80f873
                          • Instruction Fuzzy Hash: FAF0C231605718ABD711FBA1DC02B5DBBACEF45718FD2407AF800B7681D67CAE1046AD
                          APIs
                          • PostMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 0043042A
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: MessagePost
                          • String ID: #32770$Button
                          • API String ID: 410705778-3763930512
                          • Opcode ID: 80110679f937891faa6f7cba931e5fed77503df53b31854cfd618e18af252cd2
                          • Instruction ID: 28ed841a6425ce2d44e84357510c75fb6cb91fbfeaac2ff36796f76db45616d3
                          • Opcode Fuzzy Hash: 80110679f937891faa6f7cba931e5fed77503df53b31854cfd618e18af252cd2
                          • Instruction Fuzzy Hash: F3E086743C13026FE62097588CE6F1A63A85739B04F246176B700FB2E0CEE8EE14D61C
                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,00486680,0043F20A,00000001,00000000,?,00486734,00486680,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040B4E5
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,?), ref: 0040A4D0
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                          • API String ID: 1646373207-3689287502
                          • Opcode ID: 2dac5d5c5663db8a0450eab5fd166fe870256cbb9f231f614ab9bd4640426b9f
                          • Instruction ID: 2aacd0a7d080d4f8486dfed4c2e02e9ea53df2493b021d7d88a6b83d7c6298d6
                          • Opcode Fuzzy Hash: 2dac5d5c5663db8a0450eab5fd166fe870256cbb9f231f614ab9bd4640426b9f
                          • Instruction Fuzzy Hash: 26C0129231272439E50071F91CC6EF7028CC9453AE31004B3F900F11C2E7AC4D2011EE
                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,00486680,0043F3D6,00000000,?,00486734,00486680,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040B56D
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,?), ref: 0040A4D0
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                          • API String ID: 1646373207-1355242751
                          • Opcode ID: 95d41de4b2aaa3d5bceb4c6ece1da09edf5c32e92841572d0be30113edd33b41
                          • Instruction ID: 8249db6378fdea734a8c5b5c79ccac93c87cf519fdf57918cf521f3dbb983d50
                          • Opcode Fuzzy Hash: 95d41de4b2aaa3d5bceb4c6ece1da09edf5c32e92841572d0be30113edd33b41
                          • Instruction Fuzzy Hash: 5CC002963563243DE65172F51CC69EB528CC9557AE36408B7FD00F11C3E7AD4D2111ED
                          APIs
                          • LoadLibraryW.KERNEL32(ntdll.dll,00000000,00000000,00000000,0043E626), ref: 0043E4B0
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,?), ref: 0040A4D0
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: NtUnmapViewOfSection$ntdll.dll
                          • API String ID: 2574300362-1050664331
                          • Opcode ID: 31b82d30f3ad7dba5dbea5cdbf4706ed8ff0013fde9a1af21a2c0f08b4647315
                          • Instruction ID: 4e69b6650e6ade436c82b191c502fd32af055e20bfb3fd8e8d0f99f71a318bac
                          • Opcode Fuzzy Hash: 31b82d30f3ad7dba5dbea5cdbf4706ed8ff0013fde9a1af21a2c0f08b4647315
                          • Instruction Fuzzy Hash: 05C012523036103A911031E71C86D6B454CCCEAAB53105037B514E2182D4AC4C114179
                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,00443377,00000000,004433AE), ref: 0041D23E
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,?), ref: 0040A4D0
                          Strings
                          Memory Dump Source
                          • Source File: 00000009.00000002.2959104302.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000009.00000002.2959104302.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000464000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 00000009.00000002.2959104302.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_9_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: GetDiskFreeSpaceExW$kernel32.dll
                          • API String ID: 1646373207-1127948838
                          • Opcode ID: a79e509d4b5e1b93e5af0388efdb664cba8b92b54a70f921204110405e308a7a
                          • Instruction ID: 1ed0fb5f9b62a531acb68cd7a06d8274aa2f261e9248045f22735aa701152202
                          • Opcode Fuzzy Hash: a79e509d4b5e1b93e5af0388efdb664cba8b92b54a70f921204110405e308a7a
                          • Instruction Fuzzy Hash: 80D0A9F8E423604ED700EBE09DC6B823798879A308F0000BBB02057283CBBCC89C820C

                          Execution Graph

                          Execution Coverage:4.8%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:0%
                          Total number of Nodes:2000
                          Total number of Limit Nodes:30
                          execution_graph 15619 402ac0 15620 402d20 15619->15620 15626 402ad8 15619->15626 15621 402e38 15620->15621 15622 402ce4 15620->15622 15623 402e41 15621->15623 15624 402868 VirtualAlloc 15621->15624 15627 402d3e 15622->15627 15631 402cfe Sleep 15622->15631 15628 4028a3 15624->15628 15629 402893 15624->15629 15625 402aea 15630 402af9 15625->15630 15633 402bd8 15625->15633 15637 402bb9 Sleep 15625->15637 15626->15625 15635 402b75 Sleep 15626->15635 15638 4027a8 VirtualAlloc 15627->15638 15639 402d5c 15627->15639 15643 402820 15629->15643 15631->15627 15634 402d14 Sleep 15631->15634 15642 402be4 15633->15642 15648 4027a8 15633->15648 15634->15622 15635->15625 15636 402b8b Sleep 15635->15636 15636->15626 15637->15633 15641 402bcf Sleep 15637->15641 15638->15639 15641->15625 15644 402866 15643->15644 15646 402829 15643->15646 15644->15628 15645 402834 Sleep 15645->15646 15646->15644 15646->15645 15647 40284d Sleep 15646->15647 15647->15646 15652 40273c 15648->15652 15650 4027b0 VirtualAlloc 15651 4027c7 15650->15651 15651->15642 15653 4026dc 15652->15653 15653->15650 15654 408f10 GetSystemInfo 15655 43a870 15656 43a896 15655->15656 15679 43a7b4 CreateFileW 15656->15679 15658 43a89e 15678 43a96a 15658->15678 15683 40adb8 15658->15683 15661 43a8b1 15690 4063e8 15661->15690 15663 406060 12 API calls 15665 43a997 15663->15665 15668 43a8d3 15670 40ad0c 12 API calls 15668->15670 15673 43a912 15668->15673 15668->15678 15669 40ad0c 12 API calls 15674 43a931 15669->15674 15671 43a905 15670->15671 15705 4063a0 15671->15705 15673->15669 15673->15678 15675 40ad0c 12 API calls 15674->15675 15674->15678 15676 43a95d 15675->15676 15677 4063a0 12 API calls 15676->15677 15677->15678 15711 406060 15678->15711 15680 43a7e6 15679->15680 15682 43a83a 15679->15682 15680->15682 15715 4069a8 15680->15715 15682->15658 15684 40adc4 15683->15684 15685 40adcd 15683->15685 15802 406000 15684->15802 15688 40add4 lstrlenW 15685->15688 15687 40adcb 15687->15661 15689 4069a8 12 API calls 15688->15689 15689->15687 15692 4063ec 15690->15692 15691 406410 15694 40ad0c 15691->15694 15692->15691 15693 403f50 12 API calls 15692->15693 15693->15691 15695 40ad3c 15694->15695 15696 40ad80 15695->15696 15697 40ad51 15695->15697 15698 4063a0 12 API calls 15696->15698 15806 406bf0 15697->15806 15701 40ad77 15698->15701 15703 406000 12 API calls 15701->15703 15704 40ada6 15703->15704 15704->15668 15706 4063a4 15705->15706 15709 4063b4 15705->15709 15708 405f54 12 API calls 15706->15708 15706->15709 15707 4063e4 15707->15673 15708->15709 15709->15707 15710 403f50 12 API calls 15709->15710 15710->15707 15713 406066 15711->15713 15712 40608c 15712->15663 15713->15712 15714 403f50 12 API calls 15713->15714 15714->15713 15719 4069b5 15715->15719 15721 4069ff 15715->15721 15716 4069f3 15735 405f54 15716->15735 15717 406024 12 API calls 15725 4069f0 15717->15725 15719->15716 15720 4069cd 15719->15720 15726 403f68 15720->15726 15721->15717 15723 4069d5 15723->15725 15731 406024 15723->15731 15725->15682 15728 403f6e 15726->15728 15728->15723 15730 403f80 15728->15730 15740 404024 15728->15740 15730->15723 15732 406045 15731->15732 15733 40602a 15731->15733 15732->15725 15733->15732 15792 403f50 15733->15792 15736 405f8c 15735->15736 15737 405f58 15735->15737 15736->15721 15737->15736 15797 403f34 15737->15797 15739 405f67 15739->15721 15741 404036 15740->15741 15742 404049 15741->15742 15746 4090b0 15741->15746 15754 404018 15742->15754 15747 4090e5 TlsGetValue 15746->15747 15748 4090bf 15746->15748 15749 4090ca 15747->15749 15750 4090ef 15747->15750 15748->15742 15757 40906c 15749->15757 15750->15742 15753 4090de 15753->15742 15755 405e7c 12 API calls 15754->15755 15756 404023 15755->15756 15756->15723 15758 409072 15757->15758 15759 40908b 15758->15759 15766 4090a0 TlsGetValue 15758->15766 15767 405e88 15758->15767 15770 409058 LocalAlloc 15759->15770 15762 409092 15763 4090a2 TlsSetValue 15762->15763 15764 409096 15762->15764 15763->15766 15765 405e88 11 API calls 15764->15765 15765->15766 15766->15753 15771 405e7c 15767->15771 15770->15762 15774 405d50 15771->15774 15775 405d67 15774->15775 15778 405d71 15774->15778 15784 405cb8 15775->15784 15776 405d81 GetCurrentThreadId 15780 405d8e 15776->15780 15778->15776 15778->15780 15779 403fd8 9 API calls 15779->15780 15780->15779 15781 405e21 FreeLibrary 15780->15781 15782 405e49 ExitProcess 15780->15782 15781->15780 15785 405cc2 GetStdHandle WriteFile 15784->15785 15786 405d1f 15784->15786 15790 406654 15785->15790 15787 405d28 MessageBoxA 15786->15787 15788 405d3b 15786->15788 15787->15788 15788->15778 15791 405d0f GetStdHandle WriteFile 15790->15791 15791->15778 15793 403f54 15792->15793 15794 403f5e 15792->15794 15793->15794 15795 404024 12 API calls 15793->15795 15794->15732 15796 404083 15795->15796 15796->15732 15801 403f38 15797->15801 15798 404024 12 API calls 15799 404083 15798->15799 15799->15739 15800 403f42 15800->15739 15801->15739 15801->15798 15801->15800 15803 406021 15802->15803 15804 406006 15802->15804 15803->15687 15804->15803 15805 403f50 12 API calls 15804->15805 15805->15803 15807 406bfb 15806->15807 15815 406158 15807->15815 15810 406c38 15820 4064b8 15810->15820 15812 406c8e 15812->15701 15813 406c48 15813->15812 15814 4069a8 12 API calls 15813->15814 15814->15812 15816 405f54 12 API calls 15815->15816 15817 406168 15816->15817 15818 406024 12 API calls 15817->15818 15819 406182 15818->15819 15819->15810 15821 4064be 15820->15821 15823 4064f3 15820->15823 15822 405f54 12 API calls 15821->15822 15821->15823 15824 4064cf 15822->15824 15823->15813 15824->15823 15825 403f50 12 API calls 15824->15825 15825->15823 15826 43d9b0 15827 43d9f2 15826->15827 15828 43d9d0 15826->15828 15848 40a748 15827->15848 15831 43d9e2 15828->15831 15832 43db1c 15828->15832 15835 43d9ed 15828->15835 15830 43da1e 15833 40a748 CreateWindowExW 15830->15833 15834 43db3d DefWindowProcW 15831->15834 15831->15835 15841 43db15 15831->15841 15862 43dd80 UnregisterClassW 15832->15862 15836 43da4f 15833->15836 15837 406000 12 API calls 15834->15837 15835->15834 15839 4063e8 12 API calls 15836->15839 15840 43db69 15837->15840 15842 43da67 15839->15842 15852 43d87c 15841->15852 15845 43da7d SetWindowTextW 15842->15845 15846 406000 12 API calls 15845->15846 15847 43da9c 15846->15847 15864 404348 15848->15864 15850 40a75b CreateWindowExW 15851 40a795 15850->15851 15851->15830 15853 43d885 15852->15853 15853->15853 15854 43d88f SendMessageW 15853->15854 15855 43d8d1 15854->15855 15856 43d8d6 SendMessageW 15854->15856 15855->15856 15860 43d90b 15856->15860 15857 43d96b SetFocus 15858 406060 12 API calls 15857->15858 15859 43d993 15858->15859 15859->15834 15860->15857 15865 43ddc4 15860->15865 15863 43dd9f 15862->15863 15863->15835 15864->15850 15866 43ddd8 15865->15866 15867 43df3d 15865->15867 15868 43ddf3 15866->15868 15869 43de19 ShowWindow 15866->15869 15867->15857 15868->15867 15870 43de51 SetForegroundWindow SetForegroundWindow SetFocus 15868->15870 15869->15868 15871 43de6e SendMessageW 15870->15871 15871->15871 15873 43de80 15871->15873 15872 43dec7 15872->15867 15874 43decd Sleep 15872->15874 15873->15872 15875 43dea1 SendMessageW 15873->15875 15876 43deb4 SendMessageW 15873->15876 15877 43deee SetForegroundWindow SetFocus SendMessageW 15874->15877 15875->15873 15876->15873 15878 43df12 15877->15878 15878->15867 15879 43df22 SendMessageW 15878->15879 15879->15867 15879->15879 15880 407744 15881 407754 GetModuleFileNameW 15880->15881 15882 407770 15880->15882 15884 4089bc GetModuleFileNameW 15881->15884 15885 408a0a 15884->15885 15894 408898 15885->15894 15887 408a36 15888 408a50 15887->15888 15889 408a48 LoadLibraryExW 15887->15889 15890 406060 12 API calls 15888->15890 15889->15888 15891 408a6d 15890->15891 15892 406000 12 API calls 15891->15892 15893 408a75 15892->15893 15893->15882 15895 4088b9 15894->15895 15896 406000 12 API calls 15895->15896 15897 4088d6 15896->15897 15898 4063e8 12 API calls 15897->15898 15910 408941 15897->15910 15900 4088eb 15898->15900 15899 406060 12 API calls 15901 4089ae 15899->15901 15904 406bf0 12 API calls 15900->15904 15905 40891c 15900->15905 15901->15887 15904->15905 15920 4085d4 15905->15920 15906 408943 GetUserDefaultUILanguage 15940 407f84 EnterCriticalSection 15906->15940 15907 408934 15928 408700 15907->15928 15910->15899 15912 408700 14 API calls 15913 40895d 15912->15913 15914 408985 15913->15914 15915 40896b GetSystemDefaultUILanguage 15913->15915 15914->15910 15965 4087cc 15914->15965 15917 407f84 29 API calls 15915->15917 15918 408978 15917->15918 15919 408700 14 API calls 15918->15919 15919->15914 15921 4085f6 15920->15921 15924 408608 15920->15924 15983 4082b8 15921->15983 15923 408600 16009 408638 15923->16009 15926 406000 12 API calls 15924->15926 15927 40862a 15926->15927 15927->15906 15927->15907 15929 40871e 15928->15929 15930 406000 12 API calls 15929->15930 15938 40873b 15930->15938 15931 408799 15932 406000 12 API calls 15931->15932 15933 4087a0 15932->15933 15934 406060 12 API calls 15933->15934 15935 4087ba 15934->15935 15935->15910 15936 406bf0 12 API calls 15936->15938 15938->15931 15938->15933 15938->15936 16032 406a80 15938->16032 16055 408694 15938->16055 15941 407fd0 LeaveCriticalSection 15940->15941 15942 407fb0 15940->15942 15943 406000 12 API calls 15941->15943 15945 407fc1 LeaveCriticalSection 15942->15945 15944 407fe1 IsValidLocale 15943->15944 15946 407ff0 15944->15946 15947 40803f EnterCriticalSection 15944->15947 15948 408072 15945->15948 15949 408004 15946->15949 15950 407ff9 15946->15950 15954 408057 15947->15954 15952 406000 12 API calls 15948->15952 16081 407c6c 15949->16081 16062 407e68 GetThreadUILanguage 15950->16062 15956 408087 15952->15956 15958 408068 LeaveCriticalSection 15954->15958 15956->15912 15958->15948 15959 408017 15960 408028 GetSystemDefaultUILanguage 15959->15960 16093 406a28 15959->16093 15962 407c6c 15 API calls 15960->15962 15963 408035 15962->15963 15964 406a28 12 API calls 15963->15964 15964->15947 16138 4060e4 15965->16138 15968 40881c 15969 406a80 12 API calls 15968->15969 15970 408829 15969->15970 15971 408694 14 API calls 15970->15971 15974 408830 15971->15974 15972 408869 15973 406060 12 API calls 15972->15973 15975 408883 15973->15975 15974->15972 15976 406a80 12 API calls 15974->15976 15977 406000 12 API calls 15975->15977 15978 408857 15976->15978 15979 40888b 15977->15979 15980 408694 14 API calls 15978->15980 15979->15910 15981 40885e 15980->15981 15981->15972 15982 406000 12 API calls 15981->15982 15982->15972 15984 4082cf 15983->15984 15985 4082e3 GetModuleFileNameW 15984->15985 15986 4082f8 15984->15986 15985->15986 15987 408320 RegOpenKeyExW 15986->15987 15988 4084c7 15986->15988 15989 4083e1 15987->15989 15990 408347 RegOpenKeyExW 15987->15990 15993 406000 12 API calls 15988->15993 16016 4080c8 GetModuleHandleW 15989->16016 15990->15989 15991 408365 RegOpenKeyExW 15990->15991 15991->15989 15994 408383 RegOpenKeyExW 15991->15994 15996 4084dc 15993->15996 15994->15989 15997 4083a1 RegOpenKeyExW 15994->15997 15995 4083ff RegQueryValueExW 15998 408450 RegQueryValueExW 15995->15998 15999 40841d 15995->15999 15996->15923 15997->15989 16000 4083bf RegOpenKeyExW 15997->16000 16002 40846c 15998->16002 16007 40844e 15998->16007 16001 403f34 12 API calls 15999->16001 16000->15988 16000->15989 16003 408425 RegQueryValueExW 16001->16003 16004 403f34 12 API calls 16002->16004 16003->16007 16006 408474 RegQueryValueExW 16004->16006 16005 4084b6 RegCloseKey 16005->15923 16006->16007 16007->16005 16008 403f50 12 API calls 16007->16008 16008->16005 16010 408645 16009->16010 16011 40864f 16009->16011 16012 403f50 12 API calls 16010->16012 16013 408688 16011->16013 16014 403f34 12 API calls 16011->16014 16012->16011 16013->15924 16015 40866a 16014->16015 16015->15924 16017 4080f0 GetProcAddress 16016->16017 16018 408101 16016->16018 16017->16018 16022 408117 16018->16022 16026 408163 16018->16026 16028 4080a4 16018->16028 16021 4080a4 CharNextW 16021->16026 16022->15995 16023 4080a4 CharNextW 16023->16026 16024 4081e8 FindFirstFileW 16024->16022 16025 408204 FindClose lstrlenW 16024->16025 16025->16022 16025->16026 16026->16022 16026->16023 16026->16024 16027 408252 lstrlenW 16026->16027 16027->16026 16029 4080b2 16028->16029 16030 4080c0 16029->16030 16031 4080aa CharNextW 16029->16031 16030->16021 16030->16022 16031->16029 16033 406a84 16032->16033 16042 406a28 16032->16042 16034 4063a0 16033->16034 16036 406aa2 16033->16036 16037 406a94 16033->16037 16033->16042 16039 405f54 12 API calls 16034->16039 16041 4063b4 16034->16041 16035 4063e4 16035->15938 16040 406b00 16036->16040 16043 405f54 12 API calls 16036->16043 16038 4063a0 12 API calls 16037->16038 16038->16042 16039->16041 16040->16040 16041->16035 16045 403f50 12 API calls 16041->16045 16042->16034 16044 406a36 16042->16044 16046 406a77 16042->16046 16051 406abc 16043->16051 16044->16046 16047 406a51 16044->16047 16048 406a6c 16044->16048 16045->16035 16046->15938 16049 4069a8 12 API calls 16047->16049 16050 4069a8 12 API calls 16048->16050 16052 406a56 16049->16052 16050->16052 16053 4063a0 12 API calls 16051->16053 16052->15938 16054 406aee 16053->16054 16054->15938 16056 4086a9 16055->16056 16057 4086c6 FindFirstFileW 16056->16057 16058 4086d6 FindClose 16057->16058 16059 4086dc 16057->16059 16058->16059 16060 406000 12 API calls 16059->16060 16061 4086f1 16060->16061 16061->15938 16063 407e84 16062->16063 16064 407edd 16062->16064 16107 407e24 GetThreadPreferredUILanguages 16063->16107 16066 407e24 14 API calls 16064->16066 16073 407ee5 16066->16073 16068 407f26 16069 407f7c 16068->16069 16070 407f2c SetThreadPreferredUILanguages 16068->16070 16069->15947 16072 407e24 14 API calls 16070->16072 16074 407f42 16072->16074 16073->16068 16075 403f50 12 API calls 16073->16075 16076 407f5d SetThreadPreferredUILanguages 16074->16076 16077 407f6d 16074->16077 16075->16068 16076->16077 16078 403f50 12 API calls 16077->16078 16079 407f74 16078->16079 16080 403f50 12 API calls 16079->16080 16080->16069 16082 406000 12 API calls 16081->16082 16086 407ca7 16082->16086 16083 407cfd 16084 407d10 IsValidLocale 16083->16084 16085 407db3 16083->16085 16084->16085 16087 407d23 GetLocaleInfoW GetLocaleInfoW 16084->16087 16088 406060 12 API calls 16085->16088 16086->16083 16112 407b8c 16086->16112 16091 407d5e 16087->16091 16089 407dd0 GetSystemDefaultUILanguage 16088->16089 16089->15947 16089->15959 16125 406b08 16091->16125 16094 406a2c 16093->16094 16096 406a77 16093->16096 16095 4063a0 16094->16095 16097 406a36 16094->16097 16101 405f54 12 API calls 16095->16101 16104 4063b4 16095->16104 16096->15960 16097->16096 16098 406a51 16097->16098 16099 406a6c 16097->16099 16102 4069a8 12 API calls 16098->16102 16103 4069a8 12 API calls 16099->16103 16100 4063e4 16100->15960 16101->16104 16106 406a56 16102->16106 16103->16106 16104->16100 16105 403f50 12 API calls 16104->16105 16105->16100 16106->15960 16108 407e45 16107->16108 16109 407e5e SetThreadPreferredUILanguages 16107->16109 16110 403f34 12 API calls 16108->16110 16109->16064 16111 407e4e GetThreadPreferredUILanguages 16110->16111 16111->16109 16113 407bb2 16112->16113 16114 4063e8 12 API calls 16113->16114 16115 407c34 16113->16115 16116 407bde 16114->16116 16118 406060 12 API calls 16115->16118 16117 406000 12 API calls 16116->16117 16121 407be5 16117->16121 16119 407c4e 16118->16119 16119->16083 16120 406b08 12 API calls 16120->16121 16121->16115 16121->16120 16123 406bf0 12 API calls 16121->16123 16124 4063e8 12 API calls 16121->16124 16134 407b20 16121->16134 16123->16121 16124->16121 16126 406b1e 16125->16126 16127 406b69 16126->16127 16128 406b4b 16126->16128 16131 406ba3 16126->16131 16130 405f54 12 API calls 16127->16130 16129 4069a8 12 API calls 16128->16129 16132 406b59 16129->16132 16130->16132 16132->16131 16133 4063a0 12 API calls 16132->16133 16133->16131 16135 407b30 16134->16135 16136 406000 12 API calls 16135->16136 16137 407b7b 16136->16137 16137->16121 16139 4060e8 GetUserDefaultUILanguage GetLocaleInfoW 16138->16139 16139->15968 16140 4433fc 16141 443404 16140->16141 16141->16141 16148 4090fc GetModuleHandleW 16141->16148 16143 443417 16152 43f770 16143->16152 16149 409137 16148->16149 16348 405a8c 16149->16348 16153 43f778 16152->16153 16153->16153 16833 425f00 16153->16833 16157 43f7a5 16909 40bde8 16157->16909 16162 43f7ba 17447 40b654 GetModuleHandleW 16162->17447 16167 43f7cd 16168 4063a0 12 API calls 16167->16168 16169 43f7db 16168->16169 17466 437530 16169->17466 16172 43f803 17592 43f5a0 16172->17592 16173 43f7e4 GetForegroundWindow 17587 40b5e8 16173->17587 16178 43f811 16181 406a80 12 API calls 16178->16181 16182 43f823 16181->16182 16183 406a80 12 API calls 16182->16183 16184 43f835 16183->16184 16185 406a80 12 API calls 16184->16185 16186 43f847 16185->16186 16187 406a80 12 API calls 16186->16187 16188 43f859 16187->16188 16189 406a80 12 API calls 16188->16189 16190 43f86b 16189->16190 16191 406a80 12 API calls 16190->16191 16192 43f87d 16191->16192 17609 40b948 GetEnvironmentVariableW GetLongPathNameW 16192->17609 16194 43f88d 16195 406a80 12 API calls 16194->16195 16196 43f8a0 16195->16196 16197 40b7c0 GetModuleFileNameW 16196->16197 16198 43f8ab 16197->16198 16199 4063a0 12 API calls 16198->16199 16200 43f8b9 16199->16200 17611 43f440 16200->17611 16204 43f8e4 16205 43f8ea 16204->16205 16206 43f8fd 16204->16206 16207 4063a0 12 API calls 16205->16207 17650 40b918 16206->17650 16211 43f8f8 16207->16211 16209 43f8c3 16209->16204 17645 43a34c 16209->17645 16215 43e9c4 14 API calls 16211->16215 16212 43f90b 16214 43fa40 16212->16214 16216 40b918 CompareStringW 16212->16216 16217 40b918 CompareStringW 16214->16217 16218 43fca3 16215->16218 16220 43f91e 16216->16220 16221 43fa4e 16217->16221 16222 43fcb2 16218->16222 17869 43ee98 16218->17869 16220->16214 16224 40b918 CompareStringW 16220->16224 16221->16211 17810 43a2cc 16221->17810 16229 43a34c CreateMutexW 16222->16229 16226 43f934 16224->16226 16226->16214 16227 43f93c 16226->16227 17653 428590 16227->17653 16228 43fa89 16231 43fa93 16228->16231 16232 43fb4e 16228->16232 16233 43fcc5 16229->16233 16241 43a34c CreateMutexW 16231->16241 16232->16211 16240 40b918 CompareStringW 16232->16240 16236 43fcec 16233->16236 17883 437e1c 16233->17883 16235 43fa60 16235->16228 17817 43d50c ExitProcess 16235->17817 17889 437e38 16236->17889 16237 40adb8 13 API calls 16270 43f951 16237->16270 16244 43fb69 16240->16244 16246 43faa6 16241->16246 16244->16211 16249 43fb71 16244->16249 16252 43fab1 16246->16252 16253 43faaa 16246->16253 16247 43fcee 16250 43fcf2 16247->16250 16251 43fcfe 16247->16251 17837 40b4dc GetModuleHandleW 16249->17837 16259 43e060 13 API calls 16250->16259 16260 43fd10 16251->16260 16261 43fd04 16251->16261 16257 43e9c4 14 API calls 16252->16257 17818 43d50c ExitProcess 16253->17818 16254 43fce2 17886 43e060 16254->17886 16266 43fab6 16257->16266 16259->16236 16269 43e060 13 API calls 16260->16269 16268 43e060 13 API calls 16261->16268 16272 43faef 16266->16272 16280 43faba 16266->16280 16268->16236 16269->16236 16273 43f982 16270->16273 17688 43d5d4 16270->17688 17820 43edd8 16272->17820 17707 43d72c 16273->17707 16275 43fc32 17866 40b564 GetModuleHandleW 16275->17866 16303 43e810 18 API calls 16280->16303 16282 43f987 16288 43f98b 16282->16288 16289 43f99a 16282->16289 16287 40adb8 13 API calls 16295 43fba6 16287->16295 16296 43dd30 ShowWindow 16288->16296 16297 43f9b8 16289->16297 17721 43f64c 16289->17721 16290 43fbdf 16293 43e9c4 14 API calls 16290->16293 16291 43f973 17705 43dd30 ShowWindow 16291->17705 16299 43fbe4 16293->16299 17844 42847c 16295->17844 16305 43f990 16296->16305 16300 43f9be 16297->16300 16301 43f9cd 16297->16301 16310 43fc34 16299->16310 16311 43fbe8 16299->16311 17737 43f11c 16300->17737 16314 43f11c 41 API calls 16301->16314 16315 43fadb 16303->16315 16316 43dd80 UnregisterClassW 16305->16316 16307 43fbb1 16307->16290 16330 43fbbd Sleep 16307->16330 17850 43a454 16307->17850 16309 43dd80 UnregisterClassW 16318 43f97d 16309->16318 16319 43edd8 15 API calls 16310->16319 17854 43ebac 16311->17854 16340 43f9d8 16314->16340 16315->16211 17819 43d50c ExitProcess 16315->17819 16316->16318 16325 43fc47 16319->16325 17858 43ec2c 16325->17858 16330->16307 16335 43faea 16335->16211 16344 43fbfb 16344->16275 16349 405ac4 16348->16349 16352 405a20 16349->16352 16353 405a68 16352->16353 16354 405a30 16352->16354 16353->16143 16354->16353 16356 443318 16354->16356 16357 4433a0 16356->16357 16358 443332 16356->16358 16357->16354 16372 405b8c 16358->16372 16360 44335e 16378 408ab4 16360->16378 16361 44333c 16361->16360 16362 4063a0 12 API calls 16361->16362 16362->16360 16366 443372 16383 41d238 GetModuleHandleW 16366->16383 16369 4085d4 31 API calls 16370 443383 16369->16370 16387 41cc28 16370->16387 16373 405b98 16372->16373 16377 405bc9 16373->16377 16397 405ad4 16373->16397 16402 405b28 16373->16402 16407 405b78 16373->16407 16377->16361 16379 403f34 12 API calls 16378->16379 16380 408ac1 16379->16380 16381 41c9bc GetVersionExW 16380->16381 16382 41c9d3 16381->16382 16382->16366 16384 41d254 16383->16384 16385 41d249 16383->16385 16384->16369 16424 40a4ac 16385->16424 16388 41cc30 16387->16388 16388->16388 16431 41cb94 GetThreadLocale 16388->16431 16394 41cc71 16520 406ee4 16394->16520 16410 408e5c 16397->16410 16399 405af7 16400 406000 12 API calls 16399->16400 16401 405b1b 16400->16401 16401->16373 16403 408e5c 58 API calls 16402->16403 16404 405b4b 16403->16404 16405 406000 12 API calls 16404->16405 16406 405b6a 16405->16406 16406->16373 16408 408e5c 58 API calls 16407->16408 16409 405b87 16408->16409 16409->16373 16411 408e64 16410->16411 16412 408eb1 16411->16412 16416 40778c 16411->16416 16412->16399 16415 406158 12 API calls 16415->16412 16418 40779b 16416->16418 16419 4077b1 LoadStringW 16416->16419 16418->16419 16420 407744 16418->16420 16419->16415 16421 407754 GetModuleFileNameW 16420->16421 16422 407770 16420->16422 16423 4089bc 56 API calls 16421->16423 16422->16419 16423->16422 16425 40a4ce GetProcAddress 16424->16425 16426 40a4d9 16424->16426 16427 40a4f9 16425->16427 16430 40a4f0 GetProcAddress 16426->16430 16428 406024 12 API calls 16427->16428 16429 40a50e 16428->16429 16429->16384 16430->16427 16432 41cbbf 16431->16432 16433 41cc00 16432->16433 16524 41cb38 GetCPInfo 16432->16524 16435 41a870 16433->16435 16436 41a878 16435->16436 16436->16436 16437 41a87f IsValidLocale 16436->16437 16438 41a8a0 GetThreadLocale 16437->16438 16439 41a8a7 16437->16439 16438->16439 16526 4076d4 16439->16526 16450 4063a0 12 API calls 16451 41a8f9 16450->16451 16452 41a7f8 13 API calls 16451->16452 16453 41a90e 16452->16453 16454 41a7f8 13 API calls 16453->16454 16455 41a930 16454->16455 16582 41a844 GetLocaleInfoW 16455->16582 16458 41a844 GetLocaleInfoW 16459 41a967 16458->16459 16460 41a7f8 13 API calls 16459->16460 16461 41a983 16460->16461 16462 41a844 GetLocaleInfoW 16461->16462 16463 41a9a0 16462->16463 16584 41b394 16463->16584 16466 4063a0 12 API calls 16467 41a9c7 16466->16467 16468 41b394 14 API calls 16467->16468 16469 41a9e1 16468->16469 16470 4063a0 12 API calls 16469->16470 16471 41a9ec 16470->16471 16472 41a844 GetLocaleInfoW 16471->16472 16473 41a9fc 16472->16473 16474 41a7f8 13 API calls 16473->16474 16475 41aa15 16474->16475 16476 4063a0 12 API calls 16475->16476 16477 41aa20 16476->16477 16478 41a7f8 13 API calls 16477->16478 16479 41aa35 16478->16479 16480 4063a0 12 API calls 16479->16480 16481 41aa40 16480->16481 16482 406000 12 API calls 16481->16482 16483 41aa48 16482->16483 16484 406000 12 API calls 16483->16484 16485 41aa50 16484->16485 16486 41a7f8 13 API calls 16485->16486 16487 41aa65 16486->16487 16488 41aa73 16487->16488 16489 41aa82 16487->16489 16490 4063e8 12 API calls 16488->16490 16491 4063e8 12 API calls 16489->16491 16492 41aa80 16490->16492 16491->16492 16493 41a7f8 13 API calls 16492->16493 16494 41aaa4 16493->16494 16496 41a7f8 13 API calls 16494->16496 16507 41aae2 16494->16507 16495 406b08 12 API calls 16497 41ab0c 16495->16497 16498 41aac7 16496->16498 16499 406b08 12 API calls 16497->16499 16502 41aad5 16498->16502 16503 41aae4 16498->16503 16500 41ab27 16499->16500 16501 41a844 GetLocaleInfoW 16500->16501 16506 41ab37 16501->16506 16504 4063e8 12 API calls 16502->16504 16505 4063e8 12 API calls 16503->16505 16504->16507 16505->16507 16508 406060 12 API calls 16506->16508 16507->16495 16509 41ab5e 16508->16509 16510 407068 16509->16510 16511 407197 16510->16511 16512 40708d 16510->16512 16511->16394 16512->16511 16515 4063a0 12 API calls 16512->16515 16517 4071b0 16 API calls 16512->16517 16518 407068 16 API calls 16512->16518 16759 40643c 16512->16759 16765 406414 16512->16765 16772 407050 16512->16772 16777 40771c 16512->16777 16515->16512 16517->16512 16518->16512 16521 406f13 16520->16521 16522 406efa 16520->16522 16521->16357 16522->16521 16786 406f34 16522->16786 16525 41cb51 16524->16525 16525->16433 16607 4074d0 16526->16607 16529 41b074 16663 405080 16529->16663 16536 4076d4 16 API calls 16537 41b0db 16536->16537 16538 41a7f8 13 API calls 16537->16538 16539 41b0f3 16538->16539 16540 41b10c GetThreadLocale EnumCalendarInfoW 16539->16540 16541 41b15f 16539->16541 16546 41b129 16540->16546 16542 41b233 16541->16542 16543 4076d4 16 API calls 16541->16543 16547 4076d4 16 API calls 16542->16547 16545 41b18c 16543->16545 16544 41b147 GetThreadLocale EnumCalendarInfoW 16544->16542 16548 4063a0 12 API calls 16545->16548 16546->16544 16546->16546 16549 41b256 16547->16549 16550 41b19e 16548->16550 16553 41b293 16549->16553 16557 407068 16 API calls 16549->16557 16688 41a778 16550->16688 16552 41b1cc 16555 41b1d1 GetThreadLocale EnumCalendarInfoW 16552->16555 16554 4076d4 16 API calls 16553->16554 16556 41b2aa 16554->16556 16559 41b200 16555->16559 16692 40532c 16556->16692 16557->16549 16558 41b220 GetThreadLocale EnumCalendarInfoW 16558->16542 16559->16558 16559->16559 16562 41ad5c 16565 41ad8f 16562->16565 16563 41b328 59 API calls 16563->16565 16564 4063a0 12 API calls 16564->16565 16565->16563 16565->16564 16566 41adec 16565->16566 16567 406060 12 API calls 16566->16567 16568 41a8d4 16567->16568 16569 41ae18 16568->16569 16572 41ae42 16569->16572 16570 41b328 59 API calls 16570->16572 16571 4063a0 12 API calls 16571->16572 16572->16570 16572->16571 16573 41ae92 16572->16573 16574 406060 12 API calls 16573->16574 16575 41a8dd 16574->16575 16576 41a7f8 GetLocaleInfoW 16575->16576 16577 41a831 16576->16577 16578 41a81f 16576->16578 16580 4063a0 12 API calls 16577->16580 16579 406158 12 API calls 16578->16579 16581 41a82f 16579->16581 16580->16581 16581->16450 16583 41a860 16582->16583 16583->16458 16585 406000 12 API calls 16584->16585 16586 41b3cf 16585->16586 16587 41a7f8 13 API calls 16586->16587 16588 41b3e0 16587->16588 16589 41a7f8 13 API calls 16588->16589 16590 41b3f5 16589->16590 16591 41b40e 16590->16591 16604 41b47d 16590->16604 16592 41b465 16591->16592 16599 41b42a 16591->16599 16593 4063a0 12 API calls 16592->16593 16595 41b463 16593->16595 16594 41d830 CompareStringW 16594->16604 16596 406060 12 API calls 16595->16596 16597 41b5bb 16596->16597 16598 406000 12 API calls 16597->16598 16601 41a9bc 16598->16601 16599->16595 16603 406a28 12 API calls 16599->16603 16753 40683c 16599->16753 16601->16466 16603->16599 16604->16594 16604->16595 16605 406a28 12 API calls 16604->16605 16606 40683c 12 API calls 16604->16606 16756 41da50 16604->16756 16605->16604 16606->16604 16608 4074f3 16607->16608 16612 40750e 16607->16612 16609 4074fe 16608->16609 16626 404070 16608->16626 16629 4074c8 16609->16629 16613 40755d 16612->16613 16615 404070 12 API calls 16612->16615 16614 40756b 16613->16614 16616 404070 12 API calls 16613->16616 16617 407579 16614->16617 16618 4075b5 16614->16618 16615->16613 16616->16614 16619 403f68 12 API calls 16617->16619 16620 403f34 12 API calls 16618->16620 16623 4075ad 16619->16623 16621 4075c1 16620->16621 16621->16623 16632 4072d8 16621->16632 16622 407509 16622->16529 16623->16622 16625 4074d0 16 API calls 16623->16625 16625->16623 16627 404024 12 API calls 16626->16627 16628 404083 16627->16628 16628->16609 16635 4076e0 16629->16635 16641 4071b0 16632->16641 16634 4072e3 16634->16623 16636 4074cd 16635->16636 16638 4076e6 16635->16638 16636->16622 16637 407711 16639 403f50 12 API calls 16637->16639 16638->16636 16638->16637 16640 406f34 14 API calls 16638->16640 16639->16636 16640->16637 16642 4071c5 16641->16642 16646 4071f4 16641->16646 16643 4071ca 16642->16643 16648 407216 16642->16648 16645 4071cf 16643->16645 16652 40722d 16643->16652 16644 40643c 12 API calls 16644->16646 16650 407241 16645->16650 16651 4071d4 16645->16651 16646->16644 16659 407211 16646->16659 16647 406414 SysFreeString SysReAllocStringLen 16647->16648 16648->16647 16648->16659 16649 4063a0 12 API calls 16649->16652 16655 407050 12 API calls 16650->16655 16650->16659 16653 407255 16651->16653 16654 4071d9 16651->16654 16652->16649 16652->16659 16653->16659 16660 4071b0 16 API calls 16653->16660 16656 4071e2 16654->16656 16657 407278 16654->16657 16655->16650 16656->16646 16656->16659 16661 4072a9 16656->16661 16658 407068 16 API calls 16657->16658 16657->16659 16658->16657 16659->16634 16660->16653 16661->16659 16662 40771c 14 API calls 16661->16662 16662->16661 16664 405090 16663->16664 16665 405089 16663->16665 16667 4053b4 16664->16667 16666 404070 12 API calls 16665->16666 16666->16664 16668 4053bb 16667->16668 16671 4053d6 16668->16671 16699 4050ac 16668->16699 16670 4053c8 16670->16671 16672 403f50 12 API calls 16670->16672 16673 40514c 16671->16673 16672->16671 16681 40515a 16673->16681 16675 405183 GetTickCount 16675->16681 16676 4051f6 GetTickCount 16679 4051a8 16676->16679 16676->16681 16677 40522d GetTickCount 16725 405344 16677->16725 16678 40519b GetTickCount 16678->16679 16678->16681 16679->16536 16681->16675 16681->16676 16681->16677 16681->16678 16681->16679 16682 4051cb GetCurrentThreadId 16681->16682 16713 4053e8 GetCurrentThreadId 16681->16713 16718 404efc 16681->16718 16682->16679 16684 405257 GetTickCount 16685 40523d 16684->16685 16685->16677 16685->16684 16686 4052c1 16685->16686 16686->16679 16687 4052c7 GetCurrentThreadId 16686->16687 16687->16679 16689 41a790 16688->16689 16690 41a79e 16689->16690 16729 4185e8 16689->16729 16690->16552 16693 405080 12 API calls 16692->16693 16694 405334 16693->16694 16695 4053b4 17 API calls 16694->16695 16696 40533b 16695->16696 16744 4052e4 16696->16744 16700 4050b5 16699->16700 16702 4050ba 16699->16702 16703 404f84 GetModuleHandleW GetProcAddress 16700->16703 16702->16670 16704 404fad GetLogicalProcessorInformation 16703->16704 16710 405002 16703->16710 16705 404fbc GetLastError 16704->16705 16704->16710 16706 404fc6 16705->16706 16705->16710 16707 403f34 12 API calls 16706->16707 16708 404fce GetLogicalProcessorInformation 16707->16708 16709 404ff5 16708->16709 16709->16710 16711 403f50 12 API calls 16709->16711 16710->16702 16712 40502f 16711->16712 16712->16702 16714 4053f5 16713->16714 16715 4053fc 16713->16715 16714->16681 16716 405423 16715->16716 16717 405410 GetCurrentThreadId 16715->16717 16716->16681 16717->16716 16719 404f07 16718->16719 16720 404f55 16719->16720 16721 404f36 16719->16721 16722 404f2d Sleep 16719->16722 16720->16681 16723 404f45 Sleep 16721->16723 16724 404f4e SwitchToThread 16721->16724 16722->16720 16723->16720 16724->16720 16726 40539d 16725->16726 16727 405356 16725->16727 16726->16685 16727->16726 16728 405384 Sleep 16727->16728 16728->16727 16734 41bb6c 16729->16734 16731 4185f9 16738 405724 16731->16738 16735 41bb73 16734->16735 16736 408e5c 58 API calls 16735->16736 16737 41bb8b 16736->16737 16737->16731 16739 405732 16738->16739 16740 405728 16738->16740 16742 405770 16739->16742 16743 40400c 12 API calls 16739->16743 16741 405e88 12 API calls 16740->16741 16741->16739 16742->16742 16743->16742 16749 405094 GetCurrentThreadId 16744->16749 16746 40531b 16746->16562 16748 405344 Sleep 16748->16746 16750 4050a1 16749->16750 16751 4050a8 16749->16751 16752 404070 12 API calls 16750->16752 16751->16746 16751->16748 16752->16751 16754 406158 12 API calls 16753->16754 16755 406849 16754->16755 16755->16599 16757 406bf0 12 API calls 16756->16757 16758 41da6c 16757->16758 16758->16604 16760 406440 16759->16760 16762 406454 16759->16762 16760->16762 16781 405f94 16760->16781 16761 406482 16761->16512 16762->16761 16764 403f50 12 API calls 16762->16764 16764->16761 16766 406418 16765->16766 16767 40643b 16765->16767 16768 405fe0 16766->16768 16769 40642b SysReAllocStringLen 16766->16769 16767->16512 16770 40605c 16768->16770 16771 40604e SysFreeString 16768->16771 16769->16767 16769->16768 16770->16512 16771->16770 16773 407060 16772->16773 16774 407059 16772->16774 16775 404070 12 API calls 16773->16775 16774->16512 16776 407067 16775->16776 16776->16512 16779 407723 16777->16779 16778 40773d 16778->16512 16779->16778 16780 4076e0 14 API calls 16779->16780 16780->16778 16782 405f98 16781->16782 16783 405fd6 16781->16783 16782->16783 16784 403f34 12 API calls 16782->16784 16783->16762 16785 405fa8 16784->16785 16785->16762 16787 406f3d 16786->16787 16813 406f7a 16786->16813 16788 406f52 16787->16788 16789 406f7f 16787->16789 16790 406f56 16788->16790 16791 406fb9 16788->16791 16792 406f90 16789->16792 16793 406f86 16789->16793 16795 406f5a 16790->16795 16796 406f9c 16790->16796 16797 406fc0 16791->16797 16798 406fc7 16791->16798 16817 406090 16792->16817 16799 406024 12 API calls 16793->16799 16802 406fd0 16795->16802 16803 406f5e 16795->16803 16800 406fa3 16796->16800 16801 406fad 16796->16801 16804 406000 12 API calls 16797->16804 16805 406060 12 API calls 16798->16805 16799->16813 16821 406048 16800->16821 16824 4060c0 16801->16824 16802->16813 16828 406f1c 16802->16828 16809 406f62 16803->16809 16810 406fdf 16803->16810 16804->16813 16805->16813 16811 406ffd 16809->16811 16816 406f6a 16809->16816 16812 406f34 14 API calls 16810->16812 16810->16813 16811->16813 16814 406ee4 14 API calls 16811->16814 16812->16810 16813->16522 16814->16811 16815 4076e0 14 API calls 16815->16816 16816->16813 16816->16815 16818 406096 16817->16818 16819 4060bc 16818->16819 16820 403f50 12 API calls 16818->16820 16819->16813 16820->16818 16822 40605c 16821->16822 16823 40604e SysFreeString 16821->16823 16822->16813 16823->16822 16825 4060c6 16824->16825 16826 4060cc SysFreeString 16825->16826 16827 4060de 16825->16827 16826->16825 16827->16813 16829 406f2c 16828->16829 16832 406f25 16828->16832 16830 404070 12 API calls 16829->16830 16831 406f33 16830->16831 16831->16802 16832->16802 16834 425f08 16833->16834 16834->16834 16835 40adb8 13 API calls 16834->16835 16836 425f2b 16835->16836 16837 425f33 LoadLibraryW 16836->16837 16838 40adb8 13 API calls 16837->16838 16839 425f48 16838->16839 16840 40a4ac 14 API calls 16839->16840 16841 425f57 16840->16841 16842 40adb8 13 API calls 16841->16842 16843 425f69 16842->16843 16844 40a4ac 14 API calls 16843->16844 16845 425f78 16844->16845 16846 40adb8 13 API calls 16845->16846 16847 425f8a 16846->16847 16848 40a4ac 14 API calls 16847->16848 16849 425f99 16848->16849 16850 40adb8 13 API calls 16849->16850 16851 425fab 16850->16851 16852 40a4ac 14 API calls 16851->16852 16853 425fba 16852->16853 16854 40adb8 13 API calls 16853->16854 16855 425fcc 16854->16855 16856 40a4ac 14 API calls 16855->16856 16857 425fdb 16856->16857 16858 40adb8 13 API calls 16857->16858 16859 425fed 16858->16859 16860 40a4ac 14 API calls 16859->16860 16861 425ffc 16860->16861 16862 40adb8 13 API calls 16861->16862 16863 42600e 16862->16863 16864 40a4ac 14 API calls 16863->16864 16865 42601d 16864->16865 16866 40adb8 13 API calls 16865->16866 16867 42602f 16866->16867 16868 40a4ac 14 API calls 16867->16868 16869 42603e 16868->16869 16870 40adb8 13 API calls 16869->16870 16871 426050 16870->16871 16872 40a4ac 14 API calls 16871->16872 16873 42605f 16872->16873 16874 40adb8 13 API calls 16873->16874 16875 426071 16874->16875 16876 40a4ac 14 API calls 16875->16876 16877 426080 16876->16877 16878 40adb8 13 API calls 16877->16878 16879 426092 16878->16879 16880 40a4ac 14 API calls 16879->16880 16881 4260a1 16880->16881 16882 40adb8 13 API calls 16881->16882 16883 4260b3 16882->16883 16884 40a4ac 14 API calls 16883->16884 16885 4260c2 16884->16885 16886 40adb8 13 API calls 16885->16886 16887 4260d4 16886->16887 16888 40a4ac 14 API calls 16887->16888 16889 4260e3 16888->16889 16890 40adb8 13 API calls 16889->16890 16891 4260f5 16890->16891 16892 40a4ac 14 API calls 16891->16892 16893 426104 16892->16893 16894 40adb8 13 API calls 16893->16894 16895 426116 16894->16895 16896 40a4ac 14 API calls 16895->16896 16897 426125 16896->16897 16898 40adb8 13 API calls 16897->16898 16899 426137 16898->16899 16900 40a4ac 14 API calls 16899->16900 16901 426146 16900->16901 16902 40adb8 13 API calls 16901->16902 16903 426158 16902->16903 16904 40a4ac 14 API calls 16903->16904 16905 426167 16904->16905 16906 406060 12 API calls 16905->16906 16907 426186 16906->16907 16908 426564 WSAStartup 16907->16908 16908->16157 16910 40bdf0 16909->16910 16910->16910 16911 40adb8 13 API calls 16910->16911 16912 40be14 16911->16912 16913 40be1c LoadLibraryW 16912->16913 16914 40be2c 16913->16914 17301 40c205 16913->17301 16915 40adb8 13 API calls 16914->16915 16917 40be39 16915->16917 16916 40adb8 13 API calls 16918 40c217 16916->16918 16920 40a4ac 14 API calls 16917->16920 16919 40c21f LoadLibraryW 16918->16919 16921 40c22b 16919->16921 16933 40c24d 16919->16933 16923 40be48 16920->16923 16924 40adb8 13 API calls 16921->16924 16922 40adb8 13 API calls 16925 40c262 16922->16925 16926 40adb8 13 API calls 16923->16926 16927 40c23b 16924->16927 16928 40c26d LoadLibraryW 16925->16928 16929 40be5a 16926->16929 16932 40a4ac 14 API calls 16927->16932 16930 40cc11 16928->16930 16931 40c27d 16928->16931 16936 40a4ac 14 API calls 16929->16936 16934 40adb8 13 API calls 16930->16934 16935 40adb8 13 API calls 16931->16935 16932->16933 16933->16922 16937 40cc26 16934->16937 16938 40c28d 16935->16938 16939 40be69 16936->16939 16941 40cc31 LoadLibraryW 16937->16941 16945 40a4ac 14 API calls 16938->16945 16940 40adb8 13 API calls 16939->16940 16942 40be7b 16940->16942 16943 40cc41 16941->16943 16944 40ce37 16941->16944 16949 40a4ac 14 API calls 16942->16949 16947 40adb8 13 API calls 16943->16947 16946 40adb8 13 API calls 16944->16946 16948 40c29f 16945->16948 16950 40ce4c 16946->16950 16951 40cc51 16947->16951 16952 40adb8 13 API calls 16948->16952 16953 40be8a 16949->16953 16956 40ce57 LoadLibraryW 16950->16956 16960 40a4ac 14 API calls 16951->16960 16954 40c2b4 16952->16954 16955 40adb8 13 API calls 16953->16955 16961 40a4ac 14 API calls 16954->16961 16957 40be9c 16955->16957 16958 40ce63 16956->16958 16959 40ce85 16956->16959 16970 40a4ac 14 API calls 16957->16970 16963 40adb8 13 API calls 16958->16963 16962 40adb8 13 API calls 16959->16962 16964 40cc63 16960->16964 16965 40c2c6 16961->16965 16966 40ce9a 16962->16966 16967 40ce73 16963->16967 16968 40adb8 13 API calls 16964->16968 16969 40adb8 13 API calls 16965->16969 16973 40cea5 LoadLibraryW 16966->16973 16978 40a4ac 14 API calls 16967->16978 16971 40cc78 16968->16971 16972 40c2db 16969->16972 16974 40beab 16970->16974 16979 40a4ac 14 API calls 16971->16979 16984 40a4ac 14 API calls 16972->16984 16975 40d00f 16973->16975 16976 40ceb5 16973->16976 16977 40adb8 13 API calls 16974->16977 16982 40adb8 13 API calls 16975->16982 16980 40adb8 13 API calls 16976->16980 16981 40bebd 16977->16981 16978->16959 16983 40cc8a 16979->16983 16985 40cec5 16980->16985 16992 40a4ac 14 API calls 16981->16992 16986 40d024 16982->16986 16987 40adb8 13 API calls 16983->16987 16988 40c2ed 16984->16988 16996 40a4ac 14 API calls 16985->16996 16989 40d02f LoadLibraryW 16986->16989 16990 40cc9f 16987->16990 16991 40adb8 13 API calls 16988->16991 16993 40d0ab 16989->16993 16994 40d03b 16989->16994 17005 40a4ac 14 API calls 16990->17005 16995 40c302 16991->16995 16997 40becc 16992->16997 16999 40adb8 13 API calls 16993->16999 16998 40adb8 13 API calls 16994->16998 17008 40a4ac 14 API calls 16995->17008 17000 40ced7 16996->17000 17001 40adb8 13 API calls 16997->17001 17003 40d04b 16998->17003 17004 40d0c0 16999->17004 17006 40adb8 13 API calls 17000->17006 17002 40bede 17001->17002 17013 40a4ac 14 API calls 17002->17013 17014 40a4ac 14 API calls 17003->17014 17010 40d0cb LoadLibraryW 17004->17010 17007 40ccb1 17005->17007 17009 40ceec 17006->17009 17011 40adb8 13 API calls 17007->17011 17012 40c314 17008->17012 17020 40a4ac 14 API calls 17009->17020 17015 40d0d7 17010->17015 17016 40d147 17010->17016 17017 40ccc6 17011->17017 17018 40adb8 13 API calls 17012->17018 17021 40beed 17013->17021 17022 40d05d 17014->17022 17023 40adb8 13 API calls 17015->17023 17025 406060 12 API calls 17016->17025 17033 40a4ac 14 API calls 17017->17033 17019 40c329 17018->17019 17034 40a4ac 14 API calls 17019->17034 17024 40cefe 17020->17024 17026 40adb8 13 API calls 17021->17026 17027 40adb8 13 API calls 17022->17027 17028 40d0e7 17023->17028 17029 40adb8 13 API calls 17024->17029 17030 40d169 17025->17030 17031 40beff 17026->17031 17032 40d072 17027->17032 17040 40a4ac 14 API calls 17028->17040 17035 40cf13 17029->17035 17036 406060 12 API calls 17030->17036 17045 40a4ac 14 API calls 17031->17045 17046 40a4ac 14 API calls 17032->17046 17037 40ccd8 17033->17037 17038 40c33b 17034->17038 17049 40a4ac 14 API calls 17035->17049 17039 40d176 17036->17039 17041 40adb8 13 API calls 17037->17041 17044 40adb8 13 API calls 17038->17044 17439 43dc14 17039->17439 17042 40d0f9 17040->17042 17043 40cced 17041->17043 17047 40adb8 13 API calls 17042->17047 17057 40a4ac 14 API calls 17043->17057 17048 40c350 17044->17048 17050 40bf0e 17045->17050 17051 40d084 17046->17051 17052 40d10e 17047->17052 17061 40a4ac 14 API calls 17048->17061 17053 40cf25 17049->17053 17054 40adb8 13 API calls 17050->17054 17055 40adb8 13 API calls 17051->17055 17063 40a4ac 14 API calls 17052->17063 17058 40adb8 13 API calls 17053->17058 17059 40bf20 17054->17059 17056 40d099 17055->17056 17066 40a4ac 14 API calls 17056->17066 17060 40ccff 17057->17060 17062 40cf3a 17058->17062 17070 40a4ac 14 API calls 17059->17070 17064 40adb8 13 API calls 17060->17064 17065 40c362 17061->17065 17074 40a4ac 14 API calls 17062->17074 17067 40d120 17063->17067 17068 40cd14 17064->17068 17069 40adb8 13 API calls 17065->17069 17066->16993 17072 40adb8 13 API calls 17067->17072 17079 40a4ac 14 API calls 17068->17079 17073 40c377 17069->17073 17071 40bf2f 17070->17071 17075 40adb8 13 API calls 17071->17075 17076 40d135 17072->17076 17083 40a4ac 14 API calls 17073->17083 17077 40cf4c 17074->17077 17078 40bf41 17075->17078 17085 40a4ac 14 API calls 17076->17085 17080 40adb8 13 API calls 17077->17080 17088 40a4ac 14 API calls 17078->17088 17082 40cd26 17079->17082 17081 40cf61 17080->17081 17091 40a4ac 14 API calls 17081->17091 17086 40adb8 13 API calls 17082->17086 17084 40c389 17083->17084 17087 40adb8 13 API calls 17084->17087 17085->17016 17089 40cd3b 17086->17089 17090 40c39e 17087->17090 17092 40bf50 17088->17092 17097 40a4ac 14 API calls 17089->17097 17099 40a4ac 14 API calls 17090->17099 17093 40cf73 17091->17093 17094 40adb8 13 API calls 17092->17094 17095 40adb8 13 API calls 17093->17095 17096 40bf62 17094->17096 17100 40cf88 17095->17100 17105 40a4ac 14 API calls 17096->17105 17098 40cd4d 17097->17098 17101 40adb8 13 API calls 17098->17101 17102 40c3b0 17099->17102 17107 40a4ac 14 API calls 17100->17107 17103 40cd62 17101->17103 17104 40adb8 13 API calls 17102->17104 17111 40a4ac 14 API calls 17103->17111 17106 40c3c5 17104->17106 17108 40bf71 17105->17108 17115 40a4ac 14 API calls 17106->17115 17109 40cf9a 17107->17109 17110 40adb8 13 API calls 17108->17110 17112 40adb8 13 API calls 17109->17112 17113 40bf83 17110->17113 17114 40cd74 17111->17114 17116 40cfaf 17112->17116 17119 40a4ac 14 API calls 17113->17119 17117 40adb8 13 API calls 17114->17117 17118 40c3d7 17115->17118 17124 40a4ac 14 API calls 17116->17124 17120 40cd89 17117->17120 17121 40adb8 13 API calls 17118->17121 17122 40bf92 17119->17122 17129 40a4ac 14 API calls 17120->17129 17123 40c3ec 17121->17123 17126 40adb8 13 API calls 17122->17126 17130 40a4ac 14 API calls 17123->17130 17125 40cfc1 17124->17125 17127 40adb8 13 API calls 17125->17127 17128 40bfa4 17126->17128 17131 40cfd6 17127->17131 17136 40a4ac 14 API calls 17128->17136 17132 40cd9b 17129->17132 17133 40c3fe 17130->17133 17139 40a4ac 14 API calls 17131->17139 17134 40adb8 13 API calls 17132->17134 17135 40adb8 13 API calls 17133->17135 17137 40cdb0 17134->17137 17138 40c413 17135->17138 17140 40bfb3 17136->17140 17143 40a4ac 14 API calls 17137->17143 17147 40a4ac 14 API calls 17138->17147 17141 40cfe8 17139->17141 17142 40adb8 13 API calls 17140->17142 17144 40adb8 13 API calls 17141->17144 17145 40bfc5 17142->17145 17146 40cdc2 17143->17146 17148 40cffd 17144->17148 17153 40a4ac 14 API calls 17145->17153 17149 40adb8 13 API calls 17146->17149 17150 40c425 17147->17150 17155 40a4ac 14 API calls 17148->17155 17151 40cdd7 17149->17151 17152 40adb8 13 API calls 17150->17152 17159 40a4ac 14 API calls 17151->17159 17154 40c43a 17152->17154 17156 40bfd4 17153->17156 17161 40a4ac 14 API calls 17154->17161 17155->16975 17157 40adb8 13 API calls 17156->17157 17158 40bfe6 17157->17158 17164 40a4ac 14 API calls 17158->17164 17160 40cde9 17159->17160 17162 40adb8 13 API calls 17160->17162 17163 40c44c 17161->17163 17165 40cdfe 17162->17165 17166 40adb8 13 API calls 17163->17166 17168 40bff5 17164->17168 17171 40a4ac 14 API calls 17165->17171 17167 40c461 17166->17167 17172 40a4ac 14 API calls 17167->17172 17169 40adb8 13 API calls 17168->17169 17170 40c007 17169->17170 17178 40a4ac 14 API calls 17170->17178 17173 40ce10 17171->17173 17174 40c473 17172->17174 17175 40adb8 13 API calls 17173->17175 17177 40adb8 13 API calls 17174->17177 17176 40ce25 17175->17176 17182 40a4ac 14 API calls 17176->17182 17179 40c488 17177->17179 17180 40c016 17178->17180 17184 40a4ac 14 API calls 17179->17184 17181 40adb8 13 API calls 17180->17181 17183 40c028 17181->17183 17182->16944 17187 40a4ac 14 API calls 17183->17187 17185 40c49a 17184->17185 17186 40adb8 13 API calls 17185->17186 17189 40c4af 17186->17189 17188 40c037 17187->17188 17190 40adb8 13 API calls 17188->17190 17192 40a4ac 14 API calls 17189->17192 17191 40c049 17190->17191 17195 40a4ac 14 API calls 17191->17195 17193 40c4c1 17192->17193 17194 40adb8 13 API calls 17193->17194 17196 40c4d6 17194->17196 17197 40c058 17195->17197 17200 40a4ac 14 API calls 17196->17200 17198 40adb8 13 API calls 17197->17198 17199 40c06a 17198->17199 17203 40a4ac 14 API calls 17199->17203 17201 40c4e8 17200->17201 17202 40adb8 13 API calls 17201->17202 17204 40c4fd 17202->17204 17205 40c079 17203->17205 17208 40a4ac 14 API calls 17204->17208 17206 40adb8 13 API calls 17205->17206 17207 40c08b 17206->17207 17210 40a4ac 14 API calls 17207->17210 17209 40c50f 17208->17209 17211 40adb8 13 API calls 17209->17211 17212 40c09a 17210->17212 17213 40c524 17211->17213 17214 40adb8 13 API calls 17212->17214 17216 40a4ac 14 API calls 17213->17216 17215 40c0ac 17214->17215 17219 40a4ac 14 API calls 17215->17219 17217 40c536 17216->17217 17218 40adb8 13 API calls 17217->17218 17220 40c54b 17218->17220 17221 40c0bb 17219->17221 17224 40a4ac 14 API calls 17220->17224 17222 40adb8 13 API calls 17221->17222 17223 40c0cd 17222->17223 17227 40a4ac 14 API calls 17223->17227 17225 40c55d 17224->17225 17226 40adb8 13 API calls 17225->17226 17228 40c572 17226->17228 17229 40c0dc 17227->17229 17232 40a4ac 14 API calls 17228->17232 17230 40adb8 13 API calls 17229->17230 17231 40c0ee 17230->17231 17234 40a4ac 14 API calls 17231->17234 17233 40c584 17232->17233 17235 40adb8 13 API calls 17233->17235 17237 40c0fd 17234->17237 17236 40c599 17235->17236 17240 40a4ac 14 API calls 17236->17240 17238 40adb8 13 API calls 17237->17238 17239 40c10f 17238->17239 17243 40a4ac 14 API calls 17239->17243 17241 40c5ab 17240->17241 17242 40adb8 13 API calls 17241->17242 17244 40c5c0 17242->17244 17245 40c11e 17243->17245 17248 40a4ac 14 API calls 17244->17248 17246 40adb8 13 API calls 17245->17246 17247 40c130 17246->17247 17251 40a4ac 14 API calls 17247->17251 17249 40c5d2 17248->17249 17250 40adb8 13 API calls 17249->17250 17253 40c5e7 17250->17253 17252 40c13f 17251->17252 17254 40adb8 13 API calls 17252->17254 17256 40a4ac 14 API calls 17253->17256 17255 40c151 17254->17255 17259 40a4ac 14 API calls 17255->17259 17257 40c5f9 17256->17257 17258 40adb8 13 API calls 17257->17258 17260 40c60e 17258->17260 17261 40c160 17259->17261 17264 40a4ac 14 API calls 17260->17264 17262 40adb8 13 API calls 17261->17262 17263 40c172 17262->17263 17267 40a4ac 14 API calls 17263->17267 17265 40c620 17264->17265 17266 40adb8 13 API calls 17265->17266 17268 40c635 17266->17268 17269 40c181 17267->17269 17272 40a4ac 14 API calls 17268->17272 17270 40adb8 13 API calls 17269->17270 17271 40c193 17270->17271 17274 40a4ac 14 API calls 17271->17274 17273 40c647 17272->17273 17275 40adb8 13 API calls 17273->17275 17276 40c1a2 17274->17276 17277 40c65c 17275->17277 17278 40adb8 13 API calls 17276->17278 17280 40a4ac 14 API calls 17277->17280 17279 40c1b4 17278->17279 17283 40a4ac 14 API calls 17279->17283 17281 40c66e 17280->17281 17282 40adb8 13 API calls 17281->17282 17284 40c683 17282->17284 17285 40c1c3 17283->17285 17288 40a4ac 14 API calls 17284->17288 17286 40adb8 13 API calls 17285->17286 17287 40c1d5 17286->17287 17291 40a4ac 14 API calls 17287->17291 17289 40c695 17288->17289 17290 40adb8 13 API calls 17289->17290 17292 40c6aa 17290->17292 17293 40c1e4 17291->17293 17296 40a4ac 14 API calls 17292->17296 17294 40adb8 13 API calls 17293->17294 17295 40c1f6 17294->17295 17298 40a4ac 14 API calls 17295->17298 17297 40c6bc 17296->17297 17299 40adb8 13 API calls 17297->17299 17298->17301 17300 40c6d1 17299->17300 17302 40a4ac 14 API calls 17300->17302 17301->16916 17303 40c6e3 17302->17303 17304 40adb8 13 API calls 17303->17304 17305 40c6f8 17304->17305 17306 40a4ac 14 API calls 17305->17306 17307 40c70a 17306->17307 17308 40adb8 13 API calls 17307->17308 17309 40c71f 17308->17309 17310 40a4ac 14 API calls 17309->17310 17311 40c731 17310->17311 17312 40adb8 13 API calls 17311->17312 17313 40c746 17312->17313 17314 40a4ac 14 API calls 17313->17314 17315 40c758 17314->17315 17316 40adb8 13 API calls 17315->17316 17317 40c76d 17316->17317 17318 40a4ac 14 API calls 17317->17318 17319 40c77f 17318->17319 17320 40adb8 13 API calls 17319->17320 17935 404444 17439->17935 17441 43dc2b GetModuleHandleW RegisterClassW 17442 43dc5c KiUserCallbackDispatcher 17441->17442 17445 43dcc5 17441->17445 17443 43dc70 17442->17443 17444 40a748 CreateWindowExW 17443->17444 17444->17445 17445->16162 17446 43d50c ExitProcess 17445->17446 17446->16162 17448 40b685 LoadLibraryW 17447->17448 17450 40b691 17447->17450 17448->17450 17449 40b70d 17453 406060 12 API calls 17449->17453 17450->17449 17451 40adb8 13 API calls 17450->17451 17452 40b6a6 17451->17452 17455 40a4ac 14 API calls 17452->17455 17454 40b733 17453->17454 17464 40b7c0 GetModuleFileNameW 17454->17464 17456 40b6b5 17455->17456 17457 40adb8 13 API calls 17456->17457 17458 40b6c4 17457->17458 17459 40a4ac 14 API calls 17458->17459 17460 40b6d3 17459->17460 17460->17449 17461 40b6d9 GetCurrentProcess 17460->17461 17462 40b6e6 17461->17462 17462->17449 17463 40b6fa GetNativeSystemInfo 17462->17463 17463->17449 17465 40b7e9 17464->17465 17465->16167 17467 437538 17466->17467 17467->17467 17937 40ba5c 17467->17937 17469 437564 17470 43756a 17469->17470 17471 40adb8 13 API calls 17469->17471 17473 406060 12 API calls 17470->17473 17472 43757c 17471->17472 17475 4063e8 12 API calls 17472->17475 17474 437b2e 17473->17474 17474->16172 17474->16173 17476 437587 17475->17476 17477 40ad0c 12 API calls 17476->17477 17478 43759c 17477->17478 17479 4063a0 12 API calls 17478->17479 17480 4375a6 17479->17480 17481 40ad0c 12 API calls 17480->17481 17482 4375bb 17481->17482 17483 40ad0c 12 API calls 17482->17483 17484 4375de 17483->17484 17485 40ad0c 12 API calls 17484->17485 17486 4375fe 17485->17486 17487 4063a0 12 API calls 17486->17487 17488 437609 17487->17488 17489 40ad0c 12 API calls 17488->17489 17490 43761e 17489->17490 17491 40ad0c 12 API calls 17490->17491 17492 43763f 17491->17492 17493 4063a0 12 API calls 17492->17493 17494 43764a 17493->17494 17495 40ad0c 12 API calls 17494->17495 17496 43765f 17495->17496 17497 40ad0c 12 API calls 17496->17497 17498 437680 17497->17498 17499 4063a0 12 API calls 17498->17499 17500 43768b 17499->17500 17501 40ad0c 12 API calls 17500->17501 17502 4376a0 17501->17502 17503 40ad0c 12 API calls 17502->17503 17504 4376c1 17503->17504 17505 4063a0 12 API calls 17504->17505 17506 4376cc 17505->17506 17507 40ad0c 12 API calls 17506->17507 17508 4376e1 17507->17508 17509 40ad0c 12 API calls 17508->17509 17510 437702 17509->17510 17511 4063a0 12 API calls 17510->17511 17512 43770d 17511->17512 17513 40ad0c 12 API calls 17512->17513 17514 437722 17513->17514 17515 40ad0c 12 API calls 17514->17515 17516 437743 17515->17516 17517 4063a0 12 API calls 17516->17517 17518 43774e 17517->17518 17519 40ad0c 12 API calls 17518->17519 17520 437763 17519->17520 17521 40ad0c 12 API calls 17520->17521 17522 437784 17521->17522 17523 4063a0 12 API calls 17522->17523 17524 43778f 17523->17524 17525 40ad0c 12 API calls 17524->17525 17526 4377a4 17525->17526 17527 40ad0c 12 API calls 17526->17527 17528 4377c5 17527->17528 17529 4063a0 12 API calls 17528->17529 17530 4377d0 17529->17530 17531 40ad0c 12 API calls 17530->17531 17532 4377e5 17531->17532 17533 40ad0c 12 API calls 17532->17533 17534 437806 17533->17534 17535 4063a0 12 API calls 17534->17535 17536 437811 17535->17536 17537 40ad0c 12 API calls 17536->17537 17538 437826 17537->17538 17539 4063a0 12 API calls 17538->17539 17540 437831 17539->17540 17541 40ad0c 12 API calls 17540->17541 17542 437846 17541->17542 17543 4063a0 12 API calls 17542->17543 17544 437851 17543->17544 17545 40ad0c 12 API calls 17544->17545 17546 437866 17545->17546 17547 4063a0 12 API calls 17546->17547 17548 437871 17547->17548 17549 40ad0c 12 API calls 17548->17549 17550 437886 17549->17550 17551 4063a0 12 API calls 17550->17551 17552 437891 17551->17552 17553 40ad0c 12 API calls 17552->17553 17554 4378a6 17553->17554 17555 4063a0 12 API calls 17554->17555 17556 4378b1 17555->17556 17588 40b602 MessageBoxW 17587->17588 17589 40b5f3 MessageBoxW 17587->17589 17590 40b60b 17588->17590 17589->17590 17591 43d50c ExitProcess 17590->17591 17591->16172 17594 43f5bc 17592->17594 17593 404294 14 API calls 17593->17594 17594->17593 17597 43f5e5 17594->17597 17599 43f5fb 17594->17599 17595 406060 12 API calls 17596 43f61c 17595->17596 17596->16178 17600 43acb0 17596->17600 17957 404294 17597->17957 17599->17595 17601 43acd1 17600->17601 17970 43a9d0 17600->17970 17982 43a870 17601->17982 17604 43ace2 17607 406000 12 API calls 17604->17607 17608 43acf7 17607->17608 17608->16178 17610 40b986 17609->17610 17610->16194 17612 43f449 17611->17612 17612->17612 18077 43e940 17612->18077 17616 43f56e 17618 406000 12 API calls 17616->17618 17617 43f486 18085 42a774 OpenFileMappingW 17617->18085 17619 43f592 17618->17619 17640 43e9c4 17619->17640 17620 43f551 17621 43f11c 41 API calls 17620->17621 17624 43f560 17621->17624 17623 43f49e 17623->17616 17623->17620 17625 40b4dc 15 API calls 17623->17625 17626 43f570 17624->17626 17627 43f564 17624->17627 17629 43f4f3 17625->17629 17628 43aec8 19 API calls 17626->17628 17630 43aec8 19 API calls 17627->17630 17628->17616 18087 42743c 17629->18087 17630->17616 17634 43f513 17635 40b564 15 API calls 17634->17635 17636 43f543 17635->17636 17637 43aec8 19 API calls 17636->17637 17638 43f54a 17637->17638 18104 43d50c ExitProcess 17638->18104 17641 404294 14 API calls 17640->17641 17642 43e9e5 17641->17642 17643 406000 12 API calls 17642->17643 17644 43ea0a 17643->17644 17644->16209 17646 43a364 17645->17646 17647 43a380 17646->17647 18111 40b288 CreateMutexW 17646->18111 17647->16204 17649 43d50c ExitProcess 17647->17649 17649->16204 17651 40b927 17650->17651 17652 40b931 CompareStringW 17651->17652 17652->16212 17654 40adb8 13 API calls 17653->17654 17655 4285ba 17654->17655 17656 4285c2 LoadLibraryW 17655->17656 17657 4285d2 17656->17657 17687 428651 17656->17687 17659 40adb8 13 API calls 17657->17659 17658 40adb8 13 API calls 17661 428663 17658->17661 17660 4285df 17659->17660 17663 40a4ac 14 API calls 17660->17663 17662 42866b LoadLibraryW 17661->17662 17664 428677 17662->17664 17665 4286b4 17662->17665 17666 4285ee 17663->17666 17668 40adb8 13 API calls 17664->17668 17667 406060 12 API calls 17665->17667 17669 40adb8 13 API calls 17666->17669 17670 4286d3 17667->17670 17671 428684 17668->17671 17672 428600 17669->17672 17670->16237 17673 40a4ac 14 API calls 17671->17673 17675 40a4ac 14 API calls 17672->17675 17674 428693 17673->17674 17676 40adb8 13 API calls 17674->17676 17677 42860f 17675->17677 17678 4286a5 17676->17678 17679 40adb8 13 API calls 17677->17679 17681 40a4ac 14 API calls 17678->17681 17680 428621 17679->17680 17682 40a4ac 14 API calls 17680->17682 17681->17665 17683 428630 17682->17683 17684 40adb8 13 API calls 17683->17684 17685 428642 17684->17685 17686 40a4ac 14 API calls 17685->17686 17686->17687 17687->17658 17689 40adb8 13 API calls 17688->17689 17690 43d5fb 17688->17690 17689->17690 17691 42847c 13 API calls 17690->17691 17692 43d615 17691->17692 17693 40adb8 13 API calls 17692->17693 17704 43d683 17692->17704 17696 43d62b 17693->17696 17694 406060 12 API calls 17695 43d69f 17694->17695 17695->16273 17695->16291 17697 42847c 13 API calls 17696->17697 17698 43d645 17697->17698 17699 40adb8 13 API calls 17698->17699 17698->17704 17700 43d65b 17699->17700 17701 42847c 13 API calls 17700->17701 17702 43d675 17701->17702 17702->17704 17704->17694 17706 43dd46 17705->17706 17706->16309 18112 43d53c GetDiskFreeSpaceW 17707->18112 17709 43d738 17710 425f00 16 API calls 17709->17710 17719 43d78c 17709->17719 17711 43d751 17710->17711 18113 426564 WSAStartup 17711->18113 17713 43d756 18114 4265f0 17713->18114 17719->16282 17722 425f00 16 API calls 17721->17722 17723 43f65d 17722->17723 18135 426564 WSAStartup 17723->18135 17738 43f15a 17737->17738 17739 43a34c CreateMutexW 17738->17739 17813 43a2eb 17810->17813 17811 404294 14 API calls 17811->17813 17812 43a314 17814 406060 12 API calls 17812->17814 17813->17811 17813->17812 17815 40b918 CompareStringW 17813->17815 17816 43a338 17814->17816 17815->17813 17816->16235 17817->16228 17818->16252 17819->16335 17821 404294 14 API calls 17820->17821 17822 43ee02 17821->17822 17823 404294 14 API calls 17822->17823 17828 43ee34 17822->17828 17825 43ee22 17823->17825 17824 406060 12 API calls 17826 43ee68 17824->17826 17827 42a774 OpenFileMappingW 17825->17827 17829 43ea38 17826->17829 17827->17828 17828->17824 17830 43e9b0 14 API calls 17829->17830 17831 43ea7b 17830->17831 17832 406b08 12 API calls 17831->17832 17833 43eb20 17832->17833 17834 406060 12 API calls 17833->17834 17835 43eb3a 17834->17835 17838 40a4ac 14 API calls 17837->17838 17839 40b4f7 17838->17839 17840 43d258 17839->17840 17843 43d293 17840->17843 17841 406000 12 API calls 17842 43d3b5 17841->17842 17842->16275 17842->16287 17842->16307 17843->17841 17845 4284b3 17844->17845 17847 4284dc 17845->17847 17849 40b918 CompareStringW 17845->17849 17846 406000 12 API calls 17848 428509 17846->17848 17847->17846 17848->16307 17849->17845 17851 43a47c 17850->17851 17852 4042f4 2 API calls 17851->17852 17853 43a50c 17851->17853 17852->17853 17853->16307 17855 406b08 12 API calls 17854->17855 17856 43ebe3 17855->17856 17856->16344 17859 43e9b0 14 API calls 17858->17859 17867 40a4ac 14 API calls 17866->17867 17868 40b57f 17867->17868 17868->16211 17870 43eea1 17869->17870 17870->17870 17871 404294 14 API calls 17870->17871 17873 43eef2 17871->17873 17872 43ef75 17874 406060 12 API calls 17872->17874 17873->17872 17875 43edd8 15 API calls 17873->17875 17876 43efa7 17874->17876 17877 43ef1b 17875->17877 17876->16222 17878 404294 14 API calls 17877->17878 17879 43ef2b 17878->17879 17880 404294 14 API calls 17879->17880 17881 43ef50 17880->17881 17882 404294 14 API calls 17881->17882 17882->17872 18327 405edc 17883->18327 17887 405edc 13 API calls 17886->17887 17888 43e078 17887->17888 17888->16236 17890 437e63 17889->17890 17891 427bf0 12 API calls 17890->17891 17892 437e74 17891->17892 17893 437e88 17892->17893 18339 4289d0 17892->18339 17895 42743c 16 API calls 17893->17895 17896 437e8d 17895->17896 18357 42d724 17896->18357 17899 428590 17 API calls 17900 437e97 17899->17900 17901 425f00 16 API calls 17900->17901 17902 437e9c 17901->17902 18405 43bc54 17902->18405 17936 40444b 17935->17936 17936->17441 17936->17936 17938 40ba6e GetModuleHandleW 17937->17938 17939 406000 12 API calls 17937->17939 17955 406824 17938->17955 17939->17938 17941 40ba80 FindResourceW 17942 40ba91 LoadResource 17941->17942 17943 40badf 17941->17943 17944 40bac0 17942->17944 17945 40bab0 LockResource 17942->17945 17943->17469 17946 40bacd FreeResource 17944->17946 17945->17944 17946->17469 17956 40682a 17955->17956 17956->17941 17958 406000 12 API calls 17957->17958 17959 4042a8 17958->17959 17960 4042ca GetCommandLineW 17959->17960 17961 4042ac GetModuleFileNameW 17959->17961 17963 4042d1 17960->17963 17962 406158 12 API calls 17961->17962 17964 4042c8 17962->17964 17963->17964 17966 4041d8 17963->17966 17964->17599 17968 4041e0 17966->17968 17967 4069a8 12 API calls 17969 404247 17967->17969 17968->17967 17969->17963 18033 40b8ec 17970->18033 17973 43a9fb 17975 406bf0 12 API calls 17973->17975 17974 43aa1f 17976 406a80 12 API calls 17974->17976 17977 43aa0e 17975->17977 17978 43aa1d 17976->17978 17979 406a80 12 API calls 17977->17979 17980 406000 12 API calls 17978->17980 17979->17978 17981 43aa42 17980->17981 17981->17601 17983 43a896 17982->17983 17984 43a7b4 13 API calls 17983->17984 17985 43a89e 17984->17985 17986 40adb8 13 API calls 17985->17986 18005 43a96a 17985->18005 17988 43a8b1 17986->17988 17987 406060 12 API calls 17989 43a98a 17987->17989 17991 4063e8 12 API calls 17988->17991 17990 406060 12 API calls 17989->17990 17992 43a997 17990->17992 17993 43a8bc 17991->17993 17992->17604 18006 43aac0 17992->18006 17994 40ad0c 12 API calls 17993->17994 17995 43a8d3 17994->17995 17997 40ad0c 12 API calls 17995->17997 18000 43a912 17995->18000 17995->18005 17996 40ad0c 12 API calls 18001 43a931 17996->18001 17998 43a905 17997->17998 17999 4063a0 12 API calls 17998->17999 17999->18000 18000->17996 18000->18005 18002 40ad0c 12 API calls 18001->18002 18001->18005 18003 43a95d 18002->18003 18004 4063a0 12 API calls 18003->18004 18004->18005 18005->17987 18007 406000 12 API calls 18006->18007 18008 43aaeb 18007->18008 18037 43a6a0 18008->18037 18011 43ab1a 18013 43a6a0 14 API calls 18011->18013 18012 406b08 12 API calls 18012->18011 18014 43ab2b 18013->18014 18015 43ab54 18014->18015 18016 406b08 12 API calls 18014->18016 18018 40adb8 13 API calls 18015->18018 18032 43ac27 18015->18032 18016->18015 18017 406000 12 API calls 18019 43ac56 18017->18019 18020 43ab69 18018->18020 18021 406060 12 API calls 18019->18021 18022 4063e8 12 API calls 18020->18022 18023 43ac63 18021->18023 18024 43ab74 18022->18024 18023->17604 18025 43a9d0 13 API calls 18024->18025 18026 43ab82 18025->18026 18058 43d158 18026->18058 18028 43ab93 18029 43abef lstrlenW 18028->18029 18028->18032 18030 43ac02 18029->18030 18031 43ac11 lstrlenW 18030->18031 18030->18032 18031->18032 18032->18017 18034 406824 18033->18034 18035 40b8f9 lstrlenW 18034->18035 18036 40b904 18035->18036 18036->17973 18036->17974 18038 43a6cf 18037->18038 18039 43a6e3 18038->18039 18040 43a6d8 18038->18040 18041 4063e8 12 API calls 18039->18041 18042 4063a0 12 API calls 18040->18042 18043 43a6ed 18041->18043 18054 43a6e1 18042->18054 18044 406000 12 API calls 18043->18044 18046 43a6f4 18044->18046 18045 406000 12 API calls 18047 43a762 18045->18047 18068 4042f4 QueryPerformanceCounter 18046->18068 18049 406060 12 API calls 18047->18049 18050 43a76f 18049->18050 18050->18011 18050->18012 18051 40ad0c 12 API calls 18056 43a6f9 18051->18056 18052 43a716 18053 406a28 12 API calls 18052->18053 18053->18054 18054->18045 18056->18051 18056->18052 18057 406b08 12 API calls 18056->18057 18071 40b86c 18056->18071 18057->18056 18059 43d182 lstrlenW 18058->18059 18075 40687c 18058->18075 18061 43d21d 18059->18061 18067 43d191 18059->18067 18062 406000 12 API calls 18061->18062 18063 43d236 18062->18063 18064 406060 12 API calls 18063->18064 18065 43d243 18064->18065 18065->18028 18066 406bf0 12 API calls 18066->18067 18067->18061 18067->18066 18069 404301 18068->18069 18070 40430c GetTickCount 18068->18070 18069->18056 18070->18056 18072 40b871 18071->18072 18073 406158 12 API calls 18072->18073 18074 40b88f 18073->18074 18074->18056 18076 406882 18075->18076 18078 404294 14 API calls 18077->18078 18079 43e961 18078->18079 18080 406000 12 API calls 18079->18080 18081 43e986 18080->18081 18081->17623 18082 43e9b0 18081->18082 18083 404294 14 API calls 18082->18083 18084 43e9bf 18083->18084 18084->17617 18086 42a793 18085->18086 18086->17623 18088 40adb8 13 API calls 18087->18088 18089 427460 18088->18089 18090 427468 LoadLibraryW 18089->18090 18091 427474 18090->18091 18092 427490 18090->18092 18094 40adb8 13 API calls 18091->18094 18093 406060 12 API calls 18092->18093 18095 4274af 18093->18095 18096 427481 18094->18096 18098 43d3d8 18095->18098 18097 40a4ac 14 API calls 18096->18097 18097->18092 18099 43d410 18098->18099 18103 43d4c8 18099->18103 18105 427250 18099->18105 18100 406000 12 API calls 18101 43d4e6 18100->18101 18101->17634 18103->18100 18104->17620 18106 427280 18105->18106 18107 406a28 12 API calls 18106->18107 18108 42728d 18107->18108 18109 406000 12 API calls 18108->18109 18110 4272c9 18109->18110 18110->18103 18111->17647 18112->17709 18113->17713 18132 4265cc 18114->18132 18133 4265e4 18132->18133 18134 4265d5 socket 18132->18134 18134->18133 18328 405f07 18327->18328 18330 405ef9 CreateThread 18327->18330 18329 403f34 12 API calls 18328->18329 18329->18330 18332 405f41 18330->18332 18333 405f48 18330->18333 18335 405ea4 18330->18335 18334 403f50 12 API calls 18332->18334 18333->16247 18333->16254 18334->18333 18336 405eac 18335->18336 18337 403f50 12 API calls 18336->18337 18338 405eca 18337->18338 18340 428a02 InitializeCriticalSection 18339->18340 18341 428b81 18339->18341 18342 42890c 13 API calls 18340->18342 18343 406060 12 API calls 18341->18343 18345 428a15 18342->18345 18344 428bb0 18343->18344 18344->17893 18346 428aa0 18345->18346 18586 428864 18345->18586 18347 42890c 13 API calls 18346->18347 18353 428ae5 18347->18353 18349 428a37 18349->18346 18350 428864 13 API calls 18349->18350 18355 428a67 18350->18355 18351 428b66 18352 405edc 13 API calls 18351->18352 18352->18341 18353->18351 18599 40b644 VirtualFree 18353->18599 18355->18346 18598 40b634 VirtualAlloc 18355->18598 18358 42d72c 18357->18358 18358->18358 18359 40adb8 13 API calls 18358->18359 18360 42d751 18359->18360 18361 42d759 LoadLibraryW 18360->18361 18362 42d769 18361->18362 18404 42d8ae 18361->18404 18363 40adb8 13 API calls 18362->18363 18365 42d776 18363->18365 18364 406060 12 API calls 18366 42d8cd 18364->18366 18367 40a4ac 14 API calls 18365->18367 18366->17899 18368 42d785 18367->18368 18369 40adb8 13 API calls 18368->18369 18370 42d797 18369->18370 18371 40a4ac 14 API calls 18370->18371 18372 42d7a6 18371->18372 18373 40adb8 13 API calls 18372->18373 18374 42d7b8 18373->18374 18375 40a4ac 14 API calls 18374->18375 18376 42d7c7 18375->18376 18377 40adb8 13 API calls 18376->18377 18404->18364 18406 43bc7a 18405->18406 18407 43bcb9 18406->18407 18409 40adb8 13 API calls 18406->18409 18408 406060 12 API calls 18407->18408 18410 437ea1 18408->18410 18411 43bc95 18409->18411 18413 431870 18410->18413 18412 40adb8 13 API calls 18411->18412 18412->18407 18414 431878 18413->18414 18414->18414 18587 40b8ec lstrlenW 18586->18587 18588 42888d 18587->18588 18589 428893 18588->18589 18590 4288bd 18588->18590 18591 406bf0 12 API calls 18589->18591 18592 406a80 12 API calls 18590->18592 18593 4288ac 18591->18593 18594 4288bb 18592->18594 18595 406a80 12 API calls 18593->18595 18596 406000 12 API calls 18594->18596 18595->18594 18597 4288e7 18596->18597 18597->18349 18598->18346 18599->18351

                          Control-flow Graph

                          APIs
                          • GetUserDefaultUILanguage.KERNEL32(00000003,?,00000004,00000000,0040888C,?,?), ref: 004087FE
                          • GetLocaleInfoW.KERNEL32(?,00000003,?,00000004,00000000,0040888C,?,?), ref: 00408807
                            • Part of subcall function 00408694: FindFirstFileW.KERNEL32(00000000,?,00000000,004086F2,?,00000001), ref: 004086C7
                            • Part of subcall function 00408694: FindClose.KERNEL32(00000000,00000000,?,00000000,004086F2,?,00000001), ref: 004086D7
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Find$CloseDefaultFileFirstInfoLanguageLocaleUser
                          • String ID:
                          • API String ID: 3216391948-0
                          • Opcode ID: 71a8562c1639e1ddf01ead51905ade836cb6af30f3703f921b60b101e48ef570
                          • Instruction ID: 27674f643491317e8211ebe2d51140b4d1dfb9d7c3ccf30eb47042a46c7f6e4d
                          • Opcode Fuzzy Hash: 71a8562c1639e1ddf01ead51905ade836cb6af30f3703f921b60b101e48ef570
                          • Instruction Fuzzy Hash: 67116070A001099FDB04FBA6D982AAEB3B8EF44304F51847FF945B32C1DB785E148A69

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1322 408694-4086d4 call 4060e4 call 406824 FindFirstFileW 1327 4086d6-4086d7 FindClose 1322->1327 1328 4086dc-4086f1 call 406000 1322->1328 1327->1328
                          APIs
                          • FindFirstFileW.KERNEL32(00000000,?,00000000,004086F2,?,00000001), ref: 004086C7
                          • FindClose.KERNEL32(00000000,00000000,?,00000000,004086F2,?,00000001), ref: 004086D7
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID:
                          • API String ID: 2295610775-0
                          • Opcode ID: d5e053f3a7f238d708fda4e07e630be6dcb5cbe159ac088ae637e70b0fe2281d
                          • Instruction ID: 4a504121526f8a262ed7674ff1de7294a9ef20f3b8a82b9cde2a0df277819a23
                          • Opcode Fuzzy Hash: d5e053f3a7f238d708fda4e07e630be6dcb5cbe159ac088ae637e70b0fe2281d
                          • Instruction Fuzzy Hash: 39F0E271500308AFC710FBB5CE1298EB7ECEB48314BA248BBB404F26C2EA3D9E10951C

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 40bde8-40bdeb 1 40bdf0-40bdf5 0->1 1->1 2 40bdf7-40be26 call 40adb8 call 406824 LoadLibraryW 1->2 7 40c20a-40c229 call 40adb8 call 406824 LoadLibraryW 2->7 8 40be2c-40c205 call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac 2->8 18 40c252-40c277 call 40adb8 call 406824 LoadLibraryW 7->18 19 40c22b-40c24d call 40adb8 call 406824 call 40a4ac 7->19 8->7 32 40cc16-40cc3b call 40adb8 call 406824 LoadLibraryW 18->32 33 40c27d-40cc11 call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac 18->33 19->18 49 40cc41-40ce37 call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac 32->49 50 40ce3c-40ce61 call 40adb8 call 406824 LoadLibraryW 32->50 33->32 49->50 71 40ce63-40ce85 call 40adb8 call 406824 call 40a4ac 50->71 72 40ce8a-40ceaf call 40adb8 call 406824 LoadLibraryW 50->72 71->72 96 40d014-40d039 call 40adb8 call 406824 LoadLibraryW 72->96 97 40ceb5-40d00f call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac 72->97 121 40d0b0-40d0d5 call 40adb8 call 406824 LoadLibraryW 96->121 122 40d03b-40d0ab call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac 96->122 97->96 154 40d0d7-40d147 call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac 121->154 155 40d14c-40d176 call 406060 * 2 121->155 122->121 154->155
                          APIs
                          • LoadLibraryW.KERNEL32(00000000,00000000,00000000,0040D177,?,00486680,00000040,00000000,00000000,?,0043F7AA,00000000,0043FD8B,?,?,00486664), ref: 0040C220
                          • LoadLibraryW.KERNEL32(00000000,00000000,00000000,00000000,0040D177,?,00486680,00000040,00000000,00000000,?,0043F7AA,00000000,0043FD8B), ref: 0040C26E
                          • LoadLibraryW.KERNEL32(00000000,00000000,00000000,00000000,00000000,0040D177,?,00486680,00000040,00000000,00000000,?,0043F7AA,00000000,0043FD8B), ref: 0040CC32
                          • LoadLibraryW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,0040D177,?,00486680,00000040,00000000,00000000,?,0043F7AA,00000000,0043FD8B), ref: 0040CE58
                          • LoadLibraryW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,0040D177,?,00486680,00000040,00000000,00000000,?,0043F7AA,00000000), ref: 0040CEA6
                          • LoadLibraryW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,0040D177,?,00486680,00000040,00000000,00000000,?,0043F7AA), ref: 0040D030
                          • LoadLibraryW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,0040D177,?,00486680,00000040,00000000,00000000), ref: 0040D0CC
                          • LoadLibraryW.KERNEL32(00000000,00000000,0040D177,?,00486680,00000040,00000000,00000000,?,0043F7AA,00000000,0043FD8B,?,?,00486664,00000000), ref: 0040BE1D
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,?), ref: 0040A4D0
                            • Part of subcall function 0040ADB8: lstrlenW.KERNEL32(00000000,?,?,00486734,00486680,00425F2B,00000000,00426187,?,00486680,00000000,00000000,?,0043F7A0,00000000,0043FD8B), ref: 0040ADD7
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,00000000), ref: 0040A4F2
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: LibraryLoad$AddressProc$lstrlen
                          • String ID: @g}l{gl}Fylg\{e^$@g}l{gl}Fylg^$@g}l{gl}JefzlAhgmel$@g}l{gl}Nl}Jffb`l^$@g}l{gl}Nl}Jfgglj}lmZ}h}l$@g}l{gl}Zl}Fy}`fg^$@g}l{gl}Zl}Jffb`l^$@g}l{gl}[lhmO`el$@yAeyHy`'MEE$A}}yX|l{p@gof^$Dhy_`l~FoO`el$Dhy_`{}|heBlp^$Efhm[lzf|{jl$Efjb[lzf|{jl$Fylg@gy|}Mlzb}fy$FylgD|}lq^$FylgJe`ykfh{m$FylgY{fjlzz$FylgY{fjlzz]fblg$JefzlAhgmel$JefzlJe`ykfh{m$JefzlMlzb}fy$Jefzl^`gmf~$JfypO`el^$J{lh}lD|}lq^$J{lh}lM`{lj}f{p^$J{lh}lO`elDhyy`gn^$J{lh}lO`el^$J{lh}lY`yl$J{lh}lY{fjlzz^$J{lh}l]a{lhm$Kefjb@gy|}$Lg|d^`gmf~z$Lq`}Y{fjlzz$Lq`}^`gmf~zLq$M`zyh}jaDlzzhnl^$Mlel}lO`el^$NefkheDldf{pZ}h}|z$Nl}BlpZ}h}l$Nl}Dfm|elO`elGhdl^$Nl}Dlzzhnl^$Nl}EfgnYh}aGhdl^$Nl}Hmhy}l{z@gof$Nl}HzpgjBlpZ}h}l$Nl}Je`ykfh{mMh}h$Nl}JehzzGhdl^$Nl}Jfdy|}l{Ghdl^$Nl}J|{{lg}Y{fjlzz$Nl}J|{{lg}Y{fjlzz@m$Nl}M`zbO{llZyhjlLq^$Nl}Mlzb}fy^`gmf~$Nl}O`elZ`sl$Nl}Y{fjlzz]`dlz$Nl}Zpz}ldDl}{`jz$Nl}Zpz}ld]`dlHzO`el]`dl$Nl}\zl{Ghdl^$Nl}]`jbJf|g}$Nl}]a{lhmJfg}lq}$Nl}^`gmf~]a{lhmY{fjlzz@m$Nl}_fe|dl@gof{dh}`fg^$Nl}_l{z`fgLq^$O`el]`dl]fEfjheO`el]`dl$O`el]`dl]fZpz}ld]`dl$O`gmGlq}O`el^$O`gmJefzl$O`gmO`{z}O`el^$O`gm[lzf|{jl^$O`gm^`gmf~Lq^$O`gm^`gmf~^$Oehza^`gmf~$O{ll[lzf|{jl$Yh}a@zM`{lj}f{p^$Yh}aO`elLq`z}z^$YllbGhdlmY`yl$ZANl}Yh}aO{fd@ME`z}^$ZANl}Zylj`heOfeml{Efjh}`fg$ZaleeLqlj|}l^$Zl}J|{zf{Yfz$Zl}L{{f{Dfml$Zl}O`elH}}{`k|}lz^$Zl}O`elYf`g}l{$Zl}Zpz}ldJ|{zf{$Zl}]a{lhmJfg}lq}$Zl}]a{lhmMlzb}fy$Zpz}ldYh{hdl}l{z@gof^$Z}{JdyG@^$[lelhzlD|}lq$[lelhzlMJ$[lhmO`el$[lhmY{fjlzzDldf{p$[lnFylgBlp^$[lnJefzlBlp$[lnJ{lh}lBlp^$[lnLg|dBlp^$[lnLg|d_he|l^$[lnMlel}lBlp^$[lnMlel}l_he|l^$[lnX|l{p_he|lLq^$[lnZl}_he|lLq^$[lz|dl]a{lhm$\[EDFG'MEE$\[EMf~gefhm]fO`el^$\gdhy_`l~FoO`el$]l{d`gh}lY{fjlzz$]l{d`gh}l]a{lhm$]{hgzeh}lDlzzhnl$^`gLqlj$^h`}Of{Z`gnelFkclj}$^{`}lO`el$^{`}lY{fjlzzDldf{p$_`{}|heHeefjLq$bl{gle:;'MEE$ez}{jyp^$zae~hy`'MEE$zalee:;'MEE$|zl{:;'MEE$~`g`gl}'MEE
                          • API String ID: 2738378989-3024355689
                          • Opcode ID: 425d9794fa0212803315e0c732f6b49e0cda1e53e6c546beca72f7af03797b15
                          • Instruction ID: 4438aff9bfd592f4c2ae5199af2438c9166828cfa366d28cfe1c4cb90c63c00d
                          • Opcode Fuzzy Hash: 425d9794fa0212803315e0c732f6b49e0cda1e53e6c546beca72f7af03797b15
                          • Instruction Fuzzy Hash: 19A2AFB49113049BC740BBB6CCC29DD76ADEF45318F40857BB405BB282DA7C9D648BAE

                          Control-flow Graph

                          APIs
                          • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,004084DD,?,?), ref: 004082F1
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,004084DD,?,?), ref: 0040833A
                          • RegOpenKeyExW.ADVAPI32(80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,004084DD,?,?), ref: 0040835C
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000), ref: 0040837A
                          • RegOpenKeyExW.ADVAPI32(80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001), ref: 00408398
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002), ref: 004083B6
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001), ref: 004083D4
                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,004084C0,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,004084DD), ref: 00408414
                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,?,00000000,00000000,00000000,?,00000000,004084C0,?,80000001), ref: 0040843F
                          • RegCloseKey.ADVAPI32(?,004084C7,00000000,00000000,?,?,?,00000000,00000000,00000000,?,00000000,004084C0,?,80000001,Software\Embarcadero\Locales), ref: 004084BA
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Open$QueryValue$CloseFileModuleName
                          • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales$Software\CodeGear\Locales$Software\Embarcadero\Locales
                          • API String ID: 2701450724-3496071916
                          • Opcode ID: 014a0b9b99b7be46c737f40711a5b5c9164359921bb32e17d70cbc9f2a686574
                          • Instruction ID: f754047bae0af19bad0102a25d5850afbc03eb5733155dacdeeb846caf687fb8
                          • Opcode Fuzzy Hash: 014a0b9b99b7be46c737f40711a5b5c9164359921bb32e17d70cbc9f2a686574
                          • Instruction Fuzzy Hash: A5513975B402097FEB20DAA5CD46FAE73BCEB08704F50447BBA44F65C1EAB89A40865D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 831 43f770-43f773 832 43f778-43f77d 831->832 832->832 833 43f77f-43f7b1 call 425f00 call 426564 call 40bde8 call 43dc14 832->833 842 43f7b3-43f7b5 call 43d50c 833->842 843 43f7ba-43f7db call 40b654 call 40b7c0 call 4063a0 call 437530 833->843 842->843 852 43f7e0-43f7e2 843->852 853 43f803-43f80a call 43f5a0 852->853 854 43f7e4-43f7fe GetForegroundWindow call 40b5e8 call 43d50c 852->854 859 43f811-43f8c5 call 406a80 * 6 call 40b948 call 406a80 call 40b7c0 call 4063a0 call 43f440 call 43e9c4 853->859 860 43f80c call 43acb0 853->860 854->853 887 43f8c7-43f8db call 406824 call 43a34c 859->887 888 43f8e4-43f8e8 859->888 860->859 887->888 903 43f8dd-43f8df call 43d50c 887->903 889 43f8ea-43f8f8 call 4063a0 888->889 890 43f8fd-43f90d call 40b918 888->890 899 43fc9e-43fca5 call 43e9c4 889->899 900 43f913-43f920 call 40b918 890->900 901 43fa40-43fa50 call 40b918 890->901 910 43fcb2-43fcc9 call 406824 call 43a34c 899->910 911 43fca7-43fcad call 43ee98 899->911 900->901 912 43f926-43f936 call 40b918 900->912 901->899 913 43fa56-43fa61 call 43a2cc 901->913 903->888 933 43fd17 call 437e38 910->933 934 43fccb-43fcda call 437e1c 910->934 911->910 912->901 921 43f93c-43f968 call 428590 call 40adb8 call 406824 912->921 922 43fa63-43fa84 call 406824 call 43d50c 913->922 923 43fa89-43fa8d 913->923 983 43f982-43f989 call 43d72c 921->983 984 43f96a-43f971 call 43d5d4 921->984 922->923 927 43fa93-43faa8 call 406824 call 43a34c 923->927 928 43fb4e-43fb55 923->928 957 43fab1-43fab8 call 43e9c4 927->957 958 43faaa-43faac call 43d50c 927->958 928->899 935 43fb5b-43fb6b call 40b918 928->935 945 43fd1c-43fd8a call 406060 call 406024 call 406060 call 406024 call 406060 call 406024 call 406060 933->945 950 43fcee-43fcf0 934->950 951 43fcdc-43fce0 934->951 935->899 953 43fb71-43fb8a call 40b4dc call 43d258 935->953 954 43fcf2-43fcfc call 43e060 950->954 955 43fcfe-43fd02 950->955 951->950 959 43fce2-43fcec call 43e060 951->959 987 43fb90-43fb94 953->987 988 43fc97-43fc99 call 40b564 953->988 954->933 965 43fd10-43fd12 call 43e060 955->965 966 43fd04-43fd0e call 43e060 955->966 979 43faba-43fadd call 406824 * 2 call 43e810 957->979 980 43faef-43fb3c call 43edd8 call 43ea38 call 406824 * 2 call 43e810 957->980 958->957 959->933 965->933 966->933 979->899 1049 43fae3-43faea call 43d50c 979->1049 980->899 1081 43fb42-43fb49 call 43d50c 980->1081 1003 43f98b-43f995 call 43dd30 call 43dd80 983->1003 1004 43f99a-43f99e 983->1004 984->983 1007 43f973-43f97d call 43dd30 call 43dd80 984->1007 994 43fb96-43fbb3 call 40adb8 call 42847c 987->994 995 43fbb5-43fbb9 987->995 988->899 994->995 1017 43fbc7-43fbdd call 406824 call 43a454 994->1017 1005 43fbbb 995->1005 1006 43fbdf-43fbe6 call 43e9c4 995->1006 1003->945 1015 43f9a0-43f9a7 call 43f64c 1004->1015 1016 43f9b8-43f9bc 1004->1016 1005->1017 1032 43fc34-43fc8e call 43edd8 call 43ec2c call 4066e4 call 406654 1006->1032 1033 43fbe8-43fc29 call 43ebac call 4066e4 call 406654 1006->1033 1007->945 1015->1016 1051 43f9a9-43f9b3 call 43dd30 call 43dd80 1015->1051 1021 43f9be-43f9cb call 43f11c 1016->1021 1022 43f9cd-43f9fd call 43f11c call 406824 * 2 call 43e810 1016->1022 1017->1006 1063 43fbbd-43fbc2 Sleep 1017->1063 1057 43fa2c-43fa30 1021->1057 1022->1057 1091 43f9ff-43fa28 call 4066e4 call 406654 1022->1091 1032->988 1100 43fc90-43fc92 call 43d50c 1032->1100 1033->988 1095 43fc2b-43fc32 call 43d50c 1033->1095 1049->899 1051->945 1067 43fa32-43fa34 call 43aec8 1057->1067 1068 43fa39-43fa3b call 43d50c 1057->1068 1063->1017 1067->1068 1068->901 1081->899 1091->1057 1095->988 1100->988
                          APIs
                          • GetForegroundWindow.USER32(00000030,00000000,0043FD8B,?,?,00486664,00000000,00000000,?,004436A7,00000000,004436EF,?,?,00000021,00000000), ref: 0043F7E6
                            • Part of subcall function 0040B918: CompareStringW.KERNEL32(00000400,00000001,00000000,000000FF,00000000,000000FF,00486680,?,00437D4A,?,00000000,00437DA0,?,?,?,00486680), ref: 0040B939
                            • Part of subcall function 00428590: LoadLibraryW.KERNEL32(00000000,00000000,004286D4,?,?,00486680,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0043F2F2), ref: 004285C3
                            • Part of subcall function 00428590: LoadLibraryW.KERNEL32(00000000,00000000,00000000,004286D4,?,?,00486680,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042866C
                            • Part of subcall function 0043DD30: ShowWindow.USER32(0002053C,00000001,00486734,00486680,0043F9AE), ref: 0043DD3F
                            • Part of subcall function 0043DD80: UnregisterClassW.USER32(Regedit_fast_jump,00400000), ref: 0043DD8B
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: LibraryLoadWindow$ClassCompareForegroundShowStringUnregister
                          • String ID: $0_$$1_$$2_$$5_$4gH$GGT$Not Config$SOFTWARE\XXX_$WINDIR$XXX_$_:E`}l'lql$j3U}lz}U}lz}
                          • API String ID: 954628970-2741076856
                          • Opcode ID: bc92d85b10e44bac47d5ed77af867d521b9c1cf5a18a2f9b64f3959704bf9c47
                          • Instruction ID: 5e7b73b35abb561ea2aea0d9688f48cf422379d0deacb349a846aead5bae2168
                          • Opcode Fuzzy Hash: bc92d85b10e44bac47d5ed77af867d521b9c1cf5a18a2f9b64f3959704bf9c47
                          • Instruction Fuzzy Hash: 37E1A870A002154BDF10FB72D88279A33A5AF49308F10A4BBFC45AB697CB3D9D598B5D

                          Control-flow Graph

                          APIs
                          • EnterCriticalSection.KERNEL32(0044CB84,00000000,00408088,?,?,?,00000000,?,00408950,00000000,004089AF,?,?,00000000,00000000,00000000), ref: 00407FA2
                          • LeaveCriticalSection.KERNEL32(0044CB84,0044CB84,00000000,00408088,?,?,?,00000000,?,00408950,00000000,004089AF,?,?,00000000,00000000), ref: 00407FC6
                          • LeaveCriticalSection.KERNEL32(0044CB84,0044CB84,00000000,00408088,?,?,?,00000000,?,00408950,00000000,004089AF,?,?,00000000,00000000), ref: 00407FD5
                          • IsValidLocale.KERNEL32(00000000,00000002,0044CB84,0044CB84,00000000,00408088,?,?,?,00000000,?,00408950,00000000,004089AF), ref: 00407FE7
                          • EnterCriticalSection.KERNEL32(0044CB84,00000000,00000002,0044CB84,0044CB84,00000000,00408088,?,?,?,00000000,?,00408950,00000000,004089AF), ref: 00408044
                          • LeaveCriticalSection.KERNEL32(0044CB84,0044CB84,00000000,00000002,0044CB84,0044CB84,00000000,00408088,?,?,?,00000000,?,00408950,00000000,004089AF), ref: 0040806D
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CriticalSection$Leave$Enter$LocaleValid
                          • String ID: en-GB,en,en-US,
                          • API String ID: 975949045-3021119265
                          • Opcode ID: f6d86eee62b6bf2d3840db3cc2fcc52f00c729b128c34464cea3ae48f6cc2a76
                          • Instruction ID: 89e35a22fce1ca92aca6ca6f157c9b85d33dba724616c188b81eab689516efc9
                          • Opcode Fuzzy Hash: f6d86eee62b6bf2d3840db3cc2fcc52f00c729b128c34464cea3ae48f6cc2a76
                          • Instruction Fuzzy Hash: A421EE3470564157E710B7BA9D9371A3188CB45748F66407FB081B62D7CEBCAC04877E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1134 43d9b0-43d9ce 1135 43d9f2-43da4a call 40a748 * 2 1134->1135 1136 43d9d0-43d9d3 1134->1136 1149 43da4f-43da9c call 4063e8 call 406824 SetWindowTextW call 406000 1135->1149 1138 43d9d9-43d9dc 1136->1138 1139 43db2e-43db38 call 43d834 1136->1139 1142 43d9e2-43d9e7 1138->1142 1143 43db1c-43db2c call 43dd80 1138->1143 1145 43db3d-43db64 DefWindowProcW call 406000 1139->1145 1146 43db00-43db09 1142->1146 1147 43d9ed 1142->1147 1143->1145 1154 43db69 1145->1154 1146->1145 1151 43db0b-43db13 1146->1151 1147->1145 1151->1145 1155 43db15-43db1a call 43d87c 1151->1155 1155->1145
                          APIs
                          • SetWindowTextW.USER32(00070272,00000000), ref: 0043DA7F
                          • DefWindowProcW.USER32(?,?,?,?,00000000,0043DB6A), ref: 0043DB4D
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Window$ProcText
                          • String ID: BUTTON$EDIT$Fast jump$HKEY_CURRENT_USER\Control Panel\Desktop$MZP
                          • API String ID: 2218353596-2216858624
                          • Opcode ID: e69d02082d12059add0810c350757150de9edb807d28e4ce6e4d838992b731ef
                          • Instruction ID: 29dd7edaff14d80a172b70b85ca7432f0e91f08ba1914f13b3f7aed7ea465baa
                          • Opcode Fuzzy Hash: e69d02082d12059add0810c350757150de9edb807d28e4ce6e4d838992b731ef
                          • Instruction Fuzzy Hash: A8316F75A04208ABEB10EF69EC52F6E73E8EB0C700F525436F900EB2D1D678ED109769

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1164 40b654-40b683 GetModuleHandleW 1165 40b691-40b693 1164->1165 1166 40b685-40b68f LoadLibraryW 1164->1166 1167 40b719-40b733 call 406060 1165->1167 1168 40b699-40b6d7 call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac 1165->1168 1166->1165 1168->1167 1184 40b6d9-40b6ea GetCurrentProcess 1168->1184 1186 40b6f0-40b6f2 1184->1186 1187 40b6ec-40b6ee 1184->1187 1188 40b6f6-40b6f8 1186->1188 1187->1186 1189 40b6f4 1187->1189 1188->1167 1190 40b6fa-40b70b GetNativeSystemInfo 1188->1190 1189->1188 1191 40b717 1190->1191 1192 40b70d-40b711 1190->1192 1191->1167 1192->1191 1193 40b713-40b715 1192->1193 1193->1167
                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,0040B734,?,?,00486734,00486680), ref: 0040B67A
                          • LoadLibraryW.KERNEL32(kernel32.dll,kernel32.dll,00000000,0040B734,?,?,00486734,00486680), ref: 0040B68A
                          • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,00000000,kernel32.dll,00000000,0040B734,?,?,00486734,00486680), ref: 0040B6DD
                          • GetNativeSystemInfo.KERNEL32(?,?,?,00486734,00486680), ref: 0040B6FE
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CurrentHandleInfoLibraryLoadModuleNativeProcessSystem
                          • String ID: @z^f~?=Y{fjlzz$kernel32.dll
                          • API String ID: 407697875-2470416289
                          • Opcode ID: cf400a607496727c57d8b79e2d90979a375013f491e65cfe34c017647f0dda60
                          • Instruction ID: cc312165b627e4cdb14975307c8c75a868c5ce4217f7475409fe1e9344262d1c
                          • Opcode Fuzzy Hash: cf400a607496727c57d8b79e2d90979a375013f491e65cfe34c017647f0dda60
                          • Instruction Fuzzy Hash: 2121BE31901315AEC712ABB98C51AEF72A8EB85718F954437F800B73C1EB3C8C1596EE

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1194 43dc14-43dc5a call 404444 GetModuleHandleW RegisterClassW 1197 43dcd4-43dcd8 1194->1197 1198 43dc5c-43dc6e KiUserCallbackDispatcher 1194->1198 1199 43dc73-43dc88 1198->1199 1200 43dc70 1198->1200 1202 43dc8a 1199->1202 1203 43dc8d-43dcc0 call 40a748 1199->1203 1200->1199 1202->1203 1205 43dcc5-43dcd1 1203->1205 1205->1197
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,00486734,00486680,0043F7AF,00000000,0043FD8B,?,?,00486664,00000000,00000000,?,004436A7,00000000,004436EF), ref: 0043DC42
                          • RegisterClassW.USER32(00486C08), ref: 0043DC52
                          • KiUserCallbackDispatcher.NTDLL(00000000,00000000,00486734,00486680,0043F7AF,00000000,0043FD8B,?,?,00486664,00000000,00000000,?,004436A7,00000000,004436EF), ref: 0043DC65
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CallbackClassDispatcherHandleModuleRegisterUser
                          • String ID: Regedit fast jump V1.2$Regedit_fast_jump
                          • API String ID: 2026650474-4282503210
                          • Opcode ID: cc5dc9e7916a9fd9ffcc6e7132985b69ea0554bfb4b0e75fc1fa52871a3855d4
                          • Instruction ID: ff227f2102c6a89d754623d3dc831d9a7ff48536fe2538a773c3bd321e84cfba
                          • Opcode Fuzzy Hash: cc5dc9e7916a9fd9ffcc6e7132985b69ea0554bfb4b0e75fc1fa52871a3855d4
                          • Instruction Fuzzy Hash: 16113AB5B517105FE3A0DF68ED85B6A32E4EB08708F01593EF645DB2D0DBB9A8048B49

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1206 407e68-407e82 GetThreadUILanguage 1207 407e84-407e98 call 407e24 1206->1207 1208 407edd-407ee9 call 407e24 1206->1208 1213 407e9b-407ebf 1207->1213 1214 407f26-407f2a 1208->1214 1215 407eeb-407ef3 1208->1215 1213->1213 1218 407ec1-407ed7 SetThreadPreferredUILanguages 1213->1218 1216 407f7c-407f81 1214->1216 1217 407f2c-407f4a SetThreadPreferredUILanguages call 407e24 1214->1217 1219 407ef5-407ef6 1215->1219 1220 407f16-407f21 call 40687c call 403f50 1215->1220 1229 407f4c-407f5b call 407e00 1217->1229 1230 407f5d-407f67 SetThreadPreferredUILanguages 1217->1230 1218->1208 1223 407efd-407f05 1219->1223 1220->1214 1224 407f10-407f14 1223->1224 1225 407f07-407f0a 1223->1225 1224->1220 1224->1223 1225->1224 1229->1230 1232 407f6d-407f77 call 403f50 * 2 1229->1232 1230->1232 1232->1216
                          APIs
                          • GetThreadUILanguage.KERNELBASE(?,00000000), ref: 00407E79
                          • SetThreadPreferredUILanguages.KERNEL32(00000004,?,?), ref: 00407ED7
                          • SetThreadPreferredUILanguages.KERNEL32(00000000,00000000,?), ref: 00407F34
                          • SetThreadPreferredUILanguages.KERNEL32(00000008,?,?), ref: 00407F67
                            • Part of subcall function 00407E24: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,00000000,?,?,00407EE5), ref: 00407E3B
                            • Part of subcall function 00407E24: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,?,00407EE5), ref: 00407E58
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Thread$LanguagesPreferred$Language
                          • String ID:
                          • API String ID: 2255706666-0
                          • Opcode ID: 64e88a95cc42ba7287f90517dc0aa7ad91b6f4ea3144bac7362c88a4aa254beb
                          • Instruction ID: c64547fa24ced421637df5c0631d32c6e461f39fc0f139bc27309100008ee978
                          • Opcode Fuzzy Hash: 64e88a95cc42ba7287f90517dc0aa7ad91b6f4ea3144bac7362c88a4aa254beb
                          • Instruction Fuzzy Hash: 63317230E0511A9BDB10DFA5D885AAEB7B8FF04304F0045BAE515F72D1D778AE05CB99

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1237 40a748-40a79c call 404348 CreateWindowExW call 404338
                          APIs
                          • CreateWindowExW.USER32(00000000,Regedit_fast_jump,0043D9B0,?,?,?,00000005,?,?,?,?,?), ref: 0040A787
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CreateWindow
                          • String ID: Regedit fast jump V1.2$Regedit_fast_jump
                          • API String ID: 716092398-4282503210
                          • Opcode ID: 52ed684031a3f60b859464a8a3777d52d3d04c0f90a715adbf70d004a935ed74
                          • Instruction ID: a517241aa0c29f4206de9bdbe5aa9f665dbdabb8af3f7c10e9afbeb71ed45618
                          • Opcode Fuzzy Hash: 52ed684031a3f60b859464a8a3777d52d3d04c0f90a715adbf70d004a935ed74
                          • Instruction Fuzzy Hash: 1FF074B6700118AF8B44DE9DDC81DDF77ECEB8D264B054129BA08E3201D634ED1187A4

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1242 408898-4088da call 4060e4 * 2 call 406000 1249 4088e0-4088f0 call 4063e8 1242->1249 1250 408994-4089ae call 406060 1242->1250 1256 4088f2-4088f5 1249->1256 1257 4088f7-4088fc 1249->1257 1256->1257 1258 408923-408932 call 4085d4 1257->1258 1259 4088fe-408907 1257->1259 1266 408943-408960 GetUserDefaultUILanguage call 407f84 call 408700 1258->1266 1267 408934-408941 call 408700 1258->1267 1261 408909-40891c call 406bf0 1259->1261 1262 40891e-408921 1259->1262 1261->1258 1262->1258 1262->1259 1274 408962-408969 1266->1274 1275 408985-408988 1266->1275 1267->1250 1274->1275 1277 40896b-408980 GetSystemDefaultUILanguage call 407f84 call 408700 1274->1277 1275->1250 1276 40898a-40898f call 4087cc 1275->1276 1276->1250 1277->1275
                          APIs
                          • GetUserDefaultUILanguage.KERNEL32(00000000,004089AF,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00408A36,00000000,?,00000105), ref: 00408943
                          • GetSystemDefaultUILanguage.KERNEL32(00000000,004089AF,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00408A36,00000000,?,00000105), ref: 0040896B
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: DefaultLanguage$SystemUser
                          • String ID:
                          • API String ID: 384301227-0
                          • Opcode ID: 60f1217627a62caf21864717d1d1ffa422a3aae7c1e8c1ff22f971d71f3af604
                          • Instruction ID: d299ade2d0cde5e0e6b4ac4308b209071da85b2919ee7819c01997859eb2786b
                          • Opcode Fuzzy Hash: 60f1217627a62caf21864717d1d1ffa422a3aae7c1e8c1ff22f971d71f3af604
                          • Instruction Fuzzy Hash: F8314C70A002099BDB10FBA9C981BAEB7B4AB44304F60447FE481B33D1DB7CAD45CB5A

                          Control-flow Graph

                          APIs
                          • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,00408A76,?,00400000,00444C08), ref: 004089F8
                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,00408A76,?,00400000,00444C08), ref: 00408A49
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: FileLibraryLoadModuleName
                          • String ID:
                          • API String ID: 1159719554-0
                          • Opcode ID: 4b5f65d131dd44abe89ba08c5592b5a98fb8228b2147084425797af8f58d8da9
                          • Instruction ID: ff3da6a666be0d6ffa05517e973b0afc017d91cd30ce0c1a03a3bebe0d5e188f
                          • Opcode Fuzzy Hash: 4b5f65d131dd44abe89ba08c5592b5a98fb8228b2147084425797af8f58d8da9
                          • Instruction Fuzzy Hash: 03116031A4021C9BDB14EB60CD86BDD73B8DB04304F5140BBB509B22D1DA785E848AA8

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1332 40b948-40b981 GetEnvironmentVariableW GetLongPathNameW call 4068d0 1334 40b986-40b98d 1332->1334
                          APIs
                          • GetEnvironmentVariableW.KERNEL32(00000000,?,00000208,004866F8,0043D0E3,00000000,0043D13A,?,00486680,00000001,00000000,00000000,?,00437AE2,?,00000000), ref: 0040B95D
                          • GetLongPathNameW.KERNELBASE(?,?,00000208), ref: 0040B972
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: EnvironmentLongNamePathVariable
                          • String ID:
                          • API String ID: 2057972008-0
                          • Opcode ID: 15b9029d297ef0175ab10ccc5325bcd8575cfd201a7f1f65d94be1b2a52fba4c
                          • Instruction ID: dc435742a546365fcd1a1d8ae548f6de60c2f229cc9ad4274613245ab6a971ca
                          • Opcode Fuzzy Hash: 15b9029d297ef0175ab10ccc5325bcd8575cfd201a7f1f65d94be1b2a52fba4c
                          • Instruction Fuzzy Hash: DAE086FAA0030067D3409794DC89C8B77AD9BC8710F04C53A7699C2291EA3899045762
                          APIs
                          • CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0043A7D9
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CreateFile
                          • String ID:
                          • API String ID: 823142352-0
                          • Opcode ID: e6026e072492908bd2ac8bec586b219015e7024cba609ac1c8d8e6f45bb31c07
                          • Instruction ID: effb560f06ffb086691e009eb791961bbbf3811e5e89f95771296192e7b8b082
                          • Opcode Fuzzy Hash: e6026e072492908bd2ac8bec586b219015e7024cba609ac1c8d8e6f45bb31c07
                          • Instruction Fuzzy Hash: AD213A753402007FE220EB5DDC85F6B33D8EB89B20F504135FA58EB2E0DA70AD099769
                          APIs
                          • GetModuleFileNameW.KERNEL32(00400000,?,0000020A), ref: 00407762
                            • Part of subcall function 004089BC: GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,00408A76,?,00400000,00444C08), ref: 004089F8
                            • Part of subcall function 004089BC: LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,00408A76,?,00400000,00444C08), ref: 00408A49
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: FileModuleName$LibraryLoad
                          • String ID:
                          • API String ID: 4113206344-0
                          • Opcode ID: 358e5c818d4021d8e6dfb070530815b4a7e06f116bb450956073f4b4dbaad43c
                          • Instruction ID: 0c0d8af671378e37ef2f8f11867f171fa8a64e733914af962fdd6609c9811da0
                          • Opcode Fuzzy Hash: 358e5c818d4021d8e6dfb070530815b4a7e06f116bb450956073f4b4dbaad43c
                          • Instruction Fuzzy Hash: 84E0C9B1A003109BCB14EFA8CAC5A563794AB18754F0445AAED68DF386D375E910C7D6
                          APIs
                          • WSAStartup.WS2_32(00000202,0045F0B0), ref: 0042656E
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Startup
                          • String ID:
                          • API String ID: 724789610-0
                          • Opcode ID: 3edcd535bb5d69f2c68979e5168ea0cfe4d657896c45878ceb297bf3764585b6
                          • Instruction ID: 44ae0b0028eb01218a78a6d63e91cbd5235d5447584bcb4ff0911ab5febe76ad
                          • Opcode Fuzzy Hash: 3edcd535bb5d69f2c68979e5168ea0cfe4d657896c45878ceb297bf3764585b6
                          • Instruction Fuzzy Hash: C3B01232362340CED6002B711D0EB4B2E544701ED3F0C40BA7840C50F3C594C00C8B2F
                          APIs
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: InfoSystem
                          • String ID:
                          • API String ID: 31276548-0
                          • Opcode ID: 229177a228d713a9a14fcff98108d9cc5e97c52a54c35a4239ee1928f04f60af
                          • Instruction ID: 2d2288808e5448b03cee85edb9978ee3a4aa03205f7dde6b98229f7bffd1799a
                          • Opcode Fuzzy Hash: 229177a228d713a9a14fcff98108d9cc5e97c52a54c35a4239ee1928f04f60af
                          • Instruction Fuzzy Hash: CCA012104085020BC908E7294D4340F31801940118FC402247C5CA96C2E62D856442DB
                          APIs
                          • ExitProcess.KERNEL32(00000000,0043F16D,00000000,0043F406,?,00486734,00486680,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0043F560), ref: 0043D514
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: ExitProcess
                          • String ID:
                          • API String ID: 621844428-0
                          • Opcode ID: a0191236da1e67e117a1b66312cff757390ddd695378a7c2c551f2080355b048
                          • Instruction ID: 0a4ffff9a5bd2a53c67e581a33889ca5d833dc331c66d4bcfab812d2debc2eb1
                          • Opcode Fuzzy Hash: a0191236da1e67e117a1b66312cff757390ddd695378a7c2c551f2080355b048
                          • Instruction Fuzzy Hash: D7A002BC2010008F8640EB6DDC80D09B3E8AB8E20171040A5F814C7334CF70AD049F15
                          APIs
                          • VirtualAlloc.KERNEL32(00000000,0013FFF0,00001000,00000004,?,00402DBB,FFFFFFDC,00402A8C), ref: 004027BE
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: 6e83b55374e38ba348886defc969fcf363bb13e5c12b6dfeb1a80ee92d75bf7a
                          • Instruction ID: d7f275c02b8ff420755371fd827dccc32f36ce75ba3383e112499b9bd2685023
                          • Opcode Fuzzy Hash: 6e83b55374e38ba348886defc969fcf363bb13e5c12b6dfeb1a80ee92d75bf7a
                          • Instruction Fuzzy Hash: 4AF049B1B803404BEB09DF798E853027AD6A78A304F24803EE508FB7E9E6B48415CB09
                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,00416CA8,?,?), ref: 004080E5
                          • GetProcAddress.KERNEL32(00000000,GetLongPathNameW), ref: 004080F6
                          • FindFirstFileW.KERNEL32(?,?,kernel32.dll,00416CA8,?,?), ref: 004081F6
                          • FindClose.KERNEL32(?,?,?,kernel32.dll,00416CA8,?,?), ref: 00408208
                          • lstrlenW.KERNEL32(?,?,?,?,kernel32.dll,00416CA8,?,?), ref: 00408214
                          • lstrlenW.KERNEL32(?,?,?,?,?,kernel32.dll,00416CA8,?,?), ref: 00408259
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Findlstrlen$AddressCloseFileFirstHandleModuleProc
                          • String ID: GetLongPathNameW$\$kernel32.dll
                          • API String ID: 1930782624-3908791685
                          • Opcode ID: c0075b3f116daeefb17eaddd3ceca8e9c16820536a0e8076f9c9bbe445cf2216
                          • Instruction ID: 9b698579dee47a5ce6c7e6d575a683c27756de6a4c8f4362d234e3b766aaeab0
                          • Opcode Fuzzy Hash: c0075b3f116daeefb17eaddd3ceca8e9c16820536a0e8076f9c9bbe445cf2216
                          • Instruction Fuzzy Hash: 6F41B431E006189BCB10EBA9CD85ADE73B5AF44310F1445FE9944F72D4EBBCAE41CA59
                          APIs
                          • LoadLibraryW.KERNEL32(00000000,00000000,00431AB5,?,00486680,00000000,00000000,?,00437EA6,?,00000000,00437F69,?,00000000,00000000,00000000), ref: 004318A4
                          • GetModuleHandleW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004319C9
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,?), ref: 0040A4D0
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,00000000), ref: 0040A4F2
                            • Part of subcall function 0040ADB8: lstrlenW.KERNEL32(00000000,?,?,00486734,00486680,00425F2B,00000000,00426187,?,00486680,00000000,00000000,?,0043F7A0,00000000,0043FD8B), ref: 0040ADD7
                          • LoadLibraryW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00431A4D
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc$HandleModulelstrlen
                          • String ID: J{lh}lJfdyh}`kelMJ$J{lh}lM@KZlj}`fg$K`}Ke}$M^DHY@'MEE$Mlel}lFkclj}$Mlel}lMJ$M~d@zJfdyfz`}`fgLghkelm$M~dLghkelJfdyfz`}`fg$Nl}J|{zf{@gof$Nl}J|{zf{Yfz$Nl}J|{{lg}Fkclj}$Nl}M@K`}z$Nl}MJ$Zlelj}Fkclj}$nm`:;'MEE$|zl{:;'MEE
                          • API String ID: 9417994-4209024249
                          • Opcode ID: 46f01f209ac1517e14f76089b48cfb9a6098342ea4fa0bf20f801332cc3d7d5f
                          • Instruction ID: d210e15e72295cd6b726f6c75a30a71111ee1474a08510ed185e98678324d597
                          • Opcode Fuzzy Hash: 46f01f209ac1517e14f76089b48cfb9a6098342ea4fa0bf20f801332cc3d7d5f
                          • Instruction Fuzzy Hash: CB517D759113049BCB40FBA6CC828DE77ADEF48318F41993BB401B6396EA7C98144BAD
                          APIs
                          • LoadLibraryW.KERNEL32(00000000,00000000,00426187,?,00486680,00000000,00000000,?,0043F7A0,00000000,0043FD8B,?,?,00486664,00000000,00000000), ref: 00425F34
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,?), ref: 0040A4D0
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,00000000), ref: 0040A4F2
                            • Part of subcall function 0040ADB8: lstrlenW.KERNEL32(00000000,?,?,00486734,00486680,00425F2B,00000000,00426187,?,00486680,00000000,00000000,?,0043F7A0,00000000,0043FD8B), ref: 0040ADD7
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AddressProc$LibraryLoadlstrlen
                          • String ID: ^ZH@fj}e$^ZHNl}Ehz}L{{f{$^ZHZ}h{}|y$`gl}Vg}fh$`gl}Vhmm{$a}fgz$g}faz$jefzlzfjbl}$jfgglj}$nl}afz}kpghdl$nl}zfjbfy}$za|}mf~g$zfjbl}$zlelj}$zlgm$zl}zfjbfy}$~z;V:;'MEE
                          • API String ID: 1729337914-1815106237
                          • Opcode ID: 8f734a74b5820445d690829d2c52daff7a50941e13d6a135ceb200ec9b92a943
                          • Instruction ID: 5c4a131c88f9612ba7b75e74eb8d09919213aae810613ce822a12766d2a0e463
                          • Opcode Fuzzy Hash: 8f734a74b5820445d690829d2c52daff7a50941e13d6a135ceb200ec9b92a943
                          • Instruction Fuzzy Hash: A66153B56113049ACB00FBB5DC828DE77ADEF44319B81857BB401B7297DA7C98148BAE
                          APIs
                          • LoadCursorW.USER32(00000000,00007F00), ref: 00432373
                          • LoadCursorW.USER32(00000000,00007F01), ref: 00432385
                          • LoadCursorW.USER32(00000000,00007F02), ref: 00432397
                          • LoadCursorW.USER32(00000000,00007F03), ref: 004323A9
                          • LoadCursorW.USER32(00000000,00007F04), ref: 004323BB
                          • LoadCursorW.USER32(00000000,00007F80), ref: 004323CD
                          • LoadCursorW.USER32(00000000,00007F81), ref: 004323DF
                          • LoadCursorW.USER32(00000000,00007F82), ref: 004323F1
                          • LoadCursorW.USER32(00000000,00007F83), ref: 00432403
                          • LoadCursorW.USER32(00000000,00007F84), ref: 00432415
                          • LoadCursorW.USER32(00000000,00007F85), ref: 00432427
                          • LoadCursorW.USER32(00000000,00007F86), ref: 00432439
                          • LoadCursorW.USER32(00000000,00007F88), ref: 0043244B
                          • LoadCursorW.USER32(00000000,00007F89), ref: 0043245D
                          • LoadCursorW.USER32(00000000,00007F8A), ref: 0043246F
                          • LoadCursorW.USER32(00000000,00007F8B), ref: 00432481
                          • DestroyIcon.USER32(?,00000000,00007F8B,00000000,00007F8A,00000000,00007F89,00000000,00007F88,00000000,00007F86,00000000,00007F85,00000000,00007F84,00000000), ref: 00432496
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CursorLoad$DestroyIcon
                          • String ID: d
                          • API String ID: 4160882069-2564639436
                          • Opcode ID: bf7c25c0758c83dd8361d29cf79b8cbd3adabcf9f3f7ee9b71b899f0064be9ea
                          • Instruction ID: eca3b65f90c1fbf3b1966a39f07301b07b48cd0bd549073b7d2622b705562fcd
                          • Opcode Fuzzy Hash: bf7c25c0758c83dd8361d29cf79b8cbd3adabcf9f3f7ee9b71b899f0064be9ea
                          • Instruction Fuzzy Hash: 54315974A9C3016AF7507F614883BB639619B00B05F09457AFF4C6E2C7EBB914544BAB
                          APIs
                            • Part of subcall function 0040B4DC: GetModuleHandleW.KERNEL32(kernel32.dll,?,00486680,0043F20A,00000001,00000000,?,00486734,00486680,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040B4E5
                          • OutputDebugStringW.KERNEL32(00000000), ref: 004370E3
                          • Sleep.KERNEL32(000003E8,00000000), ref: 004370ED
                          • OutputDebugStringW.KERNEL32(00000000), ref: 00437113
                          • DuplicateHandle.KERNEL32(00000000), ref: 00437150
                          • Sleep.KERNEL32(0000000A,00000000), ref: 004371B6
                            • Part of subcall function 00436E28: Sleep.KERNEL32(0000000A), ref: 00436E53
                          • DuplicateHandle.KERNEL32(00000000), ref: 004371AD
                          • OutputDebugStringW.KERNEL32(00000000), ref: 00437072
                            • Part of subcall function 0040B918: CompareStringW.KERNEL32(00000400,00000001,00000000,000000FF,00000000,000000FF,00486680,?,00437D4A,?,00000000,00437DA0,?,?,?,00486680), ref: 0040B939
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: String$DebugHandleOutputSleep$Duplicate$CompareModule
                          • String ID: 4gH$BH---------------------$D$NO $OK $SysWOW64\cmd.exe$SysWOW64\conime.exe$SysWOW64\wbem\WmiPrvSE.exe$system32\cmd.exe$wbem\WmiPrvSE.exe
                          • API String ID: 1574471335-2317324235
                          • Opcode ID: 8a35ef10e14ccf33a42443dbd4394bd668ecb9194afc7e98b384c13bee5a23bd
                          • Instruction ID: f05568c7d4dfcf692034845640a9875653ac5b9122fc9bc2ab6e3659e48a1b66
                          • Opcode Fuzzy Hash: 8a35ef10e14ccf33a42443dbd4394bd668ecb9194afc7e98b384c13bee5a23bd
                          • Instruction Fuzzy Hash: BCB15F74604205AFDB10EFA9C885B9E77E8EF49304F10407AF949EB395DB38AD04DB69
                          APIs
                          • ShowWindow.USER32(?,00000001), ref: 0043DE20
                          • SetForegroundWindow.USER32(?), ref: 0043DE58
                          • SetForegroundWindow.USER32(00000000), ref: 0043DE5E
                          • SetFocus.USER32(00000000,00000000,?), ref: 0043DE64
                          • SendMessageW.USER32(00000000,00000100,00000027,00000000), ref: 0043DE78
                          • SendMessageW.USER32(00000000,00000102,?,00000000), ref: 0043DEAD
                          • SendMessageW.USER32(00000000,00000100,00000027,00000000), ref: 0043DEBE
                          • Sleep.KERNEL32(000000C8,00000000,00000100,00000027,00000000,00000000,00000000,?), ref: 0043DED2
                          • SetForegroundWindow.USER32(00000000), ref: 0043DEF1
                          • SetFocus.USER32(00000000,00000000), ref: 0043DEF7
                          • SendMessageW.USER32(00000000,00000100,00000024,00000000), ref: 0043DF06
                          • SendMessageW.USER32(00000000,00000102,?,00000000), ref: 0043DF34
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: MessageSend$Window$Foreground$Focus$ShowSleep
                          • String ID: RegEdit_RegEdit$SysListView32$SysTreeView32$regedit.exe
                          • API String ID: 2024206484-319980174
                          • Opcode ID: a6ada2b0a3f51e6a3f696ae2be7fe5d5f0b08d7e2f9d3f57d138b3c66f60823b
                          • Instruction ID: ba1137598a63224ba6c654e925c15ac110f6c28f76abf197ed28cf60a58f3b56
                          • Opcode Fuzzy Hash: a6ada2b0a3f51e6a3f696ae2be7fe5d5f0b08d7e2f9d3f57d138b3c66f60823b
                          • Instruction Fuzzy Hash: CF41A370A44301BBE221EB58DCC6F3F36E4AB99B04F10442AF584EF2D1D6B8DC40931A
                          APIs
                          • LoadLibraryW.KERNEL32(00000000,00000000,0043007B,?,00486680,00000005,00000000,00000000,?,00437EAB,?,00000000,00437F69,?,00000000,00000000), ref: 0042FED1
                          • LoadLibraryW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,0043007B,?,00486680,00000005,00000000,00000000,?,00437EAB,?), ref: 0042FF30
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,?), ref: 0040A4D0
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,00000000), ref: 0040A4F2
                            • Part of subcall function 0040ADB8: lstrlenW.KERNEL32(00000000,?,?,00486734,00486680,00425F2B,00000000,00426187,?,00486680,00000000,00000000,?,0043F7A0,00000000,0043FD8B), ref: 0040ADD7
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc$lstrlen
                          • String ID: @J@gof$@JFylg$@JJefzl$@JJfdy{lzzf{O{ll$@JNl}@gof$@JZlgmDlzzhnl$@JZlxJfdy{lzzO{hdl$@JZlxJfdy{lzzO{hdlLgm$@JZlxJfdy{lzzO{hdlZ}h{}$DZ_O^:;'MEE$H_@JHY:;'MEE$jhyJ{lh}lJhy}|{l^`gmf~^
                          • API String ID: 268393782-1352645916
                          • Opcode ID: 089b21e976e5bb31fd2e61345d4ec2166a8204ce257b80a6789a54d5fa0b185f
                          • Instruction ID: b421654733045ff7ed06dadf9d5dc222b4f2467a359c68ce7b13b02f7cc919b0
                          • Opcode Fuzzy Hash: 089b21e976e5bb31fd2e61345d4ec2166a8204ce257b80a6789a54d5fa0b185f
                          • Instruction Fuzzy Hash: AA416D75910304ABCB40FBA5DC8299E77BDEF48318F41853BB401B6296EA7C9D144BAE
                          APIs
                          • GetForegroundWindow.USER32(00000000,00428E6C), ref: 00428C51
                          • GetWindowTextW.USER32(?,?,00000200), ref: 00428C9C
                          • EnterCriticalSection.KERNEL32(00486718,[,?,[,?,[,?,[), ref: 00428D2A
                          • lstrlenW.KERNEL32(00000000,00000000,00428DB4,?,00486718,[,?,[,?,[,?,[), ref: 00428D46
                          • LeaveCriticalSection.KERNEL32(00486718,00428DBB,?,[,?,[,?,[), ref: 00428DAE
                          • lstrlenW.KERNEL32(?,00000000,00428E6C), ref: 00428DBF
                          • EnterCriticalSection.KERNEL32(00486718,?,00000000,00428E6C), ref: 00428DDB
                          • LeaveCriticalSection.KERNEL32(00486718,00428E46,00000000,00428E6C), ref: 00428E39
                            • Part of subcall function 0040BAE8: FileTimeToLocalFileTime.KERNEL32(?,?,00000000,0040BC14,?,?,?,00486680), ref: 0040BB24
                            • Part of subcall function 0040BAE8: FileTimeToSystemTime.KERNEL32(?,?,?,?,?,00486680), ref: 0040BB3A
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CriticalSectionTime$File$EnterLeaveWindowlstrlen$ForegroundLocalSystemText
                          • String ID: [$[$[$[$4gH
                          • API String ID: 3203209789-4231738031
                          • Opcode ID: 553d9157399e13fad3db8783b02503fa42ac75fcbc7655638e3930898fa68555
                          • Instruction ID: cd6cea95f2fdff4dc38500494d2ec49a0396264a133fbde8197061e77fe4df3e
                          • Opcode Fuzzy Hash: 553d9157399e13fad3db8783b02503fa42ac75fcbc7655638e3930898fa68555
                          • Instruction Fuzzy Hash: B2511975700608AFDB00DF99DC85E8EBBF9EB49304F814069F504E72A2DB38ED548B68
                          APIs
                          • CreateFontW.GDI32(0000000C,00000006,00000000,00000000,000000C8,00000000,00000000,00000000,00000086,00000000,00000000,00000000,00000000,Arial), ref: 0042BC24
                          • SendMessageW.USER32(?,00000030,?,00000000), ref: 0042BC35
                          • SendMessageW.USER32(?,00000030,?,00000000), ref: 0042BC48
                          • SendMessageW.USER32(?,00000030,?,00000000), ref: 0042BC5B
                          • DefWindowProcW.USER32(?,?,?,?), ref: 0042BD17
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: MessageSend$CreateFontProcWindow
                          • String ID: Arial$BUTTON$EDIT$sQ
                          • API String ID: 369421526-1325858889
                          • Opcode ID: 91081239d773ded964b170543547179827420fda9424dc9f98072b94967eb520
                          • Instruction ID: a2bb92f48b7c9c5c0a2ca1f4238ce0aeea9e52c4f4215f0c1d5f0f2e55f97722
                          • Opcode Fuzzy Hash: 91081239d773ded964b170543547179827420fda9424dc9f98072b94967eb520
                          • Instruction Fuzzy Hash: 185112713903147BF720AA59AC56FAB2768E700B44FA44427F700BF2D1DBB9AC01879E
                          APIs
                          • RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00409200
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: ExceptionRaise
                          • String ID: @n
                          • API String ID: 3997070919-632216509
                          • Opcode ID: 2ff4fce7c77f293058c68d3cc450b499553666d9f0ef4978638c54b6cd64c25f
                          • Instruction ID: 102a0f0c3ce5befaca2a965e61597f0f4c621f32d06faf9af7fb97871bd771b6
                          • Opcode Fuzzy Hash: 2ff4fce7c77f293058c68d3cc450b499553666d9f0ef4978638c54b6cd64c25f
                          • Instruction Fuzzy Hash: 0CA16F759012099FDB15DFA8D8C0BAEB7B5AB88300F14453EE905B73C2DB78AD45CB58
                          APIs
                          • LoadLibraryW.KERNEL32(00000000,00000000,004286D4,?,?,00486680,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0043F2F2), ref: 004285C3
                          • LoadLibraryW.KERNEL32(00000000,00000000,00000000,004286D4,?,?,00486680,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042866C
                            • Part of subcall function 0040ADB8: lstrlenW.KERNEL32(00000000,?,?,00486734,00486680,00425F2B,00000000,00426187,?,00486680,00000000,00000000,?,0043F7A0,00000000,0043FD8B), ref: 0040ADD7
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,?), ref: 0040A4D0
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,00000000), ref: 0040A4F2
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc$lstrlen
                          • String ID: Lg|dY{fjlzzDfm|elz$Lg|dY{fjlzzlz$Nl}Dfm|elO`elGhdlLq^$Nl}Y{fjlzz@dhnlO`elGhdl^$YzHy`'MEE$^]ZLg|dl{h}lY{fjlzzlz^$^]ZO{llDldf{p$^}zhy`:;'mee
                          • API String ID: 268393782-2693748152
                          • Opcode ID: ffa61641ab19f340686b4a17e72a16458ca9a0a1770ddef71ab0c5d47f97fb7c
                          • Instruction ID: b2abc951f42fac8fa2330dbee562f4288950d046d5c14a321555204371fbe9ee
                          • Opcode Fuzzy Hash: ffa61641ab19f340686b4a17e72a16458ca9a0a1770ddef71ab0c5d47f97fb7c
                          • Instruction Fuzzy Hash: F7318075A123159BCB41FBA5DC428DE77A9EF85318B81813BB400B7682DB3C9D144BAE
                          APIs
                          • lstrcatW.KERNEL32(?, /c "), ref: 0042DD92
                          • lstrcatW.KERNEL32(?,00000000,?, /c "), ref: 0042DDA7
                          • lstrcatW.KERNEL32(?,0042DF9C,?,00000000,?, /c "), ref: 0042DDB8
                            • Part of subcall function 0042B474: lstrlenW.KERNEL32(00000000,00000000,0042B658,?,?,?,00000001), ref: 0042B4AE
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: lstrcat$lstrlen
                          • String ID: /c "$8[B$COMSPEC$D$HfH$|aH
                          • API String ID: 751011610-206186839
                          • Opcode ID: 052fad98bc2d18d6d84550cfe2fd370de0678df48a72e9a094c45fe774489eba
                          • Instruction ID: 81ed9846a7d3f65a68619d801d78e7a443c993b2260b494b6be705ed66106b92
                          • Opcode Fuzzy Hash: 052fad98bc2d18d6d84550cfe2fd370de0678df48a72e9a094c45fe774489eba
                          • Instruction Fuzzy Hash: 9AA14B70A002199FDB11DBA9DC81F9EB3F8FB48304F91417AF544EB291DB79A944CB68
                          APIs
                          • IsValidLocale.KERNEL32(?,00000001,00000000,0041AB5F,?,?,?,?,00000000,00000000), ref: 0041A897
                          • GetThreadLocale.KERNEL32(?,00000001,00000000,0041AB5F,?,?,?,?,00000000,00000000), ref: 0041A8A0
                            • Part of subcall function 0041A844: GetLocaleInfoW.KERNEL32(?,0000000F,0041A950,00000002,0000002C,?,?,?,0041A950), ref: 0041A857
                            • Part of subcall function 0041A7F8: GetLocaleInfoW.KERNEL32(?,?,?,00000100), ref: 0041A816
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Locale$Info$ThreadValid
                          • String ID: AMPM$2$:mm$:mm:ss$AMPM $m/d/yy$mmmm d, yyyy
                          • API String ID: 233154393-3379564615
                          • Opcode ID: 94823e5df3ed155d42373aeca29090d4622e880d401ed27dd137ea8507bc74b4
                          • Instruction ID: 5b46dc006f98231a26cae34b1307f24b2f5ea33c94de3b4259bcb689306f24a8
                          • Opcode Fuzzy Hash: 94823e5df3ed155d42373aeca29090d4622e880d401ed27dd137ea8507bc74b4
                          • Instruction Fuzzy Hash: C77154347011585BDB01EBA5C841BDE76BAEF48304F50807BF515AB286DB3CDEA2879E
                          APIs
                            • Part of subcall function 0040514C: GetTickCount.KERNEL32 ref: 00405183
                            • Part of subcall function 0040514C: GetTickCount.KERNEL32 ref: 0040519B
                            • Part of subcall function 0041A7F8: GetLocaleInfoW.KERNEL32(?,?,?,00000100), ref: 0041A816
                          • GetThreadLocale.KERNEL32(00000000,00000004), ref: 0041B10F
                          • EnumCalendarInfoW.KERNEL32(0041AF60,00000000,00000000,00000004), ref: 0041B11A
                          • GetThreadLocale.KERNEL32(00000000,00000003,0041AF60,00000000,00000000,00000004), ref: 0041B14A
                          • EnumCalendarInfoW.KERNEL32(0041AFEC,00000000,00000000,00000003,0041AF60,00000000,00000000,00000004), ref: 0041B155
                          • GetThreadLocale.KERNEL32(00000000,00000004), ref: 0041B1E6
                          • EnumCalendarInfoW.KERNEL32(0041AF60,00000000,00000000,00000004), ref: 0041B1F1
                          • GetThreadLocale.KERNEL32(00000000,00000003,0041AF60,00000000,00000000,00000004), ref: 0041B223
                          • EnumCalendarInfoW.KERNEL32(0041AFEC,00000000,00000000,00000003,0041AF60,00000000,00000000,00000004), ref: 0041B22E
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: InfoLocale$CalendarEnumThread$CountTick
                          • String ID: B.C.
                          • API String ID: 1601775584-621294921
                          • Opcode ID: bc8247d33fe5370433e2fd6ccc15e77975c242f0979f0cb17630a33c32e31ca2
                          • Instruction ID: d5467c5867d662d48c46f78aef8c8699bdd0855b3e6aaee3d787cd1117f7295e
                          • Opcode Fuzzy Hash: bc8247d33fe5370433e2fd6ccc15e77975c242f0979f0cb17630a33c32e31ca2
                          • Instruction Fuzzy Hash: 2B51F474A016005FD310EB29DC85BAE7766EB49318F14817AF800AB3E2C77E9D55878E
                          APIs
                            • Part of subcall function 0041B6FC: VirtualQuery.KERNEL32(?,?,0000001C,00000000,0041B8A8), ref: 0041B72F
                            • Part of subcall function 0041B6FC: GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 0041B753
                            • Part of subcall function 0041B6FC: GetModuleFileNameW.KERNEL32(MZP,?,00000105), ref: 0041B76E
                            • Part of subcall function 0041B6FC: LoadStringW.USER32(00000000,0000FFEA,?,00000100), ref: 0041B809
                          • WideCharToMultiByte.KERNEL32(00000001,00000000,?,00000000,00000000,00000000,00000000,00000000,00000400,00000000,0041BA19), ref: 0041B955
                          • WideCharToMultiByte.KERNEL32(00000001,00000000,?,00000000,?,00000000,00000000,00000000), ref: 0041B988
                          • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,00000001,00000000,?,00000000,?,00000000,00000000,00000000), ref: 0041B99A
                          • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000,00000001,00000000,?,00000000,?,00000000,00000000,00000000), ref: 0041B9A0
                          • GetStdHandle.KERNEL32(000000F4,0041BA34,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,00000001,00000000,?,00000000,?), ref: 0041B9B4
                          • WriteFile.KERNEL32(00000000,000000F4,0041BA34,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,00000001,00000000,?,00000000), ref: 0041B9BA
                          • LoadStringW.USER32(00000000,0000FFEB,?,00000040), ref: 0041B9DE
                          • MessageBoxW.USER32(00000000,?,?,00002010), ref: 0041B9F8
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: File$ByteCharHandleLoadModuleMultiNameStringWideWrite$MessageQueryVirtual
                          • String ID: @
                          • API String ID: 135118572-216407459
                          • Opcode ID: 5e5b58603649367f128015842687fb9cd620b316ebe1d037fa3627f5dde79ee1
                          • Instruction ID: f4c401843c9c291ca3b94f10bb34d76506db394776c8f349b425d2b96d247647
                          • Opcode Fuzzy Hash: 5e5b58603649367f128015842687fb9cd620b316ebe1d037fa3627f5dde79ee1
                          • Instruction Fuzzy Hash: A43170B5640204BFE710EB95CC82FDA73ACEB04704F6041BAB644F71D1DAB46E80876D
                          APIs
                          • LoadLibraryW.KERNEL32(00000000,00000000,0042D072,?,00000000,00000000,00000000,00000000,00000000,00000000,?,0042C75E,00000000,0042CB8F), ref: 0042CF4F
                            • Part of subcall function 0040ADB8: lstrlenW.KERNEL32(00000000,?,?,00486734,00486680,00425F2B,00000000,00426187,?,00486680,00000000,00000000,?,0043F7A0,00000000,0043FD8B), ref: 0040ADD7
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,?), ref: 0040A4D0
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,00000000), ref: 0040A4F2
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AddressProc$LibraryLoadlstrlen
                          • String ID: @yAeyHy`'MEE$Heefjh}lHgmNl}\myLq]hkelO{fdZ}hjb$Heefjh}lHgmNl}]jyLq]hkelO{fdZ}hjb$Nl}Lq}lgmlm\my]hkel$Nl}Lq}lgmlm]jy]hkel$Zl}]jyLg}{p
                          • API String ID: 1729337914-77311109
                          • Opcode ID: 24fcab706ba486010333c345a5a4c1ee916a8591a563e09837591bfc18d52602
                          • Instruction ID: e9226c6078ce630d9dc907993224ef77e34ecd6abfb291ef623e07e235766894
                          • Opcode Fuzzy Hash: 24fcab706ba486010333c345a5a4c1ee916a8591a563e09837591bfc18d52602
                          • Instruction Fuzzy Hash: 5C318571A102009FC780FBADED89A5E37E9EB45318F81493EB441B72A3D77C59148B6D
                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,GetLogicalProcessorInformation), ref: 00404F9A
                          • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00404FA0
                          • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 00404FB3
                          • GetLastError.KERNEL32(00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 00404FBC
                          • GetLogicalProcessorInformation.KERNEL32(?,?,00000000,00405030,?,00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 00404FE7
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: InformationLogicalProcessor$AddressErrorHandleLastModuleProc
                          • String ID: GetLogicalProcessorInformation$kernel32.dll
                          • API String ID: 1184211438-812649623
                          • Opcode ID: 35201d4d745a74f346a6d86facebae3d15b37a8ffc1e75ce2ae731f58a1f64b0
                          • Instruction ID: 54b7ebe99e7f302da2557309956b5d9292d5a3a304b6d3c4cb150c26000b97f2
                          • Opcode Fuzzy Hash: 35201d4d745a74f346a6d86facebae3d15b37a8ffc1e75ce2ae731f58a1f64b0
                          • Instruction Fuzzy Hash: 8A118471904604AEDF10EBA5CD46B5FB7ACEB44318F2040BBE504B21C2D67D9A80DE5D
                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,GetLogicalProcessorInformation), ref: 00404F9A
                          • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00404FA0
                          • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 00404FB3
                          • GetLastError.KERNEL32(00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 00404FBC
                          • GetLogicalProcessorInformation.KERNEL32(?,?,00000000,00405030,?,00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 00404FE7
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: InformationLogicalProcessor$AddressErrorHandleLastModuleProc
                          • String ID: GetLogicalProcessorInformation$kernel32.dll
                          • API String ID: 1184211438-812649623
                          • Opcode ID: bd05037c37d740ab1b4dc7fa39a3e26f1e2793f84830334b598c92dfe34fff13
                          • Instruction ID: 8199570454523d895cc0032b24ada9d2fbf36891f81a90a2ad8e621ecca28dd4
                          • Opcode Fuzzy Hash: bd05037c37d740ab1b4dc7fa39a3e26f1e2793f84830334b598c92dfe34fff13
                          • Instruction Fuzzy Hash: DC016571904604AADF10EBA18D45A5FB7ACEB04318F20407BF504F61C1D67D9A809E5D
                          APIs
                          • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000,?,?,00405E86,00404023,0040406A,00000000,?), ref: 00405CF1
                          • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000,?,?,00405E86,00404023,0040406A,00000000), ref: 00405CF7
                          • GetStdHandle.KERNEL32(000000F5,00000000,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000,?), ref: 00405D12
                          • WriteFile.KERNEL32(00000000,000000F5,00000000,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000), ref: 00405D18
                          • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00405D36
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: FileHandleWrite$Message
                          • String ID: Error$Runtime error at 00000000
                          • API String ID: 1570097196-2970929446
                          • Opcode ID: 9da2a348520ae705558052009ceb975953c61fbff1b85c89fbedfe3754430604
                          • Instruction ID: 8e6b3ae1d0950b207053b0f6b2d9b368760f02a7951139c7a1ba30855beff3be
                          • Opcode Fuzzy Hash: 9da2a348520ae705558052009ceb975953c61fbff1b85c89fbedfe3754430604
                          • Instruction Fuzzy Hash: CEF096A168578039F710B7A44D0FF5B2248AB85F19F24857FB610B40D2D6FC48D4DA2E
                          APIs
                          • Sleep.KERNEL32(00000000,?), ref: 00402EDA
                          • Sleep.KERNEL32(0000000A,00000000,?), ref: 00402EF4
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: eb1b30fa2819bb7e9c26078b3c9538032f65093cedfba747be72939952c37498
                          • Instruction ID: 3880d568d444d35d86371686d009cb09ec6d1a72a8af32c9c49ca4f9918148e7
                          • Opcode Fuzzy Hash: eb1b30fa2819bb7e9c26078b3c9538032f65093cedfba747be72939952c37498
                          • Instruction Fuzzy Hash: 1471E2716443008FD715DF29CB88B16BBE4AB86314F18817FE488AB3D2D7F89945C79A
                          APIs
                            • Part of subcall function 0040ADB8: lstrlenW.KERNEL32(00000000,?,?,00486734,00486680,00425F2B,00000000,00426187,?,00486680,00000000,00000000,?,0043F7A0,00000000,0043FD8B), ref: 0040ADD7
                          • Sleep.KERNEL32(000001F4), ref: 0043E2BF
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Sleeplstrlen
                          • String ID: D\ymh}l;'lql$HEPhj'hpl$HPHnlg}'hpl$HP]hzb'hpl$HZM\y'lql$_:E`}l'lql$_:E`}lLqy'lql
                          • API String ID: 404571708-2566769197
                          • Opcode ID: c1a7c98b22a2f22b02d8b9bb3fec9843a6aa04b2a1bf0e8831c885995607f298
                          • Instruction ID: acd5230c7a7213d7fe97c03c0ffc7f1d30c64ff60ca5bdd317cc2c1716e60a4c
                          • Opcode Fuzzy Hash: c1a7c98b22a2f22b02d8b9bb3fec9843a6aa04b2a1bf0e8831c885995607f298
                          • Instruction Fuzzy Hash: A4716134A00248DFDB00DB99C181BCDB7B5EF49308F645096E841BB382C779EE54DBAA
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ebb56015c37a3f9fb8dd09f6843bc0f113a4137dadc24ef096fcc9bb47d10006
                          • Instruction ID: d6e953f600fa62a4cb01c07aad8c81ca5a5721795a0ae764ee1700970c6b3899
                          • Opcode Fuzzy Hash: ebb56015c37a3f9fb8dd09f6843bc0f113a4137dadc24ef096fcc9bb47d10006
                          • Instruction Fuzzy Hash: DDC139727102000BD7149E7D9E8932EB7899BC5315F18827FE254EB3D6DABCCD458399
                          APIs
                          • GetProcessHeap.KERNEL32(00000002,00000002,00000000,0042CB8F,?,?,?,?,00000008,00000000,00000000), ref: 0042C7BC
                          • lstrlenW.KERNEL32(00000000,?,00000000,0042CB8F,?,?,?,?,00000008,00000000,00000000), ref: 0042C864
                          • lstrlenW.KERNEL32(00000000,?,00000000,0042CB8F,?,?,?,?,00000008,00000000,00000000), ref: 0042CA7A
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: lstrlen$HeapProcess
                          • String ID: System$TCP$UDP
                          • API String ID: 3046081391-2438800281
                          • Opcode ID: 2e587ecefdbb139cbce253a7460bddf1e7960b3cb139078374ca670e3306fb08
                          • Instruction ID: 35f293c671a670b9e6b81fc65c15e8a90b22f42eb6ca05dc6d7e89f087aa4173
                          • Opcode Fuzzy Hash: 2e587ecefdbb139cbce253a7460bddf1e7960b3cb139078374ca670e3306fb08
                          • Instruction Fuzzy Hash: 57D18F31B40219AFDB00EBA5EC86FAEBBB5AF48704F504466F510F7292D778A905CB58
                          APIs
                          • MessageBoxA.USER32(00000000,?,004024F8,00002010), ref: 00403CA0
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Message
                          • String ID: $0$@$7$\$@$$@
                          • API String ID: 2030045667-1228603798
                          • Opcode ID: ac19fcd5adda951769c91ee1a6c17dc81187d7c120c71253a4f0a3854113e247
                          • Instruction ID: e812cd3dc2fef7569f4f822b6a4b970610b3f81895bdd3cedabc248f3003e63a
                          • Opcode Fuzzy Hash: ac19fcd5adda951769c91ee1a6c17dc81187d7c120c71253a4f0a3854113e247
                          • Instruction Fuzzy Hash: 18B1CA30B042548BDB21DF2DC885B997BF8AB4A709F0441FAE449F7382CB785E85CB59
                          APIs
                          • lstrlenW.KERNEL32(00000000,00000000,0042E424,?,?,00000000,00000000), ref: 0042E0BD
                          • lstrlenW.KERNEL32(?,00000000,00000000,0042E424,?,?,00000000,00000000), ref: 0042E0C8
                          • Sleep.KERNEL32(00000001), ref: 0042E263
                            • Part of subcall function 0042DFF8: lstrlenW.KERNEL32(00000000,?,0042E25D), ref: 0042E004
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: lstrlen$Sleep
                          • String ID: *.*$.$\
                          • API String ID: 429307061-3468707253
                          • Opcode ID: 12244ae98e7790e0bcfe0dc87e16b914e91ade2e89f473010b1b4e49b66439e0
                          • Instruction ID: 874b38f9c15a16064f5124428c196f5401a35f00216acdfa7908766dcb98f518
                          • Opcode Fuzzy Hash: 12244ae98e7790e0bcfe0dc87e16b914e91ade2e89f473010b1b4e49b66439e0
                          • Instruction Fuzzy Hash: BDA193306002299FDB60EB65EC85B9D77F8EB48304F9145F6E409E32A1DB789E84CF58
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterExistsFileLeavePath
                          • String ID: " "$.exe$/Update$HfH
                          • API String ID: 3310751803-1929450815
                          • Opcode ID: aa955d9050df199ca6804f25a1b4324a74b4dc30d2bbef1dc68e39435076f8d9
                          • Instruction ID: 609c13bec061a5d4637fb112db9b101bfdfe75ff76c94aae5f827595d8871324
                          • Opcode Fuzzy Hash: aa955d9050df199ca6804f25a1b4324a74b4dc30d2bbef1dc68e39435076f8d9
                          • Instruction Fuzzy Hash: 6951A374604205AFDB10EBA9C8A2B9F73E4EB0D344F105066FA10D7391DB7DAD049B99
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000), ref: 0043CDCF
                          • LoadLibraryW.KERNEL32(00000000,00000000), ref: 0043CE1C
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: HandleLibraryLoadModule
                          • String ID: *.*$XXX_InfoW$XXX_Plugs\$XXX_Starting
                          • API String ID: 4133054770-2785245216
                          • Opcode ID: f71acd30243d42f49c7826a7ce0a7bd6944551d3629e193985cfb457d1c80ab8
                          • Instruction ID: 5c59f4733bd3e6e152ae9da63c784154abf35261a6166e2ebc2e54f53956f2ea
                          • Opcode Fuzzy Hash: f71acd30243d42f49c7826a7ce0a7bd6944551d3629e193985cfb457d1c80ab8
                          • Instruction Fuzzy Hash: 9F518471A056199FCB10EB65DC89A8EB7F5EF48304F1181FBA409F3291DB389E548F58
                          APIs
                            • Part of subcall function 004265F0: htons.WS2_32(?), ref: 00426637
                            • Part of subcall function 004265F0: gethostbyname.WS2_32(00000000), ref: 00426665
                            • Part of subcall function 004265F0: connect.WS2_32(?,00000008,00000010), ref: 00426690
                            • Part of subcall function 004265F0: WSAGetLastError.WS2_32(?,?,00000000,00000000), ref: 004266B9
                            • Part of subcall function 004265F0: Sleep.KERNEL32(00000002,?,?,00000000,00000000), ref: 004266CA
                            • Part of subcall function 004264A8: setsockopt.WS2_32(?,00000006,00000001,?,00000004), ref: 004264C7
                            • Part of subcall function 00426468: setsockopt.WS2_32(?,0000FFFF,00001001,?,00000004), ref: 0042647E
                            • Part of subcall function 0042B474: lstrlenW.KERNEL32(00000000,00000000,0042B658,?,?,?,00000001), ref: 0042B4AE
                            • Part of subcall function 0040B948: GetEnvironmentVariableW.KERNEL32(00000000,?,00000208,004866F8,0043D0E3,00000000,0043D13A,?,00486680,00000001,00000000,00000000,?,00437AE2,?,00000000), ref: 0040B95D
                            • Part of subcall function 0040B948: GetLongPathNameW.KERNELBASE(?,?,00000208), ref: 0040B972
                          • Sleep.KERNEL32(000001F4,0042E635,?,00000064,00000000,00000000,0042E65B,?,00000000,0042E67D), ref: 0042E61E
                            • Part of subcall function 0042E088: lstrlenW.KERNEL32(00000000,00000000,0042E424,?,?,00000000,00000000), ref: 0042E0BD
                            • Part of subcall function 0042E088: lstrlenW.KERNEL32(?,00000000,00000000,0042E424,?,?,00000000,00000000), ref: 0042E0C8
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: lstrlen$Sleepsetsockopt$EnvironmentErrorLastLongNamePathVariableconnectgethostbynamehtons
                          • String ID: 8[B$:$HfH$WINDIR$\$\Temp
                          • API String ID: 916843999-738507572
                          • Opcode ID: a8029911b969878f78ac764834f3b201bdd0417c20dfb5ba0b09e840580c8ea6
                          • Instruction ID: ba3bdb42cb812209f095133bc7201274ca052839750dfdcc6e646bdf85a6b18d
                          • Opcode Fuzzy Hash: a8029911b969878f78ac764834f3b201bdd0417c20dfb5ba0b09e840580c8ea6
                          • Instruction Fuzzy Hash: E2515AB4B10610AFD741EFAAEC51A5A37E5FB19308F82847AE400973E1EB789C41CB5C
                          APIs
                            • Part of subcall function 004053E8: GetCurrentThreadId.KERNEL32 ref: 004053EB
                          • GetTickCount.KERNEL32 ref: 00405183
                          • GetTickCount.KERNEL32 ref: 0040519B
                          • GetCurrentThreadId.KERNEL32 ref: 004051CB
                          • GetTickCount.KERNEL32 ref: 004051F6
                          • GetTickCount.KERNEL32 ref: 0040522D
                          • GetTickCount.KERNEL32 ref: 00405257
                          • GetCurrentThreadId.KERNEL32 ref: 004052C7
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CountTick$CurrentThread
                          • String ID:
                          • API String ID: 3968769311-0
                          • Opcode ID: f9d61921e35b482ef1f14d4eaeacaa075d63589b9816c89e841c04f0b3fb69e2
                          • Instruction ID: e96b3358484ed09efb32f7bf407c562274a0588feb759182786de9b46f441b21
                          • Opcode Fuzzy Hash: f9d61921e35b482ef1f14d4eaeacaa075d63589b9816c89e841c04f0b3fb69e2
                          • Instruction Fuzzy Hash: EF418D30608B419FD721EE78C58431FBAD1EF94354F15897EE8D89B3C1EA7898818F5A
                          APIs
                          • InternetOpenW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0040BC87
                          • InternetOpenUrlW.WININET(00000000,?,00000000,00000000,40000000,00000000), ref: 0040BCB8
                          • HttpQueryInfoW.WININET(00000000,20000005,?,00000004,?), ref: 0040BCFA
                          • InternetCloseHandle.WININET(00000000), ref: 0040BD8F
                            • Part of subcall function 0040B634: VirtualAlloc.KERNEL32(00000000,00000000,00001000,00000004,00428AA0,?,?,00486734,00486680,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040B63E
                          • InternetReadFile.WININET(00000000,?,?,?), ref: 0040BD2F
                            • Part of subcall function 0040B644: VirtualFree.KERNEL32(00000000,00000000,00008000,00428B66,?,?,00486734,00486680,00000000,00000000,00000000,00000000,00000000,00000000,?,00437E88), ref: 0040B64C
                          • InternetCloseHandle.WININET(00000000), ref: 0040BDAE
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Internet$CloseHandleOpenVirtual$AllocFileFreeHttpInfoQueryRead
                          • String ID:
                          • API String ID: 436716311-0
                          • Opcode ID: 3e7517a180f2519e9ef8862004f9ea7d21659a34cfeb77de3d18cea408e80831
                          • Instruction ID: 2d81d751fc6afc2710d3bfc5214d13ec27d882b95dc00282e94316269f0eb743
                          • Opcode Fuzzy Hash: 3e7517a180f2519e9ef8862004f9ea7d21659a34cfeb77de3d18cea408e80831
                          • Instruction Fuzzy Hash: 90417975A04208AFDB11DFA4DC95BAEB7B8EB49700F114476F505E3290DB389900CB68
                          APIs
                          • Sleep.KERNEL32(00000000,FFFFFFDC,00402A8C), ref: 00402B77
                          • Sleep.KERNEL32(0000000A,00000000,FFFFFFDC,00402A8C), ref: 00402B8D
                          • Sleep.KERNEL32(00000000,?,?,FFFFFFDC,00402A8C), ref: 00402BBB
                          • Sleep.KERNEL32(0000000A,00000000,?,?,FFFFFFDC,00402A8C), ref: 00402BD1
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: 00e817329ed30a61a1e3ce9785030074bf56165d3748735972e8587115fb55d2
                          • Instruction ID: e9b8b7081cf30ab9f8610f5ddeb7dffbd4721761cd41d76955e75723a6189a5d
                          • Opcode Fuzzy Hash: 00e817329ed30a61a1e3ce9785030074bf56165d3748735972e8587115fb55d2
                          • Instruction Fuzzy Hash: 89C149766013108FDB19CF29DB88316BBE0AB86314F18827FD444AB3D5C7B8D955CB9A
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID:
                          • String ID: $0$@$7$\$@
                          • API String ID: 0-4266993835
                          • Opcode ID: 0898838d16f207543cc06ffe88efb152eba2014c6d30357a487cafd616e18d10
                          • Instruction ID: b3e4678ffb9dae527c939fda3aba35b48a12a95a819a0055bfac3d4281ef8523
                          • Opcode Fuzzy Hash: 0898838d16f207543cc06ffe88efb152eba2014c6d30357a487cafd616e18d10
                          • Instruction Fuzzy Hash: 1881C730B042548FDB21DF2DC885B99BBF8AB4A709F0441F6E049F7382DB785A85CB59
                          APIs
                          • VirtualQuery.KERNEL32(?,?,0000001C,00000000,0041B8A8), ref: 0041B72F
                          • GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 0041B753
                          • GetModuleFileNameW.KERNEL32(MZP,?,00000105), ref: 0041B76E
                          • LoadStringW.USER32(00000000,0000FFEA,?,00000100), ref: 0041B809
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: FileModuleName$LoadQueryStringVirtual
                          • String ID: MZP
                          • API String ID: 3990497365-2889622443
                          • Opcode ID: 33485dccd570a2a0afe39b740a752237986253bc9c59ef7515bff66579f2bf26
                          • Instruction ID: c27a278696c1af428c112a5138f6c708912e0e629acd6ed950e1bdc93ff39661
                          • Opcode Fuzzy Hash: 33485dccd570a2a0afe39b740a752237986253bc9c59ef7515bff66579f2bf26
                          • Instruction Fuzzy Hash: 19411F70A002589FDB20EF65CC81BCAB7B9EB88314F0040FAE508E7281D7799E95CF59
                          APIs
                          • GetWindowTextW.USER32(?,00485D2C,00000200), ref: 0042C179
                          • IsWindowVisible.USER32(?), ref: 0042C239
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Window$TextVisible
                          • String ID: (]H$,]H$,_H
                          • API String ID: 1670992164-2296990632
                          • Opcode ID: e467966b9a8c0fefa1ccc827f78f29989ba23366127c3093c9771cb756a8b563
                          • Instruction ID: d95932ed8a37d93c08fe9a1a55fadeb8aae1f262f1f2142a84b6d5f9324e449e
                          • Opcode Fuzzy Hash: e467966b9a8c0fefa1ccc827f78f29989ba23366127c3093c9771cb756a8b563
                          • Instruction Fuzzy Hash: 7C319D31B00214AFEB01EBA1DC82EAE77B5EF48704F518477B50172191CA7D9D15972C
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,?,00465CA0,0042C023,?,00000064,00000000,00000000,0042C0D8), ref: 0042BDB6
                          • RegisterClassW.USER32(00465CD8), ref: 0042BDC6
                          • ShowWindow.USER32(?,00000001,00000000,?,00000000,00000000,0000015E,000001F4,?,?,100F0080), ref: 0042BE64
                          • SetForegroundWindow.USER32(?), ref: 0042BE6F
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Window$ClassForegroundHandleModuleRegisterShow
                          • String ID: RAT_Chat
                          • API String ID: 3776541383-1508558188
                          • Opcode ID: 3da53fab4287da6ac28a1f121945f4a6c5748e60b917b128f9c393c7511c022f
                          • Instruction ID: e3e0ff72afeb0ca95b62b861ee8d58a389ac77bdb3e2b56e9a420627b55a5118
                          • Opcode Fuzzy Hash: 3da53fab4287da6ac28a1f121945f4a6c5748e60b917b128f9c393c7511c022f
                          • Instruction Fuzzy Hash: DA211D75740B109BE710DF68EC45BA633E4EB04708F94853AF644DB3D1EBB9A804878E
                          APIs
                          • GetUserObjectInformationW.USER32(00000000,00000002,?,00000100,?,?,004328AD,?,00000000,0043294A), ref: 0040E886
                          • OpenWindowStationW.USER32(winsta0,00000000,0000037F), ref: 0040E8A8
                          • SetProcessWindowStation.USER32(00000000,?,004328AD,?,00000000,0043294A), ref: 0040E8B4
                          • OpenDesktopW.USER32(?,00000000,00000000,000001FF), ref: 0040E8CB
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: OpenStationWindow$DesktopInformationObjectProcessUser
                          • String ID: winsta0
                          • API String ID: 3539518509-3440837585
                          • Opcode ID: 159005afdda627ef5a1ff0f0402107ecf24fb7b8575005aeb33b992befac07c1
                          • Instruction ID: 07935d2aa83b5d675ff6c58e78f2920d5cf53bccb1719f4e7f0ccf1e20ed6600
                          • Opcode Fuzzy Hash: 159005afdda627ef5a1ff0f0402107ecf24fb7b8575005aeb33b992befac07c1
                          • Instruction Fuzzy Hash: 5C1124752443016FE310EBA9DC81F6B73EC6B45700F44483AB984EB3D1DAB9ED14972A
                          APIs
                            • Part of subcall function 004265CC: socket.WS2_32(00000002,00000001,00000000), ref: 004265DB
                          • htons.WS2_32(?), ref: 00426637
                          • gethostbyname.WS2_32(00000000), ref: 00426665
                          • connect.WS2_32(?,00000008,00000010), ref: 00426690
                          • WSAGetLastError.WS2_32(?,?,00000000,00000000), ref: 004266B9
                          • Sleep.KERNEL32(00000002,?,?,00000000,00000000), ref: 004266CA
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: ErrorLastSleepconnectgethostbynamehtonssocket
                          • String ID:
                          • API String ID: 2864911191-0
                          • Opcode ID: 9f28b064d525dcda550846062e3a93fcd66620e325ef5e3ebc0512ee41a5b598
                          • Instruction ID: 0dd1b41a93d19dc09989b8233b659783f6ed969359d15ac89dd0c57dc2224665
                          • Opcode Fuzzy Hash: 9f28b064d525dcda550846062e3a93fcd66620e325ef5e3ebc0512ee41a5b598
                          • Instruction Fuzzy Hash: 50319F74A002149FCB10DFA5D985A9E77B8FF48314F5284BAE904EB291D738CD44CB69
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,?,00486680,00000001,0000000F,?,00437564,00000000,00437B2F,?,00486734,00486680,00000000,00000000,?,0043F7E0), ref: 0040BA70
                          • FindResourceW.KERNEL32(00000000,00000000,0000000A,00000000,?,00486680,00000001,0000000F,?,00437564,00000000,00437B2F,?,00486734,00486680,00000000), ref: 0040BA82
                          • LoadResource.KERNEL32(00000000,00000000,00000000,0040BAD8,?,?,00486680,00000001,0000000F,?,00437564,00000000,00437B2F,?,00486734,00486680), ref: 0040BAA4
                          • LockResource.KERNEL32(00000000,?,?,00486680,00000001,0000000F,?,00437564,00000000,00437B2F,?,00486734,00486680,00000000,00000000), ref: 0040BAB1
                          • FreeResource.KERNEL32(00000000,0040BADF,00000001,0000000F,?,00437564,00000000,00437B2F,?,00486734,00486680,00000000,00000000,?,0043F7E0,00000000), ref: 0040BAD1
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Resource$FindFreeHandleLoadLockModule
                          • String ID:
                          • API String ID: 2355082082-0
                          • Opcode ID: 3f0eb233740970fe425e4189b138455d4fb9001c1d9e8dd3634329448ef4e4b8
                          • Instruction ID: 1a3ff52bf1ac6d4834992fad00352ded9c14d174eaf5e093c7de7b05a94e74d9
                          • Opcode Fuzzy Hash: 3f0eb233740970fe425e4189b138455d4fb9001c1d9e8dd3634329448ef4e4b8
                          • Instruction Fuzzy Hash: 3101F776B41304BFE701ABB9AC85B2ABBECDB89715F150436F506E3281DA799D00866C
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,?,00486680,00000001,0000000F,?,00437564,00000000,00437B2F,?,00486734,00486680,00000000,00000000,?,0043F7E0), ref: 0040BA70
                          • FindResourceW.KERNEL32(00000000,00000000,0000000A,00000000,?,00486680,00000001,0000000F,?,00437564,00000000,00437B2F,?,00486734,00486680,00000000), ref: 0040BA82
                          • LoadResource.KERNEL32(00000000,00000000,00000000,0040BAD8,?,?,00486680,00000001,0000000F,?,00437564,00000000,00437B2F,?,00486734,00486680), ref: 0040BAA4
                          • LockResource.KERNEL32(00000000,?,?,00486680,00000001,0000000F,?,00437564,00000000,00437B2F,?,00486734,00486680,00000000,00000000), ref: 0040BAB1
                          • FreeResource.KERNEL32(00000000,0040BADF,00000001,0000000F,?,00437564,00000000,00437B2F,?,00486734,00486680,00000000,00000000,?,0043F7E0,00000000), ref: 0040BAD1
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Resource$FindFreeHandleLoadLockModule
                          • String ID:
                          • API String ID: 2355082082-0
                          • Opcode ID: 42ae530f8878b1a679c5bb975ed892b2aba36b703ce15ae7888e2b82efbc6652
                          • Instruction ID: 7bba7a99e39e5116ed02c681e27dab3f3a696a6cdaaff79990abd0375f4619b6
                          • Opcode Fuzzy Hash: 42ae530f8878b1a679c5bb975ed892b2aba36b703ce15ae7888e2b82efbc6652
                          • Instruction Fuzzy Hash: 2201A2B5B41300BFE711ABB59C99B2B7AECDB49704F154436F502E3291D6B89D008A6C
                          APIs
                          • OpenFileMappingW.KERNEL32(000F001F,00000000,00000000,00000000,0042AC2E,?,?,?,00000001,0000000D,00000000,00000000,?,0042A482), ref: 0042A825
                            • Part of subcall function 0040ACA4: lstrlenW.KERNEL32(00000000,?,?,00486730,?), ref: 0040ACDD
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: FileMappingOpenlstrlen
                          • String ID: /f&TleQ $GG-Team$Hr,g:
                          • API String ID: 290263465-1553010781
                          • Opcode ID: 423f67120d0e721894976c1fa9bc8b348bc44398491a29f8b1c635831bf7f120
                          • Instruction ID: 88ff79b281bd7af9570e5b325977c4e31f3e4296546c137c43f7e8822453c311
                          • Opcode Fuzzy Hash: 423f67120d0e721894976c1fa9bc8b348bc44398491a29f8b1c635831bf7f120
                          • Instruction Fuzzy Hash: 51B1D630740629AFDB04DBA2DD41FEEB3B6FF88705F904126B500B61C1D7BC69249B9A
                          APIs
                          • lstrlenW.KERNEL32(00000000,00000000,0042716D), ref: 00426FCA
                          • CharUpperW.USER32(?,00000000,00000000,0042716D), ref: 00426FEE
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CharUpperlstrlen
                          • String ID: :$|/Is\|
                          • API String ID: 108730823-2327451341
                          • Opcode ID: ba4b3e01cebbaa481af6e6a77b06f47b08762847adc1fc8c6b2a5010666fc814
                          • Instruction ID: 93d54500de09d398291ab5124b2714aa455b2298479d6696639ba076840c05b2
                          • Opcode Fuzzy Hash: ba4b3e01cebbaa481af6e6a77b06f47b08762847adc1fc8c6b2a5010666fc814
                          • Instruction Fuzzy Hash: 24514934A041299BDB00EF99D841AEEBBB5FF48304F51807BF405B3351D7799A25CBA9
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID:
                          • String ID: ,fH
                          • API String ID: 0-2243322645
                          • Opcode ID: 444ee87d13a1e58113508bf6b43ac74097dd93d3b7794e398f154b7624a7e6a3
                          • Instruction ID: 3e325106465cb2dd41976618392b57abfc7347bc5e4f7f75e8d06feff1e239a5
                          • Opcode Fuzzy Hash: 444ee87d13a1e58113508bf6b43ac74097dd93d3b7794e398f154b7624a7e6a3
                          • Instruction Fuzzy Hash: A7414D357052409FDB01DF99C9C0FE737A4AB0A750F1801BAFE499F68AC3A898418B76
                          APIs
                          • GetCurrentThreadId.KERNEL32 ref: 00405D81
                          • FreeLibrary.KERNEL32(00400000,?,00000000,?,?,00405E86,00404023,0040406A,00000000,?,00404083,?,?,?,?,00486734), ref: 00405E22
                          • ExitProcess.KERNEL32(00000000,?,00000000,?,?,00405E86,00404023,0040406A,00000000,?,00404083,?,?,?,?,00486734), ref: 00405E5E
                            • Part of subcall function 00405CB8: GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000,?,?,00405E86,00404023,0040406A,00000000,?), ref: 00405CF1
                            • Part of subcall function 00405CB8: WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000,?,?,00405E86,00404023,0040406A,00000000), ref: 00405CF7
                            • Part of subcall function 00405CB8: GetStdHandle.KERNEL32(000000F5,00000000,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000,?), ref: 00405D12
                            • Part of subcall function 00405CB8: WriteFile.KERNEL32(00000000,000000F5,00000000,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000), ref: 00405D18
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: FileHandleWrite$CurrentExitFreeLibraryProcessThread
                          • String ID: MZP
                          • API String ID: 3490077880-2889622443
                          • Opcode ID: d90ee3a893a0dc72c3848248a1873dcb725225a210599cc20fd1a5d12a6e168f
                          • Instruction ID: e92a30f647e059f84c3662a5853805e55c155ad4ddc6fc357ea8e0081ace97c3
                          • Opcode Fuzzy Hash: d90ee3a893a0dc72c3848248a1873dcb725225a210599cc20fd1a5d12a6e168f
                          • Instruction Fuzzy Hash: 62315C34601B418BE761ABB9A48935B76E0EF45318F14483FE581A72D2D77CA884CF5E
                          APIs
                          • GetCurrentThreadId.KERNEL32 ref: 00405D81
                          • FreeLibrary.KERNEL32(00400000,?,00000000,?,?,00405E86,00404023,0040406A,00000000,?,00404083,?,?,?,?,00486734), ref: 00405E22
                          • ExitProcess.KERNEL32(00000000,?,00000000,?,?,00405E86,00404023,0040406A,00000000,?,00404083,?,?,?,?,00486734), ref: 00405E5E
                            • Part of subcall function 00405CB8: GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000,?,?,00405E86,00404023,0040406A,00000000,?), ref: 00405CF1
                            • Part of subcall function 00405CB8: WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000,?,?,00405E86,00404023,0040406A,00000000), ref: 00405CF7
                            • Part of subcall function 00405CB8: GetStdHandle.KERNEL32(000000F5,00000000,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000,?), ref: 00405D12
                            • Part of subcall function 00405CB8: WriteFile.KERNEL32(00000000,000000F5,00000000,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000), ref: 00405D18
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: FileHandleWrite$CurrentExitFreeLibraryProcessThread
                          • String ID: MZP
                          • API String ID: 3490077880-2889622443
                          • Opcode ID: 476567bd706faa08b2860b4bdb782b6af1774b5e27a4e3545c261a0e26a7b744
                          • Instruction ID: b38e6e20968f9dd51013dd86da7a5adcd4d42222583a8947ff30ec8df154a19c
                          • Opcode Fuzzy Hash: 476567bd706faa08b2860b4bdb782b6af1774b5e27a4e3545c261a0e26a7b744
                          • Instruction Fuzzy Hash: 7E316D34600B418BE760AB69E48971B76E4EF45318F14443FE580A73D2D77CA884CF5D
                          APIs
                          • MessageBoxW.USER32(00000000,Not Config,0040B610,?), ref: 0040B5FB
                          • MessageBoxW.USER32(00000000,Not Config,GGT,?), ref: 0040B606
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Message
                          • String ID: GGT$Not Config
                          • API String ID: 2030045667-3135470170
                          • Opcode ID: 4b8a4c59b1f7a2e123fa8cac472319ef520fd058445deb380fb68a97e84f0c4a
                          • Instruction ID: 09803daf9443879b7dc9e8754dbd7872eb60d7eb9ad1f4574c2174cc229b4f7d
                          • Opcode Fuzzy Hash: 4b8a4c59b1f7a2e123fa8cac472319ef520fd058445deb380fb68a97e84f0c4a
                          • Instruction Fuzzy Hash: 0FD0A9A112432875D4202A130C02DB32A2CCC917A03088C3BB90472182863BAC2040FF
                          APIs
                          • EnterCriticalSection.KERNEL32(0048664C,00000000,00439427,?,?,?,?,00000000,00000000), ref: 004392B4
                          • lstrlenW.KERNEL32(00000000,?,00439448,?,00439448,?,00439448,?,?,0048664C,00000000,00439427), ref: 00439396
                          • LeaveCriticalSection.KERNEL32(0048664C,00439404,00439427,?,?,?,?,00000000,00000000), ref: 004393F7
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterLeavelstrlen
                          • String ID: 4gH
                          • API String ID: 3224049430-2392367260
                          • Opcode ID: 47defe703287ea594ae1c07abb13b2d47f8dddb316f1a99fff683f0de99b3499
                          • Instruction ID: 4ccfdad5408f303f1bc6ef96d1109fe59f5890f2a7af6574d1485d49e1ed1b7c
                          • Opcode Fuzzy Hash: 47defe703287ea594ae1c07abb13b2d47f8dddb316f1a99fff683f0de99b3499
                          • Instruction Fuzzy Hash: 9541A031604208AFDB01EBA5CC42F9E77F8EB4D714F614076F500F72D1DAB9AE119A69
                          APIs
                          • VirtualAlloc.KERNEL32(00000000,00001400,00001000,00000004,00000000,0040B246,?,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040B123
                          • lstrlenW.KERNEL32(00000000,?,?,00000000,00001400,00001000,00000004,00000000,0040B246,?,?,00000000,00000000,00000000,00000000,00000000), ref: 0040B1DF
                          • VirtualFree.KERNEL32(00000000,00000000,00008000,0040B218,00001000,00000004,00000000,0040B246,?,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040B20B
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Virtual$AllocFreelstrlen
                          • String ID: 0.0.0.0
                          • API String ID: 1037993708-3771769585
                          • Opcode ID: 6564ce073df12d48193ef6cc336d6408e1dcfe9c11b139c9fa22ed32b664ca5a
                          • Instruction ID: d9e483307b11907a1b336cc8d58400cd9b3fb6a4ef8d040ba9d6bd8e813edc8e
                          • Opcode Fuzzy Hash: 6564ce073df12d48193ef6cc336d6408e1dcfe9c11b139c9fa22ed32b664ca5a
                          • Instruction Fuzzy Hash: DC419270A40209AFEB01EB95CC92B9E77B8EB48304F5044BAF101F72D1D778AE14DB99
                          APIs
                          • GetLogicalDriveStringsW.KERNEL32(00000202,?,00000000,00428009), ref: 00427F25
                          • QueryDosDeviceW.KERNEL32(00000000,?,?,00000072,00000202,?,00000000,00428009), ref: 00427F7B
                          • lstrlenW.KERNEL32(?,00000000,?,?,00000072,00000202,?,00000000,00428009), ref: 00427F87
                          • StrCmpNIW.SHLWAPI(?,?,00000000,?,00000000,?,?,00000072,00000202,?,00000000,00428009), ref: 00427F97
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: DeviceDriveLogicalQueryStringslstrlen
                          • String ID:
                          • API String ID: 243930641-0
                          • Opcode ID: a7e4fb706dae23cce2e3905365d5b76be73495882ece122b121f7eb275b18a5a
                          • Instruction ID: c93e83704bf87b4d3c7b7635578ed03522896ac4e1c9abb0733d05025df9e800
                          • Opcode Fuzzy Hash: a7e4fb706dae23cce2e3905365d5b76be73495882ece122b121f7eb275b18a5a
                          • Instruction Fuzzy Hash: 51318775A052189FDB60EB25DC49A9E73B8EB48300F5185FBF409E3251EE38DE548F58
                          APIs
                          • VirtualAlloc.KERNEL32(00000000,00001400,00001000,00000004,00000000,0040B246,?,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040B123
                          • lstrlenW.KERNEL32(00000000,?,?,00000000,00001400,00001000,00000004,00000000,0040B246,?,?,00000000,00000000,00000000,00000000,00000000), ref: 0040B1DF
                          • VirtualFree.KERNEL32(00000000,00000000,00008000,0040B218,00001000,00000004,00000000,0040B246,?,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040B20B
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Virtual$AllocFreelstrlen
                          • String ID: 0.0.0.0
                          • API String ID: 1037993708-3771769585
                          • Opcode ID: 95f96f50283596cd0208414d3cbcbce02a8cb6110614ffbb8205cf7f9e9816dc
                          • Instruction ID: 2a2c1df8ae4463708a3bec380d016629bdb2d6206de091ed7e9d638ff9ecaf91
                          • Opcode Fuzzy Hash: 95f96f50283596cd0208414d3cbcbce02a8cb6110614ffbb8205cf7f9e9816dc
                          • Instruction Fuzzy Hash: 4F217C70640204AFEB11EBA9C8A6B9E77A8EB49304F1044BAF501F76D1C7789950C699
                          APIs
                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0042BA43
                          • SendMessageW.USER32(?,0000000D,?,00465D1C), ref: 0042BA86
                          • SetWindowTextW.USER32(?,00000000), ref: 0042BACA
                          • SetFocus.USER32(?,?,00000000,?,?,0000000E,00000000,00000000,00000000,0042BAF0,?,00000000), ref: 0042BAD5
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: MessageSend$FocusTextWindow
                          • String ID:
                          • API String ID: 2333564098-0
                          • Opcode ID: a88227335cca2f77a9519455c1fe331fca11a6a158101077e538482d452faf54
                          • Instruction ID: c5c6d1f71d7d5abd3f140a9d873e570a62db933a69622a8a51123b3dec96c00d
                          • Opcode Fuzzy Hash: a88227335cca2f77a9519455c1fe331fca11a6a158101077e538482d452faf54
                          • Instruction Fuzzy Hash: 97112E74640704ABD710EB55FC5AB5A73F8E748704FA0883AF5009B2E1D7F9A950875D
                          APIs
                          • FreeLibrary.KERNEL32(00000000), ref: 004094F7
                          • LocalFree.KERNEL32(006EE940,00000000), ref: 00409511
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Free$LibraryLocal
                          • String ID: @n
                          • API String ID: 3007483513-632216509
                          • Opcode ID: f1440c9207516d799bff01a95fb1b780083962cb9caf534dbe967da67f6cd1a4
                          • Instruction ID: 794add6f56abb578411f7ef61ae6dacc1c24b6d74e6f65c8e1d29d9f289a045b
                          • Opcode Fuzzy Hash: f1440c9207516d799bff01a95fb1b780083962cb9caf534dbe967da67f6cd1a4
                          • Instruction Fuzzy Hash: 4731A472900105ABCB14DFA6D8C19BFB3B8AF84314B14453EE904B7382DB39DD41CBA8
                          APIs
                            • Part of subcall function 0040B948: GetEnvironmentVariableW.KERNEL32(00000000,?,00000208,004866F8,0043D0E3,00000000,0043D13A,?,00486680,00000001,00000000,00000000,?,00437AE2,?,00000000), ref: 0040B95D
                            • Part of subcall function 0040B948: GetLongPathNameW.KERNELBASE(?,?,00000208), ref: 0040B972
                            • Part of subcall function 0040ACA4: lstrlenW.KERNEL32(00000000,?,?,00486730,?), ref: 0040ACDD
                          • PathFileExistsW.SHLWAPI(00000000,?,?,00000000,00000000,Temp,?,00000000,0040B377,?,?,00486680,00000000,00000000,00000000,00000000), ref: 0040B31D
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Path$EnvironmentExistsFileLongNameVariablelstrlen
                          • String ID: Temp$Temp
                          • API String ID: 2856746939-245102275
                          • Opcode ID: fc830c92589ad5342fd4e66cf01ed2c17b86b29a44920e7f029c1e3a9a43f651
                          • Instruction ID: 46c15489f3eb44522c785d134b2f827a4a98169e1fe77a71831a75c28b8f49eb
                          • Opcode Fuzzy Hash: fc830c92589ad5342fd4e66cf01ed2c17b86b29a44920e7f029c1e3a9a43f651
                          • Instruction Fuzzy Hash: 46215A70A00119AFDB01EBA1CC52DBFB7B9EF84304B61C47BB941B3690D77C9D1196A8
                          APIs
                            • Part of subcall function 0040B948: GetEnvironmentVariableW.KERNEL32(00000000,?,00000208,004866F8,0043D0E3,00000000,0043D13A,?,00486680,00000001,00000000,00000000,?,00437AE2,?,00000000), ref: 0040B95D
                            • Part of subcall function 0040B948: GetLongPathNameW.KERNELBASE(?,?,00000208), ref: 0040B972
                            • Part of subcall function 0040ACA4: lstrlenW.KERNEL32(00000000,?,?,00486730,?), ref: 0040ACDD
                          • PathFileExistsW.SHLWAPI(00000000,?,?,00000000,00000000,Temp,?,00000000,0040B498,?,?,00486680,00000000,00000000,00000000,00000000), ref: 0040B43E
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Path$EnvironmentExistsFileLongNameVariablelstrlen
                          • String ID: Temp$Temp
                          • API String ID: 2856746939-245102275
                          • Opcode ID: 7237d7c97321785c44f2b4371a02576726028b20681e666b8d51949dfb1120e9
                          • Instruction ID: 320bcaab7f7199f54f19ef5aa5192f16669c5e948fce9d3d7dddb2f051f29b96
                          • Opcode Fuzzy Hash: 7237d7c97321785c44f2b4371a02576726028b20681e666b8d51949dfb1120e9
                          • Instruction Fuzzy Hash: 46215D70A001196FDB01EBA1CC51D6FB7B9EF84704F21C477B501B3295D77C9A1596A8
                          APIs
                            • Part of subcall function 0040ACA4: lstrlenW.KERNEL32(00000000,?,?,00486730,?), ref: 0040ACDD
                          • OpenFileMappingW.KERNEL32(000F001F,00000000,00000000,00000000,00000000,00000000,0042A3BA,?,00486734,00486680,00000000,?,00437ED9,?,00000000,00437F69), ref: 0042A356
                          • InitializeCriticalSection.KERNEL32(00465C80,?,00486734,00486680,00000000,?,00437ED9,?,00000000,00437F69,?,00000000,00000000,00000000,?,0043FD1C), ref: 0042A39F
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CriticalFileInitializeMappingOpenSectionlstrlen
                          • String ID: _Share_GGT_
                          • API String ID: 3694923735-3867152089
                          • Opcode ID: 41f1d88d2d1c4f0c2cb4bbf11ab129d5343994423090c7a276e01615e93b37f1
                          • Instruction ID: ce4900a62e11ce9a572bac5c0a59808664cb2c3850396779e9c8bc1c065c1da5
                          • Opcode Fuzzy Hash: 41f1d88d2d1c4f0c2cb4bbf11ab129d5343994423090c7a276e01615e93b37f1
                          • Instruction Fuzzy Hash: F3118674740310AFE710EB69DC42F2A73D9EB49B18FA1443BFD01E76D1D9B85C24865A
                          APIs
                          • LoadLibraryW.KERNEL32(00000000,00000000,004274B0,?,?,00486680,00000000,00000000,?,0043F226,?,00486734,00486680,00000000,00000000,00000000), ref: 00427469
                            • Part of subcall function 0040ADB8: lstrlenW.KERNEL32(00000000,?,?,00486734,00486680,00425F2B,00000000,00426187,?,00486680,00000000,00000000,?,0043F7A0,00000000,0043FD8B), ref: 0040ADD7
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,?), ref: 0040A4D0
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProclstrlen
                          • String ID: ZAO`elFyl{h}`fg^$zalee:;'MEE
                          • API String ID: 2991167014-1447228337
                          • Opcode ID: c820523d15c9dbf95b80c6cde00e35f83b407bfca9d4687b59677f06df80f873
                          • Instruction ID: 077bc46651e9a40de25fcd03cddb1c768f49804e1acef1ba0aff0074e990fe41
                          • Opcode Fuzzy Hash: c820523d15c9dbf95b80c6cde00e35f83b407bfca9d4687b59677f06df80f873
                          • Instruction Fuzzy Hash: FAF0C231605718ABD711FBA1DC02B5DBBACEF45718FD2407AF800B7681D67CAE1046AD
                          APIs
                          • PostMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 0043042A
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: MessagePost
                          • String ID: #32770$Button
                          • API String ID: 410705778-3763930512
                          • Opcode ID: 80110679f937891faa6f7cba931e5fed77503df53b31854cfd618e18af252cd2
                          • Instruction ID: 28ed841a6425ce2d44e84357510c75fb6cb91fbfeaac2ff36796f76db45616d3
                          • Opcode Fuzzy Hash: 80110679f937891faa6f7cba931e5fed77503df53b31854cfd618e18af252cd2
                          • Instruction Fuzzy Hash: F3E086743C13026FE62097588CE6F1A63A85739B04F246176B700FB2E0CEE8EE14D61C
                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,00486680,0043F20A,00000001,00000000,?,00486734,00486680,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040B4E5
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,?), ref: 0040A4D0
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                          • API String ID: 1646373207-3689287502
                          • Opcode ID: 2dac5d5c5663db8a0450eab5fd166fe870256cbb9f231f614ab9bd4640426b9f
                          • Instruction ID: 2aacd0a7d080d4f8486dfed4c2e02e9ea53df2493b021d7d88a6b83d7c6298d6
                          • Opcode Fuzzy Hash: 2dac5d5c5663db8a0450eab5fd166fe870256cbb9f231f614ab9bd4640426b9f
                          • Instruction Fuzzy Hash: 26C0129231272439E50071F91CC6EF7028CC9453AE31004B3F900F11C2E7AC4D2011EE
                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,00486680,0043F3D6,00000000,?,00486734,00486680,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040B56D
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,?), ref: 0040A4D0
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                          • API String ID: 1646373207-1355242751
                          • Opcode ID: 95d41de4b2aaa3d5bceb4c6ece1da09edf5c32e92841572d0be30113edd33b41
                          • Instruction ID: 8249db6378fdea734a8c5b5c79ccac93c87cf519fdf57918cf521f3dbb983d50
                          • Opcode Fuzzy Hash: 95d41de4b2aaa3d5bceb4c6ece1da09edf5c32e92841572d0be30113edd33b41
                          • Instruction Fuzzy Hash: 5CC002963563243DE65172F51CC69EB528CC9557AE36408B7FD00F11C3E7AD4D2111ED
                          APIs
                          • LoadLibraryW.KERNEL32(ntdll.dll,00000000,00000000,00000000,0043E626), ref: 0043E4B0
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,?), ref: 0040A4D0
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: NtUnmapViewOfSection$ntdll.dll
                          • API String ID: 2574300362-1050664331
                          • Opcode ID: 31b82d30f3ad7dba5dbea5cdbf4706ed8ff0013fde9a1af21a2c0f08b4647315
                          • Instruction ID: 4e69b6650e6ade436c82b191c502fd32af055e20bfb3fd8e8d0f99f71a318bac
                          • Opcode Fuzzy Hash: 31b82d30f3ad7dba5dbea5cdbf4706ed8ff0013fde9a1af21a2c0f08b4647315
                          • Instruction Fuzzy Hash: 05C012523036103A911031E71C86D6B454CCCEAAB53105037B514E2182D4AC4C114179
                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,00443377,00000000,004433AE), ref: 0041D23E
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,?), ref: 0040A4D0
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.1956259311.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.1956259311.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000D.00000002.1956259311.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: GetDiskFreeSpaceExW$kernel32.dll
                          • API String ID: 1646373207-1127948838
                          • Opcode ID: a79e509d4b5e1b93e5af0388efdb664cba8b92b54a70f921204110405e308a7a
                          • Instruction ID: 1ed0fb5f9b62a531acb68cd7a06d8274aa2f261e9248045f22735aa701152202
                          • Opcode Fuzzy Hash: a79e509d4b5e1b93e5af0388efdb664cba8b92b54a70f921204110405e308a7a
                          • Instruction Fuzzy Hash: 80D0A9F8E423604ED700EBE09DC6B823798879A308F0000BBB02057283CBBCC89C820C

                          Execution Graph

                          Execution Coverage:4.8%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:0%
                          Total number of Nodes:2000
                          Total number of Limit Nodes:30
                          execution_graph 15619 402ac0 15620 402d20 15619->15620 15626 402ad8 15619->15626 15621 402e38 15620->15621 15622 402ce4 15620->15622 15623 402e41 15621->15623 15624 402868 VirtualAlloc 15621->15624 15627 402d3e 15622->15627 15631 402cfe Sleep 15622->15631 15628 4028a3 15624->15628 15629 402893 15624->15629 15625 402aea 15630 402af9 15625->15630 15633 402bd8 15625->15633 15637 402bb9 Sleep 15625->15637 15626->15625 15635 402b75 Sleep 15626->15635 15638 4027a8 VirtualAlloc 15627->15638 15639 402d5c 15627->15639 15643 402820 15629->15643 15631->15627 15634 402d14 Sleep 15631->15634 15642 402be4 15633->15642 15648 4027a8 15633->15648 15634->15622 15635->15625 15636 402b8b Sleep 15635->15636 15636->15626 15637->15633 15641 402bcf Sleep 15637->15641 15638->15639 15641->15625 15644 402866 15643->15644 15646 402829 15643->15646 15644->15628 15645 402834 Sleep 15645->15646 15646->15644 15646->15645 15647 40284d Sleep 15646->15647 15647->15646 15652 40273c 15648->15652 15650 4027b0 VirtualAlloc 15651 4027c7 15650->15651 15651->15642 15653 4026dc 15652->15653 15653->15650 15654 408f10 GetSystemInfo 15655 43a870 15656 43a896 15655->15656 15679 43a7b4 CreateFileW 15656->15679 15658 43a89e 15678 43a96a 15658->15678 15683 40adb8 15658->15683 15661 43a8b1 15690 4063e8 15661->15690 15663 406060 12 API calls 15665 43a997 15663->15665 15668 43a8d3 15670 40ad0c 12 API calls 15668->15670 15673 43a912 15668->15673 15668->15678 15669 40ad0c 12 API calls 15674 43a931 15669->15674 15671 43a905 15670->15671 15705 4063a0 15671->15705 15673->15669 15673->15678 15675 40ad0c 12 API calls 15674->15675 15674->15678 15676 43a95d 15675->15676 15677 4063a0 12 API calls 15676->15677 15677->15678 15711 406060 15678->15711 15680 43a7e6 15679->15680 15682 43a83a 15679->15682 15680->15682 15715 4069a8 15680->15715 15682->15658 15684 40adc4 15683->15684 15685 40adcd 15683->15685 15802 406000 15684->15802 15688 40add4 lstrlenW 15685->15688 15687 40adcb 15687->15661 15689 4069a8 12 API calls 15688->15689 15689->15687 15692 4063ec 15690->15692 15691 406410 15694 40ad0c 15691->15694 15692->15691 15693 403f50 12 API calls 15692->15693 15693->15691 15695 40ad3c 15694->15695 15696 40ad80 15695->15696 15697 40ad51 15695->15697 15698 4063a0 12 API calls 15696->15698 15806 406bf0 15697->15806 15701 40ad77 15698->15701 15703 406000 12 API calls 15701->15703 15704 40ada6 15703->15704 15704->15668 15706 4063a4 15705->15706 15709 4063b4 15705->15709 15708 405f54 12 API calls 15706->15708 15706->15709 15707 4063e4 15707->15673 15708->15709 15709->15707 15710 403f50 12 API calls 15709->15710 15710->15707 15713 406066 15711->15713 15712 40608c 15712->15663 15713->15712 15714 403f50 12 API calls 15713->15714 15714->15713 15719 4069b5 15715->15719 15721 4069ff 15715->15721 15716 4069f3 15735 405f54 15716->15735 15717 406024 12 API calls 15725 4069f0 15717->15725 15719->15716 15720 4069cd 15719->15720 15726 403f68 15720->15726 15721->15717 15723 4069d5 15723->15725 15731 406024 15723->15731 15725->15682 15728 403f6e 15726->15728 15728->15723 15730 403f80 15728->15730 15740 404024 15728->15740 15730->15723 15732 406045 15731->15732 15733 40602a 15731->15733 15732->15725 15733->15732 15792 403f50 15733->15792 15736 405f8c 15735->15736 15737 405f58 15735->15737 15736->15721 15737->15736 15797 403f34 15737->15797 15739 405f67 15739->15721 15741 404036 15740->15741 15742 404049 15741->15742 15746 4090b0 15741->15746 15754 404018 15742->15754 15747 4090e5 TlsGetValue 15746->15747 15748 4090bf 15746->15748 15749 4090ca 15747->15749 15750 4090ef 15747->15750 15748->15742 15757 40906c 15749->15757 15750->15742 15753 4090de 15753->15742 15755 405e7c 12 API calls 15754->15755 15756 404023 15755->15756 15756->15723 15758 409072 15757->15758 15759 40908b 15758->15759 15766 4090a0 TlsGetValue 15758->15766 15767 405e88 15758->15767 15770 409058 LocalAlloc 15759->15770 15762 409092 15763 4090a2 TlsSetValue 15762->15763 15764 409096 15762->15764 15763->15766 15765 405e88 11 API calls 15764->15765 15765->15766 15766->15753 15771 405e7c 15767->15771 15770->15762 15774 405d50 15771->15774 15775 405d67 15774->15775 15778 405d71 15774->15778 15784 405cb8 15775->15784 15776 405d81 GetCurrentThreadId 15780 405d8e 15776->15780 15778->15776 15778->15780 15779 403fd8 9 API calls 15779->15780 15780->15779 15781 405e21 FreeLibrary 15780->15781 15782 405e49 ExitProcess 15780->15782 15781->15780 15785 405cc2 GetStdHandle WriteFile 15784->15785 15786 405d1f 15784->15786 15790 406654 15785->15790 15787 405d28 MessageBoxA 15786->15787 15788 405d3b 15786->15788 15787->15788 15788->15778 15791 405d0f GetStdHandle WriteFile 15790->15791 15791->15778 15793 403f54 15792->15793 15794 403f5e 15792->15794 15793->15794 15795 404024 12 API calls 15793->15795 15794->15732 15796 404083 15795->15796 15796->15732 15801 403f38 15797->15801 15798 404024 12 API calls 15799 404083 15798->15799 15799->15739 15800 403f42 15800->15739 15801->15739 15801->15798 15801->15800 15803 406021 15802->15803 15804 406006 15802->15804 15803->15687 15804->15803 15805 403f50 12 API calls 15804->15805 15805->15803 15807 406bfb 15806->15807 15815 406158 15807->15815 15810 406c38 15820 4064b8 15810->15820 15812 406c8e 15812->15701 15813 406c48 15813->15812 15814 4069a8 12 API calls 15813->15814 15814->15812 15816 405f54 12 API calls 15815->15816 15817 406168 15816->15817 15818 406024 12 API calls 15817->15818 15819 406182 15818->15819 15819->15810 15821 4064be 15820->15821 15823 4064f3 15820->15823 15822 405f54 12 API calls 15821->15822 15821->15823 15824 4064cf 15822->15824 15823->15813 15824->15823 15825 403f50 12 API calls 15824->15825 15825->15823 15826 43d9b0 15827 43d9f2 15826->15827 15828 43d9d0 15826->15828 15848 40a748 15827->15848 15831 43d9e2 15828->15831 15832 43db1c 15828->15832 15835 43d9ed 15828->15835 15830 43da1e 15833 40a748 CreateWindowExW 15830->15833 15834 43db3d DefWindowProcW 15831->15834 15831->15835 15841 43db15 15831->15841 15862 43dd80 UnregisterClassW 15832->15862 15836 43da4f 15833->15836 15837 406000 12 API calls 15834->15837 15835->15834 15839 4063e8 12 API calls 15836->15839 15840 43db69 15837->15840 15842 43da67 15839->15842 15852 43d87c 15841->15852 15845 43da7d SetWindowTextW 15842->15845 15846 406000 12 API calls 15845->15846 15847 43da9c 15846->15847 15864 404348 15848->15864 15850 40a75b CreateWindowExW 15851 40a795 15850->15851 15851->15830 15853 43d885 15852->15853 15853->15853 15854 43d88f SendMessageW 15853->15854 15855 43d8d1 15854->15855 15856 43d8d6 SendMessageW 15854->15856 15855->15856 15860 43d90b 15856->15860 15857 43d96b SetFocus 15858 406060 12 API calls 15857->15858 15859 43d993 15858->15859 15859->15834 15860->15857 15865 43ddc4 15860->15865 15863 43dd9f 15862->15863 15863->15835 15864->15850 15866 43ddd8 15865->15866 15867 43df3d 15865->15867 15868 43ddf3 15866->15868 15869 43de19 ShowWindow 15866->15869 15867->15857 15868->15867 15870 43de51 SetForegroundWindow SetForegroundWindow SetFocus 15868->15870 15869->15868 15871 43de6e SendMessageW 15870->15871 15871->15871 15873 43de80 15871->15873 15872 43dec7 15872->15867 15874 43decd Sleep 15872->15874 15873->15872 15875 43dea1 SendMessageW 15873->15875 15876 43deb4 SendMessageW 15873->15876 15877 43deee SetForegroundWindow SetFocus SendMessageW 15874->15877 15875->15873 15876->15873 15878 43df12 15877->15878 15878->15867 15879 43df22 SendMessageW 15878->15879 15879->15867 15879->15879 15880 407744 15881 407754 GetModuleFileNameW 15880->15881 15882 407770 15880->15882 15884 4089bc GetModuleFileNameW 15881->15884 15885 408a0a 15884->15885 15894 408898 15885->15894 15887 408a36 15888 408a50 15887->15888 15889 408a48 LoadLibraryExW 15887->15889 15890 406060 12 API calls 15888->15890 15889->15888 15891 408a6d 15890->15891 15892 406000 12 API calls 15891->15892 15893 408a75 15892->15893 15893->15882 15895 4088b9 15894->15895 15896 406000 12 API calls 15895->15896 15897 4088d6 15896->15897 15898 4063e8 12 API calls 15897->15898 15910 408941 15897->15910 15900 4088eb 15898->15900 15899 406060 12 API calls 15901 4089ae 15899->15901 15904 406bf0 12 API calls 15900->15904 15905 40891c 15900->15905 15901->15887 15904->15905 15920 4085d4 15905->15920 15906 408943 GetUserDefaultUILanguage 15940 407f84 EnterCriticalSection 15906->15940 15907 408934 15928 408700 15907->15928 15910->15899 15912 408700 14 API calls 15913 40895d 15912->15913 15914 408985 15913->15914 15915 40896b GetSystemDefaultUILanguage 15913->15915 15914->15910 15965 4087cc 15914->15965 15917 407f84 29 API calls 15915->15917 15918 408978 15917->15918 15919 408700 14 API calls 15918->15919 15919->15914 15921 4085f6 15920->15921 15924 408608 15920->15924 15983 4082b8 15921->15983 15923 408600 16009 408638 15923->16009 15926 406000 12 API calls 15924->15926 15927 40862a 15926->15927 15927->15906 15927->15907 15929 40871e 15928->15929 15930 406000 12 API calls 15929->15930 15938 40873b 15930->15938 15931 408799 15932 406000 12 API calls 15931->15932 15933 4087a0 15932->15933 15934 406060 12 API calls 15933->15934 15935 4087ba 15934->15935 15935->15910 15936 406bf0 12 API calls 15936->15938 15938->15931 15938->15933 15938->15936 16032 406a80 15938->16032 16055 408694 15938->16055 15941 407fd0 LeaveCriticalSection 15940->15941 15942 407fb0 15940->15942 15943 406000 12 API calls 15941->15943 15945 407fc1 LeaveCriticalSection 15942->15945 15944 407fe1 IsValidLocale 15943->15944 15946 407ff0 15944->15946 15947 40803f EnterCriticalSection 15944->15947 15948 408072 15945->15948 15949 408004 15946->15949 15950 407ff9 15946->15950 15954 408057 15947->15954 15952 406000 12 API calls 15948->15952 16081 407c6c 15949->16081 16062 407e68 GetThreadUILanguage 15950->16062 15956 408087 15952->15956 15958 408068 LeaveCriticalSection 15954->15958 15956->15912 15958->15948 15959 408017 15960 408028 GetSystemDefaultUILanguage 15959->15960 16093 406a28 15959->16093 15962 407c6c 15 API calls 15960->15962 15963 408035 15962->15963 15964 406a28 12 API calls 15963->15964 15964->15947 16138 4060e4 15965->16138 15968 40881c 15969 406a80 12 API calls 15968->15969 15970 408829 15969->15970 15971 408694 14 API calls 15970->15971 15974 408830 15971->15974 15972 408869 15973 406060 12 API calls 15972->15973 15975 408883 15973->15975 15974->15972 15976 406a80 12 API calls 15974->15976 15977 406000 12 API calls 15975->15977 15978 408857 15976->15978 15979 40888b 15977->15979 15980 408694 14 API calls 15978->15980 15979->15910 15981 40885e 15980->15981 15981->15972 15982 406000 12 API calls 15981->15982 15982->15972 15984 4082cf 15983->15984 15985 4082e3 GetModuleFileNameW 15984->15985 15986 4082f8 15984->15986 15985->15986 15987 408320 RegOpenKeyExW 15986->15987 15988 4084c7 15986->15988 15989 4083e1 15987->15989 15990 408347 RegOpenKeyExW 15987->15990 15993 406000 12 API calls 15988->15993 16016 4080c8 GetModuleHandleW 15989->16016 15990->15989 15991 408365 RegOpenKeyExW 15990->15991 15991->15989 15994 408383 RegOpenKeyExW 15991->15994 15996 4084dc 15993->15996 15994->15989 15997 4083a1 RegOpenKeyExW 15994->15997 15995 4083ff RegQueryValueExW 15998 408450 RegQueryValueExW 15995->15998 15999 40841d 15995->15999 15996->15923 15997->15989 16000 4083bf RegOpenKeyExW 15997->16000 16002 40846c 15998->16002 16007 40844e 15998->16007 16001 403f34 12 API calls 15999->16001 16000->15988 16000->15989 16003 408425 RegQueryValueExW 16001->16003 16004 403f34 12 API calls 16002->16004 16003->16007 16006 408474 RegQueryValueExW 16004->16006 16005 4084b6 RegCloseKey 16005->15923 16006->16007 16007->16005 16008 403f50 12 API calls 16007->16008 16008->16005 16010 408645 16009->16010 16011 40864f 16009->16011 16012 403f50 12 API calls 16010->16012 16013 408688 16011->16013 16014 403f34 12 API calls 16011->16014 16012->16011 16013->15924 16015 40866a 16014->16015 16015->15924 16017 4080f0 GetProcAddress 16016->16017 16018 408101 16016->16018 16017->16018 16022 408117 16018->16022 16026 408163 16018->16026 16028 4080a4 16018->16028 16021 4080a4 CharNextW 16021->16026 16022->15995 16023 4080a4 CharNextW 16023->16026 16024 4081e8 FindFirstFileW 16024->16022 16025 408204 FindClose lstrlenW 16024->16025 16025->16022 16025->16026 16026->16022 16026->16023 16026->16024 16027 408252 lstrlenW 16026->16027 16027->16026 16029 4080b2 16028->16029 16030 4080c0 16029->16030 16031 4080aa CharNextW 16029->16031 16030->16021 16030->16022 16031->16029 16033 406a84 16032->16033 16042 406a28 16032->16042 16034 4063a0 16033->16034 16036 406aa2 16033->16036 16037 406a94 16033->16037 16033->16042 16039 405f54 12 API calls 16034->16039 16041 4063b4 16034->16041 16035 4063e4 16035->15938 16040 406b00 16036->16040 16043 405f54 12 API calls 16036->16043 16038 4063a0 12 API calls 16037->16038 16038->16042 16039->16041 16040->16040 16041->16035 16045 403f50 12 API calls 16041->16045 16042->16034 16044 406a36 16042->16044 16046 406a77 16042->16046 16051 406abc 16043->16051 16044->16046 16047 406a51 16044->16047 16048 406a6c 16044->16048 16045->16035 16046->15938 16049 4069a8 12 API calls 16047->16049 16050 4069a8 12 API calls 16048->16050 16052 406a56 16049->16052 16050->16052 16053 4063a0 12 API calls 16051->16053 16052->15938 16054 406aee 16053->16054 16054->15938 16056 4086a9 16055->16056 16057 4086c6 FindFirstFileW 16056->16057 16058 4086d6 FindClose 16057->16058 16059 4086dc 16057->16059 16058->16059 16060 406000 12 API calls 16059->16060 16061 4086f1 16060->16061 16061->15938 16063 407e84 16062->16063 16064 407edd 16062->16064 16107 407e24 GetThreadPreferredUILanguages 16063->16107 16066 407e24 14 API calls 16064->16066 16073 407ee5 16066->16073 16068 407f26 16069 407f7c 16068->16069 16070 407f2c SetThreadPreferredUILanguages 16068->16070 16069->15947 16072 407e24 14 API calls 16070->16072 16074 407f42 16072->16074 16073->16068 16075 403f50 12 API calls 16073->16075 16076 407f5d SetThreadPreferredUILanguages 16074->16076 16077 407f6d 16074->16077 16075->16068 16076->16077 16078 403f50 12 API calls 16077->16078 16079 407f74 16078->16079 16080 403f50 12 API calls 16079->16080 16080->16069 16082 406000 12 API calls 16081->16082 16086 407ca7 16082->16086 16083 407cfd 16084 407d10 IsValidLocale 16083->16084 16085 407db3 16083->16085 16084->16085 16087 407d23 GetLocaleInfoW GetLocaleInfoW 16084->16087 16088 406060 12 API calls 16085->16088 16086->16083 16112 407b8c 16086->16112 16091 407d5e 16087->16091 16089 407dd0 GetSystemDefaultUILanguage 16088->16089 16089->15947 16089->15959 16125 406b08 16091->16125 16094 406a2c 16093->16094 16096 406a77 16093->16096 16095 4063a0 16094->16095 16097 406a36 16094->16097 16101 405f54 12 API calls 16095->16101 16104 4063b4 16095->16104 16096->15960 16097->16096 16098 406a51 16097->16098 16099 406a6c 16097->16099 16102 4069a8 12 API calls 16098->16102 16103 4069a8 12 API calls 16099->16103 16100 4063e4 16100->15960 16101->16104 16106 406a56 16102->16106 16103->16106 16104->16100 16105 403f50 12 API calls 16104->16105 16105->16100 16106->15960 16108 407e45 16107->16108 16109 407e5e SetThreadPreferredUILanguages 16107->16109 16110 403f34 12 API calls 16108->16110 16109->16064 16111 407e4e GetThreadPreferredUILanguages 16110->16111 16111->16109 16113 407bb2 16112->16113 16114 4063e8 12 API calls 16113->16114 16115 407c34 16113->16115 16116 407bde 16114->16116 16118 406060 12 API calls 16115->16118 16117 406000 12 API calls 16116->16117 16121 407be5 16117->16121 16119 407c4e 16118->16119 16119->16083 16120 406b08 12 API calls 16120->16121 16121->16115 16121->16120 16123 406bf0 12 API calls 16121->16123 16124 4063e8 12 API calls 16121->16124 16134 407b20 16121->16134 16123->16121 16124->16121 16126 406b1e 16125->16126 16127 406b69 16126->16127 16128 406b4b 16126->16128 16131 406ba3 16126->16131 16130 405f54 12 API calls 16127->16130 16129 4069a8 12 API calls 16128->16129 16132 406b59 16129->16132 16130->16132 16132->16131 16133 4063a0 12 API calls 16132->16133 16133->16131 16135 407b30 16134->16135 16136 406000 12 API calls 16135->16136 16137 407b7b 16136->16137 16137->16121 16139 4060e8 GetUserDefaultUILanguage GetLocaleInfoW 16138->16139 16139->15968 16140 4433fc 16141 443404 16140->16141 16141->16141 16148 4090fc GetModuleHandleW 16141->16148 16143 443417 16152 43f770 16143->16152 16149 409137 16148->16149 16348 405a8c 16149->16348 16153 43f778 16152->16153 16153->16153 16833 425f00 16153->16833 16157 43f7a5 16909 40bde8 16157->16909 16162 43f7ba 17447 40b654 GetModuleHandleW 16162->17447 16167 43f7cd 16168 4063a0 12 API calls 16167->16168 16169 43f7db 16168->16169 17466 437530 16169->17466 16172 43f803 17592 43f5a0 16172->17592 16173 43f7e4 GetForegroundWindow 17587 40b5e8 16173->17587 16178 43f811 16181 406a80 12 API calls 16178->16181 16182 43f823 16181->16182 16183 406a80 12 API calls 16182->16183 16184 43f835 16183->16184 16185 406a80 12 API calls 16184->16185 16186 43f847 16185->16186 16187 406a80 12 API calls 16186->16187 16188 43f859 16187->16188 16189 406a80 12 API calls 16188->16189 16190 43f86b 16189->16190 16191 406a80 12 API calls 16190->16191 16192 43f87d 16191->16192 17609 40b948 GetEnvironmentVariableW GetLongPathNameW 16192->17609 16194 43f88d 16195 406a80 12 API calls 16194->16195 16196 43f8a0 16195->16196 16197 40b7c0 GetModuleFileNameW 16196->16197 16198 43f8ab 16197->16198 16199 4063a0 12 API calls 16198->16199 16200 43f8b9 16199->16200 17611 43f440 16200->17611 16204 43f8e4 16205 43f8ea 16204->16205 16206 43f8fd 16204->16206 16207 4063a0 12 API calls 16205->16207 17650 40b918 16206->17650 16211 43f8f8 16207->16211 16209 43f8c3 16209->16204 17645 43a34c 16209->17645 16215 43e9c4 14 API calls 16211->16215 16212 43f90b 16214 43fa40 16212->16214 16216 40b918 CompareStringW 16212->16216 16217 40b918 CompareStringW 16214->16217 16218 43fca3 16215->16218 16220 43f91e 16216->16220 16221 43fa4e 16217->16221 16222 43fcb2 16218->16222 17869 43ee98 16218->17869 16220->16214 16224 40b918 CompareStringW 16220->16224 16221->16211 17810 43a2cc 16221->17810 16229 43a34c CreateMutexW 16222->16229 16226 43f934 16224->16226 16226->16214 16227 43f93c 16226->16227 17653 428590 16227->17653 16228 43fa89 16231 43fa93 16228->16231 16232 43fb4e 16228->16232 16233 43fcc5 16229->16233 16241 43a34c CreateMutexW 16231->16241 16232->16211 16240 40b918 CompareStringW 16232->16240 16236 43fcec 16233->16236 17883 437e1c 16233->17883 16235 43fa60 16235->16228 17817 43d50c ExitProcess 16235->17817 17889 437e38 16236->17889 16237 40adb8 13 API calls 16270 43f951 16237->16270 16244 43fb69 16240->16244 16246 43faa6 16241->16246 16244->16211 16249 43fb71 16244->16249 16252 43fab1 16246->16252 16253 43faaa 16246->16253 16247 43fcee 16250 43fcf2 16247->16250 16251 43fcfe 16247->16251 17837 40b4dc GetModuleHandleW 16249->17837 16259 43e060 13 API calls 16250->16259 16260 43fd10 16251->16260 16261 43fd04 16251->16261 16257 43e9c4 14 API calls 16252->16257 17818 43d50c ExitProcess 16253->17818 16254 43fce2 17886 43e060 16254->17886 16266 43fab6 16257->16266 16259->16236 16269 43e060 13 API calls 16260->16269 16268 43e060 13 API calls 16261->16268 16272 43faef 16266->16272 16280 43faba 16266->16280 16268->16236 16269->16236 16273 43f982 16270->16273 17688 43d5d4 16270->17688 17820 43edd8 16272->17820 17707 43d72c 16273->17707 16275 43fc32 17866 40b564 GetModuleHandleW 16275->17866 16303 43e810 18 API calls 16280->16303 16282 43f987 16288 43f98b 16282->16288 16289 43f99a 16282->16289 16287 40adb8 13 API calls 16295 43fba6 16287->16295 16296 43dd30 ShowWindow 16288->16296 16297 43f9b8 16289->16297 17721 43f64c 16289->17721 16290 43fbdf 16293 43e9c4 14 API calls 16290->16293 16291 43f973 17705 43dd30 ShowWindow 16291->17705 16299 43fbe4 16293->16299 17844 42847c 16295->17844 16305 43f990 16296->16305 16300 43f9be 16297->16300 16301 43f9cd 16297->16301 16310 43fc34 16299->16310 16311 43fbe8 16299->16311 17737 43f11c 16300->17737 16314 43f11c 41 API calls 16301->16314 16315 43fadb 16303->16315 16316 43dd80 UnregisterClassW 16305->16316 16307 43fbb1 16307->16290 16330 43fbbd Sleep 16307->16330 17850 43a454 16307->17850 16309 43dd80 UnregisterClassW 16318 43f97d 16309->16318 16319 43edd8 15 API calls 16310->16319 17854 43ebac 16311->17854 16340 43f9d8 16314->16340 16315->16211 17819 43d50c ExitProcess 16315->17819 16316->16318 16325 43fc47 16319->16325 17858 43ec2c 16325->17858 16330->16307 16335 43faea 16335->16211 16344 43fbfb 16344->16275 16349 405ac4 16348->16349 16352 405a20 16349->16352 16353 405a68 16352->16353 16354 405a30 16352->16354 16353->16143 16354->16353 16356 443318 16354->16356 16357 4433a0 16356->16357 16358 443332 16356->16358 16357->16354 16372 405b8c 16358->16372 16360 44335e 16378 408ab4 16360->16378 16361 44333c 16361->16360 16362 4063a0 12 API calls 16361->16362 16362->16360 16366 443372 16383 41d238 GetModuleHandleW 16366->16383 16369 4085d4 31 API calls 16370 443383 16369->16370 16387 41cc28 16370->16387 16373 405b98 16372->16373 16377 405bc9 16373->16377 16397 405ad4 16373->16397 16402 405b28 16373->16402 16407 405b78 16373->16407 16377->16361 16379 403f34 12 API calls 16378->16379 16380 408ac1 16379->16380 16381 41c9bc GetVersionExW 16380->16381 16382 41c9d3 16381->16382 16382->16366 16384 41d254 16383->16384 16385 41d249 16383->16385 16384->16369 16424 40a4ac 16385->16424 16388 41cc30 16387->16388 16388->16388 16431 41cb94 GetThreadLocale 16388->16431 16394 41cc71 16520 406ee4 16394->16520 16410 408e5c 16397->16410 16399 405af7 16400 406000 12 API calls 16399->16400 16401 405b1b 16400->16401 16401->16373 16403 408e5c 58 API calls 16402->16403 16404 405b4b 16403->16404 16405 406000 12 API calls 16404->16405 16406 405b6a 16405->16406 16406->16373 16408 408e5c 58 API calls 16407->16408 16409 405b87 16408->16409 16409->16373 16411 408e64 16410->16411 16412 408eb1 16411->16412 16416 40778c 16411->16416 16412->16399 16415 406158 12 API calls 16415->16412 16418 40779b 16416->16418 16419 4077b1 LoadStringW 16416->16419 16418->16419 16420 407744 16418->16420 16419->16415 16421 407754 GetModuleFileNameW 16420->16421 16422 407770 16420->16422 16423 4089bc 56 API calls 16421->16423 16422->16419 16423->16422 16425 40a4ce GetProcAddress 16424->16425 16426 40a4d9 16424->16426 16427 40a4f9 16425->16427 16430 40a4f0 GetProcAddress 16426->16430 16428 406024 12 API calls 16427->16428 16429 40a50e 16428->16429 16429->16384 16430->16427 16432 41cbbf 16431->16432 16433 41cc00 16432->16433 16524 41cb38 GetCPInfo 16432->16524 16435 41a870 16433->16435 16436 41a878 16435->16436 16436->16436 16437 41a87f IsValidLocale 16436->16437 16438 41a8a0 GetThreadLocale 16437->16438 16439 41a8a7 16437->16439 16438->16439 16526 4076d4 16439->16526 16450 4063a0 12 API calls 16451 41a8f9 16450->16451 16452 41a7f8 13 API calls 16451->16452 16453 41a90e 16452->16453 16454 41a7f8 13 API calls 16453->16454 16455 41a930 16454->16455 16582 41a844 GetLocaleInfoW 16455->16582 16458 41a844 GetLocaleInfoW 16459 41a967 16458->16459 16460 41a7f8 13 API calls 16459->16460 16461 41a983 16460->16461 16462 41a844 GetLocaleInfoW 16461->16462 16463 41a9a0 16462->16463 16584 41b394 16463->16584 16466 4063a0 12 API calls 16467 41a9c7 16466->16467 16468 41b394 14 API calls 16467->16468 16469 41a9e1 16468->16469 16470 4063a0 12 API calls 16469->16470 16471 41a9ec 16470->16471 16472 41a844 GetLocaleInfoW 16471->16472 16473 41a9fc 16472->16473 16474 41a7f8 13 API calls 16473->16474 16475 41aa15 16474->16475 16476 4063a0 12 API calls 16475->16476 16477 41aa20 16476->16477 16478 41a7f8 13 API calls 16477->16478 16479 41aa35 16478->16479 16480 4063a0 12 API calls 16479->16480 16481 41aa40 16480->16481 16482 406000 12 API calls 16481->16482 16483 41aa48 16482->16483 16484 406000 12 API calls 16483->16484 16485 41aa50 16484->16485 16486 41a7f8 13 API calls 16485->16486 16487 41aa65 16486->16487 16488 41aa73 16487->16488 16489 41aa82 16487->16489 16490 4063e8 12 API calls 16488->16490 16491 4063e8 12 API calls 16489->16491 16492 41aa80 16490->16492 16491->16492 16493 41a7f8 13 API calls 16492->16493 16494 41aaa4 16493->16494 16496 41a7f8 13 API calls 16494->16496 16507 41aae2 16494->16507 16495 406b08 12 API calls 16497 41ab0c 16495->16497 16498 41aac7 16496->16498 16499 406b08 12 API calls 16497->16499 16502 41aad5 16498->16502 16503 41aae4 16498->16503 16500 41ab27 16499->16500 16501 41a844 GetLocaleInfoW 16500->16501 16506 41ab37 16501->16506 16504 4063e8 12 API calls 16502->16504 16505 4063e8 12 API calls 16503->16505 16504->16507 16505->16507 16508 406060 12 API calls 16506->16508 16507->16495 16509 41ab5e 16508->16509 16510 407068 16509->16510 16511 407197 16510->16511 16512 40708d 16510->16512 16511->16394 16512->16511 16515 4063a0 12 API calls 16512->16515 16517 4071b0 16 API calls 16512->16517 16518 407068 16 API calls 16512->16518 16759 40643c 16512->16759 16765 406414 16512->16765 16772 407050 16512->16772 16777 40771c 16512->16777 16515->16512 16517->16512 16518->16512 16521 406f13 16520->16521 16522 406efa 16520->16522 16521->16357 16522->16521 16786 406f34 16522->16786 16525 41cb51 16524->16525 16525->16433 16607 4074d0 16526->16607 16529 41b074 16663 405080 16529->16663 16536 4076d4 16 API calls 16537 41b0db 16536->16537 16538 41a7f8 13 API calls 16537->16538 16539 41b0f3 16538->16539 16540 41b10c GetThreadLocale EnumCalendarInfoW 16539->16540 16541 41b15f 16539->16541 16546 41b129 16540->16546 16542 41b233 16541->16542 16543 4076d4 16 API calls 16541->16543 16547 4076d4 16 API calls 16542->16547 16545 41b18c 16543->16545 16544 41b147 GetThreadLocale EnumCalendarInfoW 16544->16542 16548 4063a0 12 API calls 16545->16548 16546->16544 16546->16546 16549 41b256 16547->16549 16550 41b19e 16548->16550 16553 41b293 16549->16553 16557 407068 16 API calls 16549->16557 16688 41a778 16550->16688 16552 41b1cc 16555 41b1d1 GetThreadLocale EnumCalendarInfoW 16552->16555 16554 4076d4 16 API calls 16553->16554 16556 41b2aa 16554->16556 16559 41b200 16555->16559 16692 40532c 16556->16692 16557->16549 16558 41b220 GetThreadLocale EnumCalendarInfoW 16558->16542 16559->16558 16559->16559 16562 41ad5c 16565 41ad8f 16562->16565 16563 41b328 59 API calls 16563->16565 16564 4063a0 12 API calls 16564->16565 16565->16563 16565->16564 16566 41adec 16565->16566 16567 406060 12 API calls 16566->16567 16568 41a8d4 16567->16568 16569 41ae18 16568->16569 16572 41ae42 16569->16572 16570 41b328 59 API calls 16570->16572 16571 4063a0 12 API calls 16571->16572 16572->16570 16572->16571 16573 41ae92 16572->16573 16574 406060 12 API calls 16573->16574 16575 41a8dd 16574->16575 16576 41a7f8 GetLocaleInfoW 16575->16576 16577 41a831 16576->16577 16578 41a81f 16576->16578 16580 4063a0 12 API calls 16577->16580 16579 406158 12 API calls 16578->16579 16581 41a82f 16579->16581 16580->16581 16581->16450 16583 41a860 16582->16583 16583->16458 16585 406000 12 API calls 16584->16585 16586 41b3cf 16585->16586 16587 41a7f8 13 API calls 16586->16587 16588 41b3e0 16587->16588 16589 41a7f8 13 API calls 16588->16589 16590 41b3f5 16589->16590 16591 41b40e 16590->16591 16604 41b47d 16590->16604 16592 41b465 16591->16592 16599 41b42a 16591->16599 16593 4063a0 12 API calls 16592->16593 16595 41b463 16593->16595 16594 41d830 CompareStringW 16594->16604 16596 406060 12 API calls 16595->16596 16597 41b5bb 16596->16597 16598 406000 12 API calls 16597->16598 16601 41a9bc 16598->16601 16599->16595 16603 406a28 12 API calls 16599->16603 16753 40683c 16599->16753 16601->16466 16603->16599 16604->16594 16604->16595 16605 406a28 12 API calls 16604->16605 16606 40683c 12 API calls 16604->16606 16756 41da50 16604->16756 16605->16604 16606->16604 16608 4074f3 16607->16608 16612 40750e 16607->16612 16609 4074fe 16608->16609 16626 404070 16608->16626 16629 4074c8 16609->16629 16613 40755d 16612->16613 16615 404070 12 API calls 16612->16615 16614 40756b 16613->16614 16616 404070 12 API calls 16613->16616 16617 407579 16614->16617 16618 4075b5 16614->16618 16615->16613 16616->16614 16619 403f68 12 API calls 16617->16619 16620 403f34 12 API calls 16618->16620 16623 4075ad 16619->16623 16621 4075c1 16620->16621 16621->16623 16632 4072d8 16621->16632 16622 407509 16622->16529 16623->16622 16625 4074d0 16 API calls 16623->16625 16625->16623 16627 404024 12 API calls 16626->16627 16628 404083 16627->16628 16628->16609 16635 4076e0 16629->16635 16641 4071b0 16632->16641 16634 4072e3 16634->16623 16636 4074cd 16635->16636 16638 4076e6 16635->16638 16636->16622 16637 407711 16639 403f50 12 API calls 16637->16639 16638->16636 16638->16637 16640 406f34 14 API calls 16638->16640 16639->16636 16640->16637 16642 4071c5 16641->16642 16646 4071f4 16641->16646 16643 4071ca 16642->16643 16648 407216 16642->16648 16645 4071cf 16643->16645 16652 40722d 16643->16652 16644 40643c 12 API calls 16644->16646 16650 407241 16645->16650 16651 4071d4 16645->16651 16646->16644 16659 407211 16646->16659 16647 406414 SysFreeString SysReAllocStringLen 16647->16648 16648->16647 16648->16659 16649 4063a0 12 API calls 16649->16652 16655 407050 12 API calls 16650->16655 16650->16659 16653 407255 16651->16653 16654 4071d9 16651->16654 16652->16649 16652->16659 16653->16659 16660 4071b0 16 API calls 16653->16660 16656 4071e2 16654->16656 16657 407278 16654->16657 16655->16650 16656->16646 16656->16659 16661 4072a9 16656->16661 16658 407068 16 API calls 16657->16658 16657->16659 16658->16657 16659->16634 16660->16653 16661->16659 16662 40771c 14 API calls 16661->16662 16662->16661 16664 405090 16663->16664 16665 405089 16663->16665 16667 4053b4 16664->16667 16666 404070 12 API calls 16665->16666 16666->16664 16668 4053bb 16667->16668 16671 4053d6 16668->16671 16699 4050ac 16668->16699 16670 4053c8 16670->16671 16672 403f50 12 API calls 16670->16672 16673 40514c 16671->16673 16672->16671 16681 40515a 16673->16681 16675 405183 GetTickCount 16675->16681 16676 4051f6 GetTickCount 16679 4051a8 16676->16679 16676->16681 16677 40522d GetTickCount 16725 405344 16677->16725 16678 40519b GetTickCount 16678->16679 16678->16681 16679->16536 16681->16675 16681->16676 16681->16677 16681->16678 16681->16679 16682 4051cb GetCurrentThreadId 16681->16682 16713 4053e8 GetCurrentThreadId 16681->16713 16718 404efc 16681->16718 16682->16679 16684 405257 GetTickCount 16685 40523d 16684->16685 16685->16677 16685->16684 16686 4052c1 16685->16686 16686->16679 16687 4052c7 GetCurrentThreadId 16686->16687 16687->16679 16689 41a790 16688->16689 16690 41a79e 16689->16690 16729 4185e8 16689->16729 16690->16552 16693 405080 12 API calls 16692->16693 16694 405334 16693->16694 16695 4053b4 17 API calls 16694->16695 16696 40533b 16695->16696 16744 4052e4 16696->16744 16700 4050b5 16699->16700 16702 4050ba 16699->16702 16703 404f84 GetModuleHandleW GetProcAddress 16700->16703 16702->16670 16704 404fad GetLogicalProcessorInformation 16703->16704 16710 405002 16703->16710 16705 404fbc GetLastError 16704->16705 16704->16710 16706 404fc6 16705->16706 16705->16710 16707 403f34 12 API calls 16706->16707 16708 404fce GetLogicalProcessorInformation 16707->16708 16709 404ff5 16708->16709 16709->16710 16711 403f50 12 API calls 16709->16711 16710->16702 16712 40502f 16711->16712 16712->16702 16714 4053f5 16713->16714 16715 4053fc 16713->16715 16714->16681 16716 405423 16715->16716 16717 405410 GetCurrentThreadId 16715->16717 16716->16681 16717->16716 16719 404f07 16718->16719 16720 404f55 16719->16720 16721 404f36 16719->16721 16722 404f2d Sleep 16719->16722 16720->16681 16723 404f45 Sleep 16721->16723 16724 404f4e SwitchToThread 16721->16724 16722->16720 16723->16720 16724->16720 16726 40539d 16725->16726 16727 405356 16725->16727 16726->16685 16727->16726 16728 405384 Sleep 16727->16728 16728->16727 16734 41bb6c 16729->16734 16731 4185f9 16738 405724 16731->16738 16735 41bb73 16734->16735 16736 408e5c 58 API calls 16735->16736 16737 41bb8b 16736->16737 16737->16731 16739 405732 16738->16739 16740 405728 16738->16740 16742 405770 16739->16742 16743 40400c 12 API calls 16739->16743 16741 405e88 12 API calls 16740->16741 16741->16739 16742->16742 16743->16742 16749 405094 GetCurrentThreadId 16744->16749 16746 40531b 16746->16562 16748 405344 Sleep 16748->16746 16750 4050a1 16749->16750 16751 4050a8 16749->16751 16752 404070 12 API calls 16750->16752 16751->16746 16751->16748 16752->16751 16754 406158 12 API calls 16753->16754 16755 406849 16754->16755 16755->16599 16757 406bf0 12 API calls 16756->16757 16758 41da6c 16757->16758 16758->16604 16760 406440 16759->16760 16762 406454 16759->16762 16760->16762 16781 405f94 16760->16781 16761 406482 16761->16512 16762->16761 16764 403f50 12 API calls 16762->16764 16764->16761 16766 406418 16765->16766 16767 40643b 16765->16767 16768 405fe0 16766->16768 16769 40642b SysReAllocStringLen 16766->16769 16767->16512 16770 40605c 16768->16770 16771 40604e SysFreeString 16768->16771 16769->16767 16769->16768 16770->16512 16771->16770 16773 407060 16772->16773 16774 407059 16772->16774 16775 404070 12 API calls 16773->16775 16774->16512 16776 407067 16775->16776 16776->16512 16779 407723 16777->16779 16778 40773d 16778->16512 16779->16778 16780 4076e0 14 API calls 16779->16780 16780->16778 16782 405f98 16781->16782 16783 405fd6 16781->16783 16782->16783 16784 403f34 12 API calls 16782->16784 16783->16762 16785 405fa8 16784->16785 16785->16762 16787 406f3d 16786->16787 16813 406f7a 16786->16813 16788 406f52 16787->16788 16789 406f7f 16787->16789 16790 406f56 16788->16790 16791 406fb9 16788->16791 16792 406f90 16789->16792 16793 406f86 16789->16793 16795 406f5a 16790->16795 16796 406f9c 16790->16796 16797 406fc0 16791->16797 16798 406fc7 16791->16798 16817 406090 16792->16817 16799 406024 12 API calls 16793->16799 16802 406fd0 16795->16802 16803 406f5e 16795->16803 16800 406fa3 16796->16800 16801 406fad 16796->16801 16804 406000 12 API calls 16797->16804 16805 406060 12 API calls 16798->16805 16799->16813 16821 406048 16800->16821 16824 4060c0 16801->16824 16802->16813 16828 406f1c 16802->16828 16809 406f62 16803->16809 16810 406fdf 16803->16810 16804->16813 16805->16813 16811 406ffd 16809->16811 16816 406f6a 16809->16816 16812 406f34 14 API calls 16810->16812 16810->16813 16811->16813 16814 406ee4 14 API calls 16811->16814 16812->16810 16813->16522 16814->16811 16815 4076e0 14 API calls 16815->16816 16816->16813 16816->16815 16818 406096 16817->16818 16819 4060bc 16818->16819 16820 403f50 12 API calls 16818->16820 16819->16813 16820->16818 16822 40605c 16821->16822 16823 40604e SysFreeString 16821->16823 16822->16813 16823->16822 16825 4060c6 16824->16825 16826 4060cc SysFreeString 16825->16826 16827 4060de 16825->16827 16826->16825 16827->16813 16829 406f2c 16828->16829 16832 406f25 16828->16832 16830 404070 12 API calls 16829->16830 16831 406f33 16830->16831 16831->16802 16832->16802 16834 425f08 16833->16834 16834->16834 16835 40adb8 13 API calls 16834->16835 16836 425f2b 16835->16836 16837 425f33 LoadLibraryW 16836->16837 16838 40adb8 13 API calls 16837->16838 16839 425f48 16838->16839 16840 40a4ac 14 API calls 16839->16840 16841 425f57 16840->16841 16842 40adb8 13 API calls 16841->16842 16843 425f69 16842->16843 16844 40a4ac 14 API calls 16843->16844 16845 425f78 16844->16845 16846 40adb8 13 API calls 16845->16846 16847 425f8a 16846->16847 16848 40a4ac 14 API calls 16847->16848 16849 425f99 16848->16849 16850 40adb8 13 API calls 16849->16850 16851 425fab 16850->16851 16852 40a4ac 14 API calls 16851->16852 16853 425fba 16852->16853 16854 40adb8 13 API calls 16853->16854 16855 425fcc 16854->16855 16856 40a4ac 14 API calls 16855->16856 16857 425fdb 16856->16857 16858 40adb8 13 API calls 16857->16858 16859 425fed 16858->16859 16860 40a4ac 14 API calls 16859->16860 16861 425ffc 16860->16861 16862 40adb8 13 API calls 16861->16862 16863 42600e 16862->16863 16864 40a4ac 14 API calls 16863->16864 16865 42601d 16864->16865 16866 40adb8 13 API calls 16865->16866 16867 42602f 16866->16867 16868 40a4ac 14 API calls 16867->16868 16869 42603e 16868->16869 16870 40adb8 13 API calls 16869->16870 16871 426050 16870->16871 16872 40a4ac 14 API calls 16871->16872 16873 42605f 16872->16873 16874 40adb8 13 API calls 16873->16874 16875 426071 16874->16875 16876 40a4ac 14 API calls 16875->16876 16877 426080 16876->16877 16878 40adb8 13 API calls 16877->16878 16879 426092 16878->16879 16880 40a4ac 14 API calls 16879->16880 16881 4260a1 16880->16881 16882 40adb8 13 API calls 16881->16882 16883 4260b3 16882->16883 16884 40a4ac 14 API calls 16883->16884 16885 4260c2 16884->16885 16886 40adb8 13 API calls 16885->16886 16887 4260d4 16886->16887 16888 40a4ac 14 API calls 16887->16888 16889 4260e3 16888->16889 16890 40adb8 13 API calls 16889->16890 16891 4260f5 16890->16891 16892 40a4ac 14 API calls 16891->16892 16893 426104 16892->16893 16894 40adb8 13 API calls 16893->16894 16895 426116 16894->16895 16896 40a4ac 14 API calls 16895->16896 16897 426125 16896->16897 16898 40adb8 13 API calls 16897->16898 16899 426137 16898->16899 16900 40a4ac 14 API calls 16899->16900 16901 426146 16900->16901 16902 40adb8 13 API calls 16901->16902 16903 426158 16902->16903 16904 40a4ac 14 API calls 16903->16904 16905 426167 16904->16905 16906 406060 12 API calls 16905->16906 16907 426186 16906->16907 16908 426564 WSAStartup 16907->16908 16908->16157 16910 40bdf0 16909->16910 16910->16910 16911 40adb8 13 API calls 16910->16911 16912 40be14 16911->16912 16913 40be1c LoadLibraryW 16912->16913 16914 40be2c 16913->16914 17301 40c205 16913->17301 16915 40adb8 13 API calls 16914->16915 16917 40be39 16915->16917 16916 40adb8 13 API calls 16918 40c217 16916->16918 16920 40a4ac 14 API calls 16917->16920 16919 40c21f LoadLibraryW 16918->16919 16921 40c22b 16919->16921 16933 40c24d 16919->16933 16923 40be48 16920->16923 16924 40adb8 13 API calls 16921->16924 16922 40adb8 13 API calls 16925 40c262 16922->16925 16926 40adb8 13 API calls 16923->16926 16927 40c23b 16924->16927 16928 40c26d LoadLibraryW 16925->16928 16929 40be5a 16926->16929 16932 40a4ac 14 API calls 16927->16932 16930 40cc11 16928->16930 16931 40c27d 16928->16931 16936 40a4ac 14 API calls 16929->16936 16934 40adb8 13 API calls 16930->16934 16935 40adb8 13 API calls 16931->16935 16932->16933 16933->16922 16937 40cc26 16934->16937 16938 40c28d 16935->16938 16939 40be69 16936->16939 16941 40cc31 LoadLibraryW 16937->16941 16945 40a4ac 14 API calls 16938->16945 16940 40adb8 13 API calls 16939->16940 16942 40be7b 16940->16942 16943 40cc41 16941->16943 16944 40ce37 16941->16944 16949 40a4ac 14 API calls 16942->16949 16947 40adb8 13 API calls 16943->16947 16946 40adb8 13 API calls 16944->16946 16948 40c29f 16945->16948 16950 40ce4c 16946->16950 16951 40cc51 16947->16951 16952 40adb8 13 API calls 16948->16952 16953 40be8a 16949->16953 16956 40ce57 LoadLibraryW 16950->16956 16960 40a4ac 14 API calls 16951->16960 16954 40c2b4 16952->16954 16955 40adb8 13 API calls 16953->16955 16961 40a4ac 14 API calls 16954->16961 16957 40be9c 16955->16957 16958 40ce63 16956->16958 16959 40ce85 16956->16959 16970 40a4ac 14 API calls 16957->16970 16963 40adb8 13 API calls 16958->16963 16962 40adb8 13 API calls 16959->16962 16964 40cc63 16960->16964 16965 40c2c6 16961->16965 16966 40ce9a 16962->16966 16967 40ce73 16963->16967 16968 40adb8 13 API calls 16964->16968 16969 40adb8 13 API calls 16965->16969 16973 40cea5 LoadLibraryW 16966->16973 16978 40a4ac 14 API calls 16967->16978 16971 40cc78 16968->16971 16972 40c2db 16969->16972 16974 40beab 16970->16974 16979 40a4ac 14 API calls 16971->16979 16984 40a4ac 14 API calls 16972->16984 16975 40d00f 16973->16975 16976 40ceb5 16973->16976 16977 40adb8 13 API calls 16974->16977 16982 40adb8 13 API calls 16975->16982 16980 40adb8 13 API calls 16976->16980 16981 40bebd 16977->16981 16978->16959 16983 40cc8a 16979->16983 16985 40cec5 16980->16985 16992 40a4ac 14 API calls 16981->16992 16986 40d024 16982->16986 16987 40adb8 13 API calls 16983->16987 16988 40c2ed 16984->16988 16996 40a4ac 14 API calls 16985->16996 16989 40d02f LoadLibraryW 16986->16989 16990 40cc9f 16987->16990 16991 40adb8 13 API calls 16988->16991 16993 40d0ab 16989->16993 16994 40d03b 16989->16994 17005 40a4ac 14 API calls 16990->17005 16995 40c302 16991->16995 16997 40becc 16992->16997 16999 40adb8 13 API calls 16993->16999 16998 40adb8 13 API calls 16994->16998 17008 40a4ac 14 API calls 16995->17008 17000 40ced7 16996->17000 17001 40adb8 13 API calls 16997->17001 17003 40d04b 16998->17003 17004 40d0c0 16999->17004 17006 40adb8 13 API calls 17000->17006 17002 40bede 17001->17002 17013 40a4ac 14 API calls 17002->17013 17014 40a4ac 14 API calls 17003->17014 17010 40d0cb LoadLibraryW 17004->17010 17007 40ccb1 17005->17007 17009 40ceec 17006->17009 17011 40adb8 13 API calls 17007->17011 17012 40c314 17008->17012 17020 40a4ac 14 API calls 17009->17020 17015 40d0d7 17010->17015 17016 40d147 17010->17016 17017 40ccc6 17011->17017 17018 40adb8 13 API calls 17012->17018 17021 40beed 17013->17021 17022 40d05d 17014->17022 17023 40adb8 13 API calls 17015->17023 17025 406060 12 API calls 17016->17025 17033 40a4ac 14 API calls 17017->17033 17019 40c329 17018->17019 17034 40a4ac 14 API calls 17019->17034 17024 40cefe 17020->17024 17026 40adb8 13 API calls 17021->17026 17027 40adb8 13 API calls 17022->17027 17028 40d0e7 17023->17028 17029 40adb8 13 API calls 17024->17029 17030 40d169 17025->17030 17031 40beff 17026->17031 17032 40d072 17027->17032 17040 40a4ac 14 API calls 17028->17040 17035 40cf13 17029->17035 17036 406060 12 API calls 17030->17036 17045 40a4ac 14 API calls 17031->17045 17046 40a4ac 14 API calls 17032->17046 17037 40ccd8 17033->17037 17038 40c33b 17034->17038 17049 40a4ac 14 API calls 17035->17049 17039 40d176 17036->17039 17041 40adb8 13 API calls 17037->17041 17044 40adb8 13 API calls 17038->17044 17439 43dc14 17039->17439 17042 40d0f9 17040->17042 17043 40cced 17041->17043 17047 40adb8 13 API calls 17042->17047 17057 40a4ac 14 API calls 17043->17057 17048 40c350 17044->17048 17050 40bf0e 17045->17050 17051 40d084 17046->17051 17052 40d10e 17047->17052 17061 40a4ac 14 API calls 17048->17061 17053 40cf25 17049->17053 17054 40adb8 13 API calls 17050->17054 17055 40adb8 13 API calls 17051->17055 17063 40a4ac 14 API calls 17052->17063 17058 40adb8 13 API calls 17053->17058 17059 40bf20 17054->17059 17056 40d099 17055->17056 17066 40a4ac 14 API calls 17056->17066 17060 40ccff 17057->17060 17062 40cf3a 17058->17062 17070 40a4ac 14 API calls 17059->17070 17064 40adb8 13 API calls 17060->17064 17065 40c362 17061->17065 17074 40a4ac 14 API calls 17062->17074 17067 40d120 17063->17067 17068 40cd14 17064->17068 17069 40adb8 13 API calls 17065->17069 17066->16993 17072 40adb8 13 API calls 17067->17072 17079 40a4ac 14 API calls 17068->17079 17073 40c377 17069->17073 17071 40bf2f 17070->17071 17075 40adb8 13 API calls 17071->17075 17076 40d135 17072->17076 17083 40a4ac 14 API calls 17073->17083 17077 40cf4c 17074->17077 17078 40bf41 17075->17078 17085 40a4ac 14 API calls 17076->17085 17080 40adb8 13 API calls 17077->17080 17088 40a4ac 14 API calls 17078->17088 17082 40cd26 17079->17082 17081 40cf61 17080->17081 17091 40a4ac 14 API calls 17081->17091 17086 40adb8 13 API calls 17082->17086 17084 40c389 17083->17084 17087 40adb8 13 API calls 17084->17087 17085->17016 17089 40cd3b 17086->17089 17090 40c39e 17087->17090 17092 40bf50 17088->17092 17097 40a4ac 14 API calls 17089->17097 17099 40a4ac 14 API calls 17090->17099 17093 40cf73 17091->17093 17094 40adb8 13 API calls 17092->17094 17095 40adb8 13 API calls 17093->17095 17096 40bf62 17094->17096 17100 40cf88 17095->17100 17105 40a4ac 14 API calls 17096->17105 17098 40cd4d 17097->17098 17101 40adb8 13 API calls 17098->17101 17102 40c3b0 17099->17102 17107 40a4ac 14 API calls 17100->17107 17103 40cd62 17101->17103 17104 40adb8 13 API calls 17102->17104 17111 40a4ac 14 API calls 17103->17111 17106 40c3c5 17104->17106 17108 40bf71 17105->17108 17115 40a4ac 14 API calls 17106->17115 17109 40cf9a 17107->17109 17110 40adb8 13 API calls 17108->17110 17112 40adb8 13 API calls 17109->17112 17113 40bf83 17110->17113 17114 40cd74 17111->17114 17116 40cfaf 17112->17116 17119 40a4ac 14 API calls 17113->17119 17117 40adb8 13 API calls 17114->17117 17118 40c3d7 17115->17118 17124 40a4ac 14 API calls 17116->17124 17120 40cd89 17117->17120 17121 40adb8 13 API calls 17118->17121 17122 40bf92 17119->17122 17129 40a4ac 14 API calls 17120->17129 17123 40c3ec 17121->17123 17126 40adb8 13 API calls 17122->17126 17130 40a4ac 14 API calls 17123->17130 17125 40cfc1 17124->17125 17127 40adb8 13 API calls 17125->17127 17128 40bfa4 17126->17128 17131 40cfd6 17127->17131 17136 40a4ac 14 API calls 17128->17136 17132 40cd9b 17129->17132 17133 40c3fe 17130->17133 17139 40a4ac 14 API calls 17131->17139 17134 40adb8 13 API calls 17132->17134 17135 40adb8 13 API calls 17133->17135 17137 40cdb0 17134->17137 17138 40c413 17135->17138 17140 40bfb3 17136->17140 17143 40a4ac 14 API calls 17137->17143 17147 40a4ac 14 API calls 17138->17147 17141 40cfe8 17139->17141 17142 40adb8 13 API calls 17140->17142 17144 40adb8 13 API calls 17141->17144 17145 40bfc5 17142->17145 17146 40cdc2 17143->17146 17148 40cffd 17144->17148 17153 40a4ac 14 API calls 17145->17153 17149 40adb8 13 API calls 17146->17149 17150 40c425 17147->17150 17155 40a4ac 14 API calls 17148->17155 17151 40cdd7 17149->17151 17152 40adb8 13 API calls 17150->17152 17159 40a4ac 14 API calls 17151->17159 17154 40c43a 17152->17154 17156 40bfd4 17153->17156 17161 40a4ac 14 API calls 17154->17161 17155->16975 17157 40adb8 13 API calls 17156->17157 17158 40bfe6 17157->17158 17164 40a4ac 14 API calls 17158->17164 17160 40cde9 17159->17160 17162 40adb8 13 API calls 17160->17162 17163 40c44c 17161->17163 17165 40cdfe 17162->17165 17166 40adb8 13 API calls 17163->17166 17168 40bff5 17164->17168 17171 40a4ac 14 API calls 17165->17171 17167 40c461 17166->17167 17172 40a4ac 14 API calls 17167->17172 17169 40adb8 13 API calls 17168->17169 17170 40c007 17169->17170 17178 40a4ac 14 API calls 17170->17178 17173 40ce10 17171->17173 17174 40c473 17172->17174 17175 40adb8 13 API calls 17173->17175 17177 40adb8 13 API calls 17174->17177 17176 40ce25 17175->17176 17182 40a4ac 14 API calls 17176->17182 17179 40c488 17177->17179 17180 40c016 17178->17180 17184 40a4ac 14 API calls 17179->17184 17181 40adb8 13 API calls 17180->17181 17183 40c028 17181->17183 17182->16944 17187 40a4ac 14 API calls 17183->17187 17185 40c49a 17184->17185 17186 40adb8 13 API calls 17185->17186 17189 40c4af 17186->17189 17188 40c037 17187->17188 17190 40adb8 13 API calls 17188->17190 17192 40a4ac 14 API calls 17189->17192 17191 40c049 17190->17191 17195 40a4ac 14 API calls 17191->17195 17193 40c4c1 17192->17193 17194 40adb8 13 API calls 17193->17194 17196 40c4d6 17194->17196 17197 40c058 17195->17197 17200 40a4ac 14 API calls 17196->17200 17198 40adb8 13 API calls 17197->17198 17199 40c06a 17198->17199 17203 40a4ac 14 API calls 17199->17203 17201 40c4e8 17200->17201 17202 40adb8 13 API calls 17201->17202 17204 40c4fd 17202->17204 17205 40c079 17203->17205 17208 40a4ac 14 API calls 17204->17208 17206 40adb8 13 API calls 17205->17206 17207 40c08b 17206->17207 17210 40a4ac 14 API calls 17207->17210 17209 40c50f 17208->17209 17211 40adb8 13 API calls 17209->17211 17212 40c09a 17210->17212 17213 40c524 17211->17213 17214 40adb8 13 API calls 17212->17214 17216 40a4ac 14 API calls 17213->17216 17215 40c0ac 17214->17215 17219 40a4ac 14 API calls 17215->17219 17217 40c536 17216->17217 17218 40adb8 13 API calls 17217->17218 17220 40c54b 17218->17220 17221 40c0bb 17219->17221 17224 40a4ac 14 API calls 17220->17224 17222 40adb8 13 API calls 17221->17222 17223 40c0cd 17222->17223 17227 40a4ac 14 API calls 17223->17227 17225 40c55d 17224->17225 17226 40adb8 13 API calls 17225->17226 17228 40c572 17226->17228 17229 40c0dc 17227->17229 17232 40a4ac 14 API calls 17228->17232 17230 40adb8 13 API calls 17229->17230 17231 40c0ee 17230->17231 17234 40a4ac 14 API calls 17231->17234 17233 40c584 17232->17233 17235 40adb8 13 API calls 17233->17235 17237 40c0fd 17234->17237 17236 40c599 17235->17236 17240 40a4ac 14 API calls 17236->17240 17238 40adb8 13 API calls 17237->17238 17239 40c10f 17238->17239 17243 40a4ac 14 API calls 17239->17243 17241 40c5ab 17240->17241 17242 40adb8 13 API calls 17241->17242 17244 40c5c0 17242->17244 17245 40c11e 17243->17245 17248 40a4ac 14 API calls 17244->17248 17246 40adb8 13 API calls 17245->17246 17247 40c130 17246->17247 17251 40a4ac 14 API calls 17247->17251 17249 40c5d2 17248->17249 17250 40adb8 13 API calls 17249->17250 17253 40c5e7 17250->17253 17252 40c13f 17251->17252 17254 40adb8 13 API calls 17252->17254 17256 40a4ac 14 API calls 17253->17256 17255 40c151 17254->17255 17259 40a4ac 14 API calls 17255->17259 17257 40c5f9 17256->17257 17258 40adb8 13 API calls 17257->17258 17260 40c60e 17258->17260 17261 40c160 17259->17261 17264 40a4ac 14 API calls 17260->17264 17262 40adb8 13 API calls 17261->17262 17263 40c172 17262->17263 17267 40a4ac 14 API calls 17263->17267 17265 40c620 17264->17265 17266 40adb8 13 API calls 17265->17266 17268 40c635 17266->17268 17269 40c181 17267->17269 17272 40a4ac 14 API calls 17268->17272 17270 40adb8 13 API calls 17269->17270 17271 40c193 17270->17271 17274 40a4ac 14 API calls 17271->17274 17273 40c647 17272->17273 17275 40adb8 13 API calls 17273->17275 17276 40c1a2 17274->17276 17277 40c65c 17275->17277 17278 40adb8 13 API calls 17276->17278 17280 40a4ac 14 API calls 17277->17280 17279 40c1b4 17278->17279 17283 40a4ac 14 API calls 17279->17283 17281 40c66e 17280->17281 17282 40adb8 13 API calls 17281->17282 17284 40c683 17282->17284 17285 40c1c3 17283->17285 17288 40a4ac 14 API calls 17284->17288 17286 40adb8 13 API calls 17285->17286 17287 40c1d5 17286->17287 17291 40a4ac 14 API calls 17287->17291 17289 40c695 17288->17289 17290 40adb8 13 API calls 17289->17290 17292 40c6aa 17290->17292 17293 40c1e4 17291->17293 17296 40a4ac 14 API calls 17292->17296 17294 40adb8 13 API calls 17293->17294 17295 40c1f6 17294->17295 17298 40a4ac 14 API calls 17295->17298 17297 40c6bc 17296->17297 17299 40adb8 13 API calls 17297->17299 17298->17301 17300 40c6d1 17299->17300 17302 40a4ac 14 API calls 17300->17302 17301->16916 17303 40c6e3 17302->17303 17304 40adb8 13 API calls 17303->17304 17305 40c6f8 17304->17305 17306 40a4ac 14 API calls 17305->17306 17307 40c70a 17306->17307 17308 40adb8 13 API calls 17307->17308 17309 40c71f 17308->17309 17310 40a4ac 14 API calls 17309->17310 17311 40c731 17310->17311 17312 40adb8 13 API calls 17311->17312 17313 40c746 17312->17313 17314 40a4ac 14 API calls 17313->17314 17315 40c758 17314->17315 17316 40adb8 13 API calls 17315->17316 17317 40c76d 17316->17317 17318 40a4ac 14 API calls 17317->17318 17319 40c77f 17318->17319 17320 40adb8 13 API calls 17319->17320 17935 404444 17439->17935 17441 43dc2b GetModuleHandleW RegisterClassW 17442 43dc5c KiUserCallbackDispatcher 17441->17442 17445 43dcc5 17441->17445 17443 43dc70 17442->17443 17444 40a748 CreateWindowExW 17443->17444 17444->17445 17445->16162 17446 43d50c ExitProcess 17445->17446 17446->16162 17448 40b685 LoadLibraryW 17447->17448 17450 40b691 17447->17450 17448->17450 17449 40b70d 17453 406060 12 API calls 17449->17453 17450->17449 17451 40adb8 13 API calls 17450->17451 17452 40b6a6 17451->17452 17455 40a4ac 14 API calls 17452->17455 17454 40b733 17453->17454 17464 40b7c0 GetModuleFileNameW 17454->17464 17456 40b6b5 17455->17456 17457 40adb8 13 API calls 17456->17457 17458 40b6c4 17457->17458 17459 40a4ac 14 API calls 17458->17459 17460 40b6d3 17459->17460 17460->17449 17461 40b6d9 GetCurrentProcess 17460->17461 17462 40b6e6 17461->17462 17462->17449 17463 40b6fa GetNativeSystemInfo 17462->17463 17463->17449 17465 40b7e9 17464->17465 17465->16167 17467 437538 17466->17467 17467->17467 17937 40ba5c 17467->17937 17469 437564 17470 43756a 17469->17470 17471 40adb8 13 API calls 17469->17471 17473 406060 12 API calls 17470->17473 17472 43757c 17471->17472 17475 4063e8 12 API calls 17472->17475 17474 437b2e 17473->17474 17474->16172 17474->16173 17476 437587 17475->17476 17477 40ad0c 12 API calls 17476->17477 17478 43759c 17477->17478 17479 4063a0 12 API calls 17478->17479 17480 4375a6 17479->17480 17481 40ad0c 12 API calls 17480->17481 17482 4375bb 17481->17482 17483 40ad0c 12 API calls 17482->17483 17484 4375de 17483->17484 17485 40ad0c 12 API calls 17484->17485 17486 4375fe 17485->17486 17487 4063a0 12 API calls 17486->17487 17488 437609 17487->17488 17489 40ad0c 12 API calls 17488->17489 17490 43761e 17489->17490 17491 40ad0c 12 API calls 17490->17491 17492 43763f 17491->17492 17493 4063a0 12 API calls 17492->17493 17494 43764a 17493->17494 17495 40ad0c 12 API calls 17494->17495 17496 43765f 17495->17496 17497 40ad0c 12 API calls 17496->17497 17498 437680 17497->17498 17499 4063a0 12 API calls 17498->17499 17500 43768b 17499->17500 17501 40ad0c 12 API calls 17500->17501 17502 4376a0 17501->17502 17503 40ad0c 12 API calls 17502->17503 17504 4376c1 17503->17504 17505 4063a0 12 API calls 17504->17505 17506 4376cc 17505->17506 17507 40ad0c 12 API calls 17506->17507 17508 4376e1 17507->17508 17509 40ad0c 12 API calls 17508->17509 17510 437702 17509->17510 17511 4063a0 12 API calls 17510->17511 17512 43770d 17511->17512 17513 40ad0c 12 API calls 17512->17513 17514 437722 17513->17514 17515 40ad0c 12 API calls 17514->17515 17516 437743 17515->17516 17517 4063a0 12 API calls 17516->17517 17518 43774e 17517->17518 17519 40ad0c 12 API calls 17518->17519 17520 437763 17519->17520 17521 40ad0c 12 API calls 17520->17521 17522 437784 17521->17522 17523 4063a0 12 API calls 17522->17523 17524 43778f 17523->17524 17525 40ad0c 12 API calls 17524->17525 17526 4377a4 17525->17526 17527 40ad0c 12 API calls 17526->17527 17528 4377c5 17527->17528 17529 4063a0 12 API calls 17528->17529 17530 4377d0 17529->17530 17531 40ad0c 12 API calls 17530->17531 17532 4377e5 17531->17532 17533 40ad0c 12 API calls 17532->17533 17534 437806 17533->17534 17535 4063a0 12 API calls 17534->17535 17536 437811 17535->17536 17537 40ad0c 12 API calls 17536->17537 17538 437826 17537->17538 17539 4063a0 12 API calls 17538->17539 17540 437831 17539->17540 17541 40ad0c 12 API calls 17540->17541 17542 437846 17541->17542 17543 4063a0 12 API calls 17542->17543 17544 437851 17543->17544 17545 40ad0c 12 API calls 17544->17545 17546 437866 17545->17546 17547 4063a0 12 API calls 17546->17547 17548 437871 17547->17548 17549 40ad0c 12 API calls 17548->17549 17550 437886 17549->17550 17551 4063a0 12 API calls 17550->17551 17552 437891 17551->17552 17553 40ad0c 12 API calls 17552->17553 17554 4378a6 17553->17554 17555 4063a0 12 API calls 17554->17555 17556 4378b1 17555->17556 17588 40b602 MessageBoxW 17587->17588 17589 40b5f3 MessageBoxW 17587->17589 17590 40b60b 17588->17590 17589->17590 17591 43d50c ExitProcess 17590->17591 17591->16172 17594 43f5bc 17592->17594 17593 404294 14 API calls 17593->17594 17594->17593 17597 43f5e5 17594->17597 17599 43f5fb 17594->17599 17595 406060 12 API calls 17596 43f61c 17595->17596 17596->16178 17600 43acb0 17596->17600 17957 404294 17597->17957 17599->17595 17601 43acd1 17600->17601 17970 43a9d0 17600->17970 17982 43a870 17601->17982 17604 43ace2 17607 406000 12 API calls 17604->17607 17608 43acf7 17607->17608 17608->16178 17610 40b986 17609->17610 17610->16194 17612 43f449 17611->17612 17612->17612 18077 43e940 17612->18077 17616 43f56e 17618 406000 12 API calls 17616->17618 17617 43f486 18085 42a774 OpenFileMappingW 17617->18085 17619 43f592 17618->17619 17640 43e9c4 17619->17640 17620 43f551 17621 43f11c 41 API calls 17620->17621 17624 43f560 17621->17624 17623 43f49e 17623->17616 17623->17620 17625 40b4dc 15 API calls 17623->17625 17626 43f570 17624->17626 17627 43f564 17624->17627 17629 43f4f3 17625->17629 17628 43aec8 19 API calls 17626->17628 17630 43aec8 19 API calls 17627->17630 17628->17616 18087 42743c 17629->18087 17630->17616 17634 43f513 17635 40b564 15 API calls 17634->17635 17636 43f543 17635->17636 17637 43aec8 19 API calls 17636->17637 17638 43f54a 17637->17638 18104 43d50c ExitProcess 17638->18104 17641 404294 14 API calls 17640->17641 17642 43e9e5 17641->17642 17643 406000 12 API calls 17642->17643 17644 43ea0a 17643->17644 17644->16209 17646 43a364 17645->17646 17647 43a380 17646->17647 18111 40b288 CreateMutexW 17646->18111 17647->16204 17649 43d50c ExitProcess 17647->17649 17649->16204 17651 40b927 17650->17651 17652 40b931 CompareStringW 17651->17652 17652->16212 17654 40adb8 13 API calls 17653->17654 17655 4285ba 17654->17655 17656 4285c2 LoadLibraryW 17655->17656 17657 4285d2 17656->17657 17687 428651 17656->17687 17659 40adb8 13 API calls 17657->17659 17658 40adb8 13 API calls 17661 428663 17658->17661 17660 4285df 17659->17660 17663 40a4ac 14 API calls 17660->17663 17662 42866b LoadLibraryW 17661->17662 17664 428677 17662->17664 17665 4286b4 17662->17665 17666 4285ee 17663->17666 17668 40adb8 13 API calls 17664->17668 17667 406060 12 API calls 17665->17667 17669 40adb8 13 API calls 17666->17669 17670 4286d3 17667->17670 17671 428684 17668->17671 17672 428600 17669->17672 17670->16237 17673 40a4ac 14 API calls 17671->17673 17675 40a4ac 14 API calls 17672->17675 17674 428693 17673->17674 17676 40adb8 13 API calls 17674->17676 17677 42860f 17675->17677 17678 4286a5 17676->17678 17679 40adb8 13 API calls 17677->17679 17681 40a4ac 14 API calls 17678->17681 17680 428621 17679->17680 17682 40a4ac 14 API calls 17680->17682 17681->17665 17683 428630 17682->17683 17684 40adb8 13 API calls 17683->17684 17685 428642 17684->17685 17686 40a4ac 14 API calls 17685->17686 17686->17687 17687->17658 17689 40adb8 13 API calls 17688->17689 17690 43d5fb 17688->17690 17689->17690 17691 42847c 13 API calls 17690->17691 17692 43d615 17691->17692 17693 40adb8 13 API calls 17692->17693 17704 43d683 17692->17704 17696 43d62b 17693->17696 17694 406060 12 API calls 17695 43d69f 17694->17695 17695->16273 17695->16291 17697 42847c 13 API calls 17696->17697 17698 43d645 17697->17698 17699 40adb8 13 API calls 17698->17699 17698->17704 17700 43d65b 17699->17700 17701 42847c 13 API calls 17700->17701 17702 43d675 17701->17702 17702->17704 17704->17694 17706 43dd46 17705->17706 17706->16309 18112 43d53c GetDiskFreeSpaceW 17707->18112 17709 43d738 17710 425f00 16 API calls 17709->17710 17719 43d78c 17709->17719 17711 43d751 17710->17711 18113 426564 WSAStartup 17711->18113 17713 43d756 18114 4265f0 17713->18114 17719->16282 17722 425f00 16 API calls 17721->17722 17723 43f65d 17722->17723 18135 426564 WSAStartup 17723->18135 17738 43f15a 17737->17738 17739 43a34c CreateMutexW 17738->17739 17813 43a2eb 17810->17813 17811 404294 14 API calls 17811->17813 17812 43a314 17814 406060 12 API calls 17812->17814 17813->17811 17813->17812 17815 40b918 CompareStringW 17813->17815 17816 43a338 17814->17816 17815->17813 17816->16235 17817->16228 17818->16252 17819->16335 17821 404294 14 API calls 17820->17821 17822 43ee02 17821->17822 17823 404294 14 API calls 17822->17823 17828 43ee34 17822->17828 17825 43ee22 17823->17825 17824 406060 12 API calls 17826 43ee68 17824->17826 17827 42a774 OpenFileMappingW 17825->17827 17829 43ea38 17826->17829 17827->17828 17828->17824 17830 43e9b0 14 API calls 17829->17830 17831 43ea7b 17830->17831 17832 406b08 12 API calls 17831->17832 17833 43eb20 17832->17833 17834 406060 12 API calls 17833->17834 17835 43eb3a 17834->17835 17838 40a4ac 14 API calls 17837->17838 17839 40b4f7 17838->17839 17840 43d258 17839->17840 17843 43d293 17840->17843 17841 406000 12 API calls 17842 43d3b5 17841->17842 17842->16275 17842->16287 17842->16307 17843->17841 17845 4284b3 17844->17845 17847 4284dc 17845->17847 17849 40b918 CompareStringW 17845->17849 17846 406000 12 API calls 17848 428509 17846->17848 17847->17846 17848->16307 17849->17845 17851 43a47c 17850->17851 17852 4042f4 2 API calls 17851->17852 17853 43a50c 17851->17853 17852->17853 17853->16307 17855 406b08 12 API calls 17854->17855 17856 43ebe3 17855->17856 17856->16344 17859 43e9b0 14 API calls 17858->17859 17867 40a4ac 14 API calls 17866->17867 17868 40b57f 17867->17868 17868->16211 17870 43eea1 17869->17870 17870->17870 17871 404294 14 API calls 17870->17871 17873 43eef2 17871->17873 17872 43ef75 17874 406060 12 API calls 17872->17874 17873->17872 17875 43edd8 15 API calls 17873->17875 17876 43efa7 17874->17876 17877 43ef1b 17875->17877 17876->16222 17878 404294 14 API calls 17877->17878 17879 43ef2b 17878->17879 17880 404294 14 API calls 17879->17880 17881 43ef50 17880->17881 17882 404294 14 API calls 17881->17882 17882->17872 18327 405edc 17883->18327 17887 405edc 13 API calls 17886->17887 17888 43e078 17887->17888 17888->16236 17890 437e63 17889->17890 17891 427bf0 12 API calls 17890->17891 17892 437e74 17891->17892 17893 437e88 17892->17893 18339 4289d0 17892->18339 17895 42743c 16 API calls 17893->17895 17896 437e8d 17895->17896 18357 42d724 17896->18357 17899 428590 17 API calls 17900 437e97 17899->17900 17901 425f00 16 API calls 17900->17901 17902 437e9c 17901->17902 18405 43bc54 17902->18405 17936 40444b 17935->17936 17936->17441 17936->17936 17938 40ba6e GetModuleHandleW 17937->17938 17939 406000 12 API calls 17937->17939 17955 406824 17938->17955 17939->17938 17941 40ba80 FindResourceW 17942 40ba91 LoadResource 17941->17942 17943 40badf 17941->17943 17944 40bac0 17942->17944 17945 40bab0 LockResource 17942->17945 17943->17469 17946 40bacd FreeResource 17944->17946 17945->17944 17946->17469 17956 40682a 17955->17956 17956->17941 17958 406000 12 API calls 17957->17958 17959 4042a8 17958->17959 17960 4042ca GetCommandLineW 17959->17960 17961 4042ac GetModuleFileNameW 17959->17961 17963 4042d1 17960->17963 17962 406158 12 API calls 17961->17962 17964 4042c8 17962->17964 17963->17964 17966 4041d8 17963->17966 17964->17599 17968 4041e0 17966->17968 17967 4069a8 12 API calls 17969 404247 17967->17969 17968->17967 17969->17963 18033 40b8ec 17970->18033 17973 43a9fb 17975 406bf0 12 API calls 17973->17975 17974 43aa1f 17976 406a80 12 API calls 17974->17976 17977 43aa0e 17975->17977 17978 43aa1d 17976->17978 17979 406a80 12 API calls 17977->17979 17980 406000 12 API calls 17978->17980 17979->17978 17981 43aa42 17980->17981 17981->17601 17983 43a896 17982->17983 17984 43a7b4 13 API calls 17983->17984 17985 43a89e 17984->17985 17986 40adb8 13 API calls 17985->17986 18005 43a96a 17985->18005 17988 43a8b1 17986->17988 17987 406060 12 API calls 17989 43a98a 17987->17989 17991 4063e8 12 API calls 17988->17991 17990 406060 12 API calls 17989->17990 17992 43a997 17990->17992 17993 43a8bc 17991->17993 17992->17604 18006 43aac0 17992->18006 17994 40ad0c 12 API calls 17993->17994 17995 43a8d3 17994->17995 17997 40ad0c 12 API calls 17995->17997 18000 43a912 17995->18000 17995->18005 17996 40ad0c 12 API calls 18001 43a931 17996->18001 17998 43a905 17997->17998 17999 4063a0 12 API calls 17998->17999 17999->18000 18000->17996 18000->18005 18002 40ad0c 12 API calls 18001->18002 18001->18005 18003 43a95d 18002->18003 18004 4063a0 12 API calls 18003->18004 18004->18005 18005->17987 18007 406000 12 API calls 18006->18007 18008 43aaeb 18007->18008 18037 43a6a0 18008->18037 18011 43ab1a 18013 43a6a0 14 API calls 18011->18013 18012 406b08 12 API calls 18012->18011 18014 43ab2b 18013->18014 18015 43ab54 18014->18015 18016 406b08 12 API calls 18014->18016 18018 40adb8 13 API calls 18015->18018 18032 43ac27 18015->18032 18016->18015 18017 406000 12 API calls 18019 43ac56 18017->18019 18020 43ab69 18018->18020 18021 406060 12 API calls 18019->18021 18022 4063e8 12 API calls 18020->18022 18023 43ac63 18021->18023 18024 43ab74 18022->18024 18023->17604 18025 43a9d0 13 API calls 18024->18025 18026 43ab82 18025->18026 18058 43d158 18026->18058 18028 43ab93 18029 43abef lstrlenW 18028->18029 18028->18032 18030 43ac02 18029->18030 18031 43ac11 lstrlenW 18030->18031 18030->18032 18031->18032 18032->18017 18034 406824 18033->18034 18035 40b8f9 lstrlenW 18034->18035 18036 40b904 18035->18036 18036->17973 18036->17974 18038 43a6cf 18037->18038 18039 43a6e3 18038->18039 18040 43a6d8 18038->18040 18041 4063e8 12 API calls 18039->18041 18042 4063a0 12 API calls 18040->18042 18043 43a6ed 18041->18043 18054 43a6e1 18042->18054 18044 406000 12 API calls 18043->18044 18046 43a6f4 18044->18046 18045 406000 12 API calls 18047 43a762 18045->18047 18068 4042f4 QueryPerformanceCounter 18046->18068 18049 406060 12 API calls 18047->18049 18050 43a76f 18049->18050 18050->18011 18050->18012 18051 40ad0c 12 API calls 18056 43a6f9 18051->18056 18052 43a716 18053 406a28 12 API calls 18052->18053 18053->18054 18054->18045 18056->18051 18056->18052 18057 406b08 12 API calls 18056->18057 18071 40b86c 18056->18071 18057->18056 18059 43d182 lstrlenW 18058->18059 18075 40687c 18058->18075 18061 43d21d 18059->18061 18067 43d191 18059->18067 18062 406000 12 API calls 18061->18062 18063 43d236 18062->18063 18064 406060 12 API calls 18063->18064 18065 43d243 18064->18065 18065->18028 18066 406bf0 12 API calls 18066->18067 18067->18061 18067->18066 18069 404301 18068->18069 18070 40430c GetTickCount 18068->18070 18069->18056 18070->18056 18072 40b871 18071->18072 18073 406158 12 API calls 18072->18073 18074 40b88f 18073->18074 18074->18056 18076 406882 18075->18076 18078 404294 14 API calls 18077->18078 18079 43e961 18078->18079 18080 406000 12 API calls 18079->18080 18081 43e986 18080->18081 18081->17623 18082 43e9b0 18081->18082 18083 404294 14 API calls 18082->18083 18084 43e9bf 18083->18084 18084->17617 18086 42a793 18085->18086 18086->17623 18088 40adb8 13 API calls 18087->18088 18089 427460 18088->18089 18090 427468 LoadLibraryW 18089->18090 18091 427474 18090->18091 18092 427490 18090->18092 18094 40adb8 13 API calls 18091->18094 18093 406060 12 API calls 18092->18093 18095 4274af 18093->18095 18096 427481 18094->18096 18098 43d3d8 18095->18098 18097 40a4ac 14 API calls 18096->18097 18097->18092 18099 43d410 18098->18099 18103 43d4c8 18099->18103 18105 427250 18099->18105 18100 406000 12 API calls 18101 43d4e6 18100->18101 18101->17634 18103->18100 18104->17620 18106 427280 18105->18106 18107 406a28 12 API calls 18106->18107 18108 42728d 18107->18108 18109 406000 12 API calls 18108->18109 18110 4272c9 18109->18110 18110->18103 18111->17647 18112->17709 18113->17713 18132 4265cc 18114->18132 18133 4265e4 18132->18133 18134 4265d5 socket 18132->18134 18134->18133 18328 405f07 18327->18328 18330 405ef9 CreateThread 18327->18330 18329 403f34 12 API calls 18328->18329 18329->18330 18332 405f41 18330->18332 18333 405f48 18330->18333 18335 405ea4 18330->18335 18334 403f50 12 API calls 18332->18334 18333->16247 18333->16254 18334->18333 18336 405eac 18335->18336 18337 403f50 12 API calls 18336->18337 18338 405eca 18337->18338 18340 428a02 InitializeCriticalSection 18339->18340 18341 428b81 18339->18341 18342 42890c 13 API calls 18340->18342 18343 406060 12 API calls 18341->18343 18345 428a15 18342->18345 18344 428bb0 18343->18344 18344->17893 18346 428aa0 18345->18346 18586 428864 18345->18586 18347 42890c 13 API calls 18346->18347 18353 428ae5 18347->18353 18349 428a37 18349->18346 18350 428864 13 API calls 18349->18350 18355 428a67 18350->18355 18351 428b66 18352 405edc 13 API calls 18351->18352 18352->18341 18353->18351 18599 40b644 VirtualFree 18353->18599 18355->18346 18598 40b634 VirtualAlloc 18355->18598 18358 42d72c 18357->18358 18358->18358 18359 40adb8 13 API calls 18358->18359 18360 42d751 18359->18360 18361 42d759 LoadLibraryW 18360->18361 18362 42d769 18361->18362 18404 42d8ae 18361->18404 18363 40adb8 13 API calls 18362->18363 18365 42d776 18363->18365 18364 406060 12 API calls 18366 42d8cd 18364->18366 18367 40a4ac 14 API calls 18365->18367 18366->17899 18368 42d785 18367->18368 18369 40adb8 13 API calls 18368->18369 18370 42d797 18369->18370 18371 40a4ac 14 API calls 18370->18371 18372 42d7a6 18371->18372 18373 40adb8 13 API calls 18372->18373 18374 42d7b8 18373->18374 18375 40a4ac 14 API calls 18374->18375 18376 42d7c7 18375->18376 18377 40adb8 13 API calls 18376->18377 18404->18364 18406 43bc7a 18405->18406 18407 43bcb9 18406->18407 18409 40adb8 13 API calls 18406->18409 18408 406060 12 API calls 18407->18408 18410 437ea1 18408->18410 18411 43bc95 18409->18411 18413 431870 18410->18413 18412 40adb8 13 API calls 18411->18412 18412->18407 18414 431878 18413->18414 18414->18414 18587 40b8ec lstrlenW 18586->18587 18588 42888d 18587->18588 18589 428893 18588->18589 18590 4288bd 18588->18590 18591 406bf0 12 API calls 18589->18591 18592 406a80 12 API calls 18590->18592 18593 4288ac 18591->18593 18594 4288bb 18592->18594 18595 406a80 12 API calls 18593->18595 18596 406000 12 API calls 18594->18596 18595->18594 18597 4288e7 18596->18597 18597->18349 18598->18346 18599->18351

                          Control-flow Graph

                          APIs
                          • GetUserDefaultUILanguage.KERNEL32(00000003,?,00000004,00000000,0040888C,?,?), ref: 004087FE
                          • GetLocaleInfoW.KERNEL32(?,00000003,?,00000004,00000000,0040888C,?,?), ref: 00408807
                            • Part of subcall function 00408694: FindFirstFileW.KERNEL32(00000000,?,00000000,004086F2,?,00000001), ref: 004086C7
                            • Part of subcall function 00408694: FindClose.KERNEL32(00000000,00000000,?,00000000,004086F2,?,00000001), ref: 004086D7
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Find$CloseDefaultFileFirstInfoLanguageLocaleUser
                          • String ID:
                          • API String ID: 3216391948-0
                          • Opcode ID: 71a8562c1639e1ddf01ead51905ade836cb6af30f3703f921b60b101e48ef570
                          • Instruction ID: 27674f643491317e8211ebe2d51140b4d1dfb9d7c3ccf30eb47042a46c7f6e4d
                          • Opcode Fuzzy Hash: 71a8562c1639e1ddf01ead51905ade836cb6af30f3703f921b60b101e48ef570
                          • Instruction Fuzzy Hash: 67116070A001099FDB04FBA6D982AAEB3B8EF44304F51847FF945B32C1DB785E148A69

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1322 408694-4086d4 call 4060e4 call 406824 FindFirstFileW 1327 4086d6-4086d7 FindClose 1322->1327 1328 4086dc-4086f1 call 406000 1322->1328 1327->1328
                          APIs
                          • FindFirstFileW.KERNEL32(00000000,?,00000000,004086F2,?,00000001), ref: 004086C7
                          • FindClose.KERNEL32(00000000,00000000,?,00000000,004086F2,?,00000001), ref: 004086D7
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID:
                          • API String ID: 2295610775-0
                          • Opcode ID: d5e053f3a7f238d708fda4e07e630be6dcb5cbe159ac088ae637e70b0fe2281d
                          • Instruction ID: 4a504121526f8a262ed7674ff1de7294a9ef20f3b8a82b9cde2a0df277819a23
                          • Opcode Fuzzy Hash: d5e053f3a7f238d708fda4e07e630be6dcb5cbe159ac088ae637e70b0fe2281d
                          • Instruction Fuzzy Hash: 39F0E271500308AFC710FBB5CE1298EB7ECEB48314BA248BBB404F26C2EA3D9E10951C

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 40bde8-40bdeb 1 40bdf0-40bdf5 0->1 1->1 2 40bdf7-40be26 call 40adb8 call 406824 LoadLibraryW 1->2 7 40c20a-40c229 call 40adb8 call 406824 LoadLibraryW 2->7 8 40be2c-40c205 call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac 2->8 18 40c252-40c277 call 40adb8 call 406824 LoadLibraryW 7->18 19 40c22b-40c24d call 40adb8 call 406824 call 40a4ac 7->19 8->7 32 40cc16-40cc3b call 40adb8 call 406824 LoadLibraryW 18->32 33 40c27d-40cc11 call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac 18->33 19->18 49 40cc41-40ce37 call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac 32->49 50 40ce3c-40ce61 call 40adb8 call 406824 LoadLibraryW 32->50 33->32 49->50 71 40ce63-40ce85 call 40adb8 call 406824 call 40a4ac 50->71 72 40ce8a-40ceaf call 40adb8 call 406824 LoadLibraryW 50->72 71->72 96 40d014-40d039 call 40adb8 call 406824 LoadLibraryW 72->96 97 40ceb5-40d00f call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac 72->97 121 40d0b0-40d0d5 call 40adb8 call 406824 LoadLibraryW 96->121 122 40d03b-40d0ab call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac 96->122 97->96 154 40d0d7-40d147 call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac 121->154 155 40d14c-40d176 call 406060 * 2 121->155 122->121 154->155
                          APIs
                          • LoadLibraryW.KERNEL32(00000000,00000000,00000000,0040D177,?,00486680,00000040,00000000,00000000,?,0043F7AA,00000000,0043FD8B,?,?,00486664), ref: 0040C220
                          • LoadLibraryW.KERNEL32(00000000,00000000,00000000,00000000,0040D177,?,00486680,00000040,00000000,00000000,?,0043F7AA,00000000,0043FD8B), ref: 0040C26E
                          • LoadLibraryW.KERNEL32(00000000,00000000,00000000,00000000,00000000,0040D177,?,00486680,00000040,00000000,00000000,?,0043F7AA,00000000,0043FD8B), ref: 0040CC32
                          • LoadLibraryW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,0040D177,?,00486680,00000040,00000000,00000000,?,0043F7AA,00000000,0043FD8B), ref: 0040CE58
                          • LoadLibraryW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,0040D177,?,00486680,00000040,00000000,00000000,?,0043F7AA,00000000), ref: 0040CEA6
                          • LoadLibraryW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,0040D177,?,00486680,00000040,00000000,00000000,?,0043F7AA), ref: 0040D030
                          • LoadLibraryW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,0040D177,?,00486680,00000040,00000000,00000000), ref: 0040D0CC
                          • LoadLibraryW.KERNEL32(00000000,00000000,0040D177,?,00486680,00000040,00000000,00000000,?,0043F7AA,00000000,0043FD8B,?,?,00486664,00000000), ref: 0040BE1D
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,?), ref: 0040A4D0
                            • Part of subcall function 0040ADB8: lstrlenW.KERNEL32(00000000,?,?,00486734,00486680,00425F2B,00000000,00426187,?,00486680,00000000,00000000,?,0043F7A0,00000000,0043FD8B), ref: 0040ADD7
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,00000000), ref: 0040A4F2
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: LibraryLoad$AddressProc$lstrlen
                          • String ID: @g}l{gl}Fylg\{e^$@g}l{gl}Fylg^$@g}l{gl}JefzlAhgmel$@g}l{gl}Nl}Jffb`l^$@g}l{gl}Nl}Jfgglj}lmZ}h}l$@g}l{gl}Zl}Fy}`fg^$@g}l{gl}Zl}Jffb`l^$@g}l{gl}[lhmO`el$@yAeyHy`'MEE$A}}yX|l{p@gof^$Dhy_`l~FoO`el$Dhy_`{}|heBlp^$Efhm[lzf|{jl$Efjb[lzf|{jl$Fylg@gy|}Mlzb}fy$FylgD|}lq^$FylgJe`ykfh{m$FylgY{fjlzz$FylgY{fjlzz]fblg$JefzlAhgmel$JefzlJe`ykfh{m$JefzlMlzb}fy$Jefzl^`gmf~$JfypO`el^$J{lh}lD|}lq^$J{lh}lM`{lj}f{p^$J{lh}lO`elDhyy`gn^$J{lh}lO`el^$J{lh}lY`yl$J{lh}lY{fjlzz^$J{lh}l]a{lhm$Kefjb@gy|}$Lg|d^`gmf~z$Lq`}Y{fjlzz$Lq`}^`gmf~zLq$M`zyh}jaDlzzhnl^$Mlel}lO`el^$NefkheDldf{pZ}h}|z$Nl}BlpZ}h}l$Nl}Dfm|elO`elGhdl^$Nl}Dlzzhnl^$Nl}EfgnYh}aGhdl^$Nl}Hmhy}l{z@gof$Nl}HzpgjBlpZ}h}l$Nl}Je`ykfh{mMh}h$Nl}JehzzGhdl^$Nl}Jfdy|}l{Ghdl^$Nl}J|{{lg}Y{fjlzz$Nl}J|{{lg}Y{fjlzz@m$Nl}M`zbO{llZyhjlLq^$Nl}Mlzb}fy^`gmf~$Nl}O`elZ`sl$Nl}Y{fjlzz]`dlz$Nl}Zpz}ldDl}{`jz$Nl}Zpz}ld]`dlHzO`el]`dl$Nl}\zl{Ghdl^$Nl}]`jbJf|g}$Nl}]a{lhmJfg}lq}$Nl}^`gmf~]a{lhmY{fjlzz@m$Nl}_fe|dl@gof{dh}`fg^$Nl}_l{z`fgLq^$O`el]`dl]fEfjheO`el]`dl$O`el]`dl]fZpz}ld]`dl$O`gmGlq}O`el^$O`gmJefzl$O`gmO`{z}O`el^$O`gm[lzf|{jl^$O`gm^`gmf~Lq^$O`gm^`gmf~^$Oehza^`gmf~$O{ll[lzf|{jl$Yh}a@zM`{lj}f{p^$Yh}aO`elLq`z}z^$YllbGhdlmY`yl$ZANl}Yh}aO{fd@ME`z}^$ZANl}Zylj`heOfeml{Efjh}`fg$ZaleeLqlj|}l^$Zl}J|{zf{Yfz$Zl}L{{f{Dfml$Zl}O`elH}}{`k|}lz^$Zl}O`elYf`g}l{$Zl}Zpz}ldJ|{zf{$Zl}]a{lhmJfg}lq}$Zl}]a{lhmMlzb}fy$Zpz}ldYh{hdl}l{z@gof^$Z}{JdyG@^$[lelhzlD|}lq$[lelhzlMJ$[lhmO`el$[lhmY{fjlzzDldf{p$[lnFylgBlp^$[lnJefzlBlp$[lnJ{lh}lBlp^$[lnLg|dBlp^$[lnLg|d_he|l^$[lnMlel}lBlp^$[lnMlel}l_he|l^$[lnX|l{p_he|lLq^$[lnZl}_he|lLq^$[lz|dl]a{lhm$\[EDFG'MEE$\[EMf~gefhm]fO`el^$\gdhy_`l~FoO`el$]l{d`gh}lY{fjlzz$]l{d`gh}l]a{lhm$]{hgzeh}lDlzzhnl$^`gLqlj$^h`}Of{Z`gnelFkclj}$^{`}lO`el$^{`}lY{fjlzzDldf{p$_`{}|heHeefjLq$bl{gle:;'MEE$ez}{jyp^$zae~hy`'MEE$zalee:;'MEE$|zl{:;'MEE$~`g`gl}'MEE
                          • API String ID: 2738378989-3024355689
                          • Opcode ID: 425d9794fa0212803315e0c732f6b49e0cda1e53e6c546beca72f7af03797b15
                          • Instruction ID: 4438aff9bfd592f4c2ae5199af2438c9166828cfa366d28cfe1c4cb90c63c00d
                          • Opcode Fuzzy Hash: 425d9794fa0212803315e0c732f6b49e0cda1e53e6c546beca72f7af03797b15
                          • Instruction Fuzzy Hash: 19A2AFB49113049BC740BBB6CCC29DD76ADEF45318F40857BB405BB282DA7C9D648BAE

                          Control-flow Graph

                          APIs
                          • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,004084DD,?,?), ref: 004082F1
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,004084DD,?,?), ref: 0040833A
                          • RegOpenKeyExW.ADVAPI32(80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,004084DD,?,?), ref: 0040835C
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000), ref: 0040837A
                          • RegOpenKeyExW.ADVAPI32(80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001), ref: 00408398
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002), ref: 004083B6
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001), ref: 004083D4
                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,004084C0,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,004084DD), ref: 00408414
                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,?,00000000,00000000,00000000,?,00000000,004084C0,?,80000001), ref: 0040843F
                          • RegCloseKey.ADVAPI32(?,004084C7,00000000,00000000,?,?,?,00000000,00000000,00000000,?,00000000,004084C0,?,80000001,Software\Embarcadero\Locales), ref: 004084BA
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Open$QueryValue$CloseFileModuleName
                          • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales$Software\CodeGear\Locales$Software\Embarcadero\Locales
                          • API String ID: 2701450724-3496071916
                          • Opcode ID: 014a0b9b99b7be46c737f40711a5b5c9164359921bb32e17d70cbc9f2a686574
                          • Instruction ID: f754047bae0af19bad0102a25d5850afbc03eb5733155dacdeeb846caf687fb8
                          • Opcode Fuzzy Hash: 014a0b9b99b7be46c737f40711a5b5c9164359921bb32e17d70cbc9f2a686574
                          • Instruction Fuzzy Hash: A5513975B402097FEB20DAA5CD46FAE73BCEB08704F50447BBA44F65C1EAB89A40865D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 831 43f770-43f773 832 43f778-43f77d 831->832 832->832 833 43f77f-43f7b1 call 425f00 call 426564 call 40bde8 call 43dc14 832->833 842 43f7b3-43f7b5 call 43d50c 833->842 843 43f7ba-43f7db call 40b654 call 40b7c0 call 4063a0 call 437530 833->843 842->843 852 43f7e0-43f7e2 843->852 853 43f803-43f80a call 43f5a0 852->853 854 43f7e4-43f7fe GetForegroundWindow call 40b5e8 call 43d50c 852->854 859 43f811-43f8c5 call 406a80 * 6 call 40b948 call 406a80 call 40b7c0 call 4063a0 call 43f440 call 43e9c4 853->859 860 43f80c call 43acb0 853->860 854->853 887 43f8c7-43f8db call 406824 call 43a34c 859->887 888 43f8e4-43f8e8 859->888 860->859 887->888 903 43f8dd-43f8df call 43d50c 887->903 889 43f8ea-43f8f8 call 4063a0 888->889 890 43f8fd-43f90d call 40b918 888->890 899 43fc9e-43fca5 call 43e9c4 889->899 900 43f913-43f920 call 40b918 890->900 901 43fa40-43fa50 call 40b918 890->901 910 43fcb2-43fcc9 call 406824 call 43a34c 899->910 911 43fca7-43fcad call 43ee98 899->911 900->901 912 43f926-43f936 call 40b918 900->912 901->899 913 43fa56-43fa61 call 43a2cc 901->913 903->888 933 43fd17 call 437e38 910->933 934 43fccb-43fcda call 437e1c 910->934 911->910 912->901 921 43f93c-43f968 call 428590 call 40adb8 call 406824 912->921 922 43fa63-43fa84 call 406824 call 43d50c 913->922 923 43fa89-43fa8d 913->923 983 43f982-43f989 call 43d72c 921->983 984 43f96a-43f971 call 43d5d4 921->984 922->923 927 43fa93-43faa8 call 406824 call 43a34c 923->927 928 43fb4e-43fb55 923->928 957 43fab1-43fab8 call 43e9c4 927->957 958 43faaa-43faac call 43d50c 927->958 928->899 935 43fb5b-43fb6b call 40b918 928->935 945 43fd1c-43fd8a call 406060 call 406024 call 406060 call 406024 call 406060 call 406024 call 406060 933->945 950 43fcee-43fcf0 934->950 951 43fcdc-43fce0 934->951 935->899 953 43fb71-43fb8a call 40b4dc call 43d258 935->953 954 43fcf2-43fcfc call 43e060 950->954 955 43fcfe-43fd02 950->955 951->950 959 43fce2-43fcec call 43e060 951->959 987 43fb90-43fb94 953->987 988 43fc97-43fc99 call 40b564 953->988 954->933 965 43fd10-43fd12 call 43e060 955->965 966 43fd04-43fd0e call 43e060 955->966 979 43faba-43fadd call 406824 * 2 call 43e810 957->979 980 43faef-43fb3c call 43edd8 call 43ea38 call 406824 * 2 call 43e810 957->980 958->957 959->933 965->933 966->933 979->899 1049 43fae3-43faea call 43d50c 979->1049 980->899 1081 43fb42-43fb49 call 43d50c 980->1081 1003 43f98b-43f995 call 43dd30 call 43dd80 983->1003 1004 43f99a-43f99e 983->1004 984->983 1007 43f973-43f97d call 43dd30 call 43dd80 984->1007 994 43fb96-43fbb3 call 40adb8 call 42847c 987->994 995 43fbb5-43fbb9 987->995 988->899 994->995 1017 43fbc7-43fbdd call 406824 call 43a454 994->1017 1005 43fbbb 995->1005 1006 43fbdf-43fbe6 call 43e9c4 995->1006 1003->945 1015 43f9a0-43f9a7 call 43f64c 1004->1015 1016 43f9b8-43f9bc 1004->1016 1005->1017 1032 43fc34-43fc8e call 43edd8 call 43ec2c call 4066e4 call 406654 1006->1032 1033 43fbe8-43fc29 call 43ebac call 4066e4 call 406654 1006->1033 1007->945 1015->1016 1051 43f9a9-43f9b3 call 43dd30 call 43dd80 1015->1051 1021 43f9be-43f9cb call 43f11c 1016->1021 1022 43f9cd-43f9fd call 43f11c call 406824 * 2 call 43e810 1016->1022 1017->1006 1063 43fbbd-43fbc2 Sleep 1017->1063 1057 43fa2c-43fa30 1021->1057 1022->1057 1091 43f9ff-43fa28 call 4066e4 call 406654 1022->1091 1032->988 1100 43fc90-43fc92 call 43d50c 1032->1100 1033->988 1095 43fc2b-43fc32 call 43d50c 1033->1095 1049->899 1051->945 1067 43fa32-43fa34 call 43aec8 1057->1067 1068 43fa39-43fa3b call 43d50c 1057->1068 1063->1017 1067->1068 1068->901 1081->899 1091->1057 1095->988 1100->988
                          APIs
                          • GetForegroundWindow.USER32(00000030,00000000,0043FD8B,?,?,00486664,00000000,00000000,?,004436A7,00000000,004436EF,?,?,00000021,00000000), ref: 0043F7E6
                            • Part of subcall function 0040B918: CompareStringW.KERNEL32(00000400,00000001,00000000,000000FF,00000000,000000FF,00486680,?,00437D4A,?,00000000,00437DA0,?,?,?,00486680), ref: 0040B939
                            • Part of subcall function 00428590: LoadLibraryW.KERNEL32(00000000,00000000,004286D4,?,?,00486680,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0043F2F2), ref: 004285C3
                            • Part of subcall function 00428590: LoadLibraryW.KERNEL32(00000000,00000000,00000000,004286D4,?,?,00486680,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042866C
                            • Part of subcall function 0043DD30: ShowWindow.USER32(00020562,00000001,00486734,00486680,0043F9AE), ref: 0043DD3F
                            • Part of subcall function 0043DD80: UnregisterClassW.USER32(Regedit_fast_jump,00400000), ref: 0043DD8B
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: LibraryLoadWindow$ClassCompareForegroundShowStringUnregister
                          • String ID: $0_$$1_$$2_$$5_$4gH$GGT$Not Config$SOFTWARE\XXX_$WINDIR$XXX_$_:E`}l'lql$j3U}lz}U}lz}
                          • API String ID: 954628970-2741076856
                          • Opcode ID: bc92d85b10e44bac47d5ed77af867d521b9c1cf5a18a2f9b64f3959704bf9c47
                          • Instruction ID: 5e7b73b35abb561ea2aea0d9688f48cf422379d0deacb349a846aead5bae2168
                          • Opcode Fuzzy Hash: bc92d85b10e44bac47d5ed77af867d521b9c1cf5a18a2f9b64f3959704bf9c47
                          • Instruction Fuzzy Hash: 37E1A870A002154BDF10FB72D88279A33A5AF49308F10A4BBFC45AB697CB3D9D598B5D

                          Control-flow Graph

                          APIs
                          • EnterCriticalSection.KERNEL32(0044CB84,00000000,00408088,?,?,?,00000000,?,00408950,00000000,004089AF,?,?,00000000,00000000,00000000), ref: 00407FA2
                          • LeaveCriticalSection.KERNEL32(0044CB84,0044CB84,00000000,00408088,?,?,?,00000000,?,00408950,00000000,004089AF,?,?,00000000,00000000), ref: 00407FC6
                          • LeaveCriticalSection.KERNEL32(0044CB84,0044CB84,00000000,00408088,?,?,?,00000000,?,00408950,00000000,004089AF,?,?,00000000,00000000), ref: 00407FD5
                          • IsValidLocale.KERNEL32(00000000,00000002,0044CB84,0044CB84,00000000,00408088,?,?,?,00000000,?,00408950,00000000,004089AF), ref: 00407FE7
                          • EnterCriticalSection.KERNEL32(0044CB84,00000000,00000002,0044CB84,0044CB84,00000000,00408088,?,?,?,00000000,?,00408950,00000000,004089AF), ref: 00408044
                          • LeaveCriticalSection.KERNEL32(0044CB84,0044CB84,00000000,00000002,0044CB84,0044CB84,00000000,00408088,?,?,?,00000000,?,00408950,00000000,004089AF), ref: 0040806D
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CriticalSection$Leave$Enter$LocaleValid
                          • String ID: en-GB,en,en-US,
                          • API String ID: 975949045-3021119265
                          • Opcode ID: f6d86eee62b6bf2d3840db3cc2fcc52f00c729b128c34464cea3ae48f6cc2a76
                          • Instruction ID: 89e35a22fce1ca92aca6ca6f157c9b85d33dba724616c188b81eab689516efc9
                          • Opcode Fuzzy Hash: f6d86eee62b6bf2d3840db3cc2fcc52f00c729b128c34464cea3ae48f6cc2a76
                          • Instruction Fuzzy Hash: A421EE3470564157E710B7BA9D9371A3188CB45748F66407FB081B62D7CEBCAC04877E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1134 43d9b0-43d9ce 1135 43d9f2-43da4a call 40a748 * 2 1134->1135 1136 43d9d0-43d9d3 1134->1136 1149 43da4f-43da9c call 4063e8 call 406824 SetWindowTextW call 406000 1135->1149 1138 43d9d9-43d9dc 1136->1138 1139 43db2e-43db38 call 43d834 1136->1139 1142 43d9e2-43d9e7 1138->1142 1143 43db1c-43db2c call 43dd80 1138->1143 1145 43db3d-43db64 DefWindowProcW call 406000 1139->1145 1146 43db00-43db09 1142->1146 1147 43d9ed 1142->1147 1143->1145 1154 43db69 1145->1154 1146->1145 1151 43db0b-43db13 1146->1151 1147->1145 1151->1145 1155 43db15-43db1a call 43d87c 1151->1155 1155->1145
                          APIs
                          • SetWindowTextW.USER32(000B0068,00000000), ref: 0043DA7F
                          • DefWindowProcW.USER32(?,?,?,?,00000000,0043DB6A), ref: 0043DB4D
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Window$ProcText
                          • String ID: BUTTON$EDIT$Fast jump$HKEY_CURRENT_USER\Control Panel\Desktop$MZP
                          • API String ID: 2218353596-2216858624
                          • Opcode ID: e69d02082d12059add0810c350757150de9edb807d28e4ce6e4d838992b731ef
                          • Instruction ID: 29dd7edaff14d80a172b70b85ca7432f0e91f08ba1914f13b3f7aed7ea465baa
                          • Opcode Fuzzy Hash: e69d02082d12059add0810c350757150de9edb807d28e4ce6e4d838992b731ef
                          • Instruction Fuzzy Hash: A8316F75A04208ABEB10EF69EC52F6E73E8EB0C700F525436F900EB2D1D678ED109769

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1164 40b654-40b683 GetModuleHandleW 1165 40b691-40b693 1164->1165 1166 40b685-40b68f LoadLibraryW 1164->1166 1167 40b719-40b733 call 406060 1165->1167 1168 40b699-40b6d7 call 40adb8 call 406824 call 40a4ac call 40adb8 call 406824 call 40a4ac 1165->1168 1166->1165 1168->1167 1184 40b6d9-40b6ea GetCurrentProcess 1168->1184 1186 40b6f0-40b6f2 1184->1186 1187 40b6ec-40b6ee 1184->1187 1188 40b6f6-40b6f8 1186->1188 1187->1186 1189 40b6f4 1187->1189 1188->1167 1190 40b6fa-40b70b GetNativeSystemInfo 1188->1190 1189->1188 1191 40b717 1190->1191 1192 40b70d-40b711 1190->1192 1191->1167 1192->1191 1193 40b713-40b715 1192->1193 1193->1167
                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,0040B734,?,?,00486734,00486680), ref: 0040B67A
                          • LoadLibraryW.KERNEL32(kernel32.dll,kernel32.dll,00000000,0040B734,?,?,00486734,00486680), ref: 0040B68A
                          • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,00000000,kernel32.dll,00000000,0040B734,?,?,00486734,00486680), ref: 0040B6DD
                          • GetNativeSystemInfo.KERNEL32(?,?,?,00486734,00486680), ref: 0040B6FE
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CurrentHandleInfoLibraryLoadModuleNativeProcessSystem
                          • String ID: @z^f~?=Y{fjlzz$kernel32.dll
                          • API String ID: 407697875-2470416289
                          • Opcode ID: cf400a607496727c57d8b79e2d90979a375013f491e65cfe34c017647f0dda60
                          • Instruction ID: cc312165b627e4cdb14975307c8c75a868c5ce4217f7475409fe1e9344262d1c
                          • Opcode Fuzzy Hash: cf400a607496727c57d8b79e2d90979a375013f491e65cfe34c017647f0dda60
                          • Instruction Fuzzy Hash: 2121BE31901315AEC712ABB98C51AEF72A8EB85718F954437F800B73C1EB3C8C1596EE

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1194 43dc14-43dc5a call 404444 GetModuleHandleW RegisterClassW 1197 43dcd4-43dcd8 1194->1197 1198 43dc5c-43dc6e KiUserCallbackDispatcher 1194->1198 1199 43dc73-43dc88 1198->1199 1200 43dc70 1198->1200 1202 43dc8a 1199->1202 1203 43dc8d-43dcc0 call 40a748 1199->1203 1200->1199 1202->1203 1205 43dcc5-43dcd1 1203->1205 1205->1197
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,00486734,00486680,0043F7AF,00000000,0043FD8B,?,?,00486664,00000000,00000000,?,004436A7,00000000,004436EF), ref: 0043DC42
                          • RegisterClassW.USER32(00486C08), ref: 0043DC52
                          • KiUserCallbackDispatcher.NTDLL(00000000,00000000,00486734,00486680,0043F7AF,00000000,0043FD8B,?,?,00486664,00000000,00000000,?,004436A7,00000000,004436EF), ref: 0043DC65
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CallbackClassDispatcherHandleModuleRegisterUser
                          • String ID: Regedit fast jump V1.2$Regedit_fast_jump
                          • API String ID: 2026650474-4282503210
                          • Opcode ID: cc5dc9e7916a9fd9ffcc6e7132985b69ea0554bfb4b0e75fc1fa52871a3855d4
                          • Instruction ID: ff227f2102c6a89d754623d3dc831d9a7ff48536fe2538a773c3bd321e84cfba
                          • Opcode Fuzzy Hash: cc5dc9e7916a9fd9ffcc6e7132985b69ea0554bfb4b0e75fc1fa52871a3855d4
                          • Instruction Fuzzy Hash: 16113AB5B517105FE3A0DF68ED85B6A32E4EB08708F01593EF645DB2D0DBB9A8048B49

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1206 407e68-407e82 GetThreadUILanguage 1207 407e84-407e98 call 407e24 1206->1207 1208 407edd-407ee9 call 407e24 1206->1208 1213 407e9b-407ebf 1207->1213 1214 407f26-407f2a 1208->1214 1215 407eeb-407ef3 1208->1215 1213->1213 1218 407ec1-407ed7 SetThreadPreferredUILanguages 1213->1218 1216 407f7c-407f81 1214->1216 1217 407f2c-407f4a SetThreadPreferredUILanguages call 407e24 1214->1217 1219 407ef5-407ef6 1215->1219 1220 407f16-407f21 call 40687c call 403f50 1215->1220 1229 407f4c-407f5b call 407e00 1217->1229 1230 407f5d-407f67 SetThreadPreferredUILanguages 1217->1230 1218->1208 1223 407efd-407f05 1219->1223 1220->1214 1224 407f10-407f14 1223->1224 1225 407f07-407f0a 1223->1225 1224->1220 1224->1223 1225->1224 1229->1230 1232 407f6d-407f77 call 403f50 * 2 1229->1232 1230->1232 1232->1216
                          APIs
                          • GetThreadUILanguage.KERNELBASE(?,00000000), ref: 00407E79
                          • SetThreadPreferredUILanguages.KERNEL32(00000004,?,?), ref: 00407ED7
                          • SetThreadPreferredUILanguages.KERNEL32(00000000,00000000,?), ref: 00407F34
                          • SetThreadPreferredUILanguages.KERNEL32(00000008,?,?), ref: 00407F67
                            • Part of subcall function 00407E24: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,00000000,?,?,00407EE5), ref: 00407E3B
                            • Part of subcall function 00407E24: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,?,00407EE5), ref: 00407E58
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Thread$LanguagesPreferred$Language
                          • String ID:
                          • API String ID: 2255706666-0
                          • Opcode ID: 64e88a95cc42ba7287f90517dc0aa7ad91b6f4ea3144bac7362c88a4aa254beb
                          • Instruction ID: c64547fa24ced421637df5c0631d32c6e461f39fc0f139bc27309100008ee978
                          • Opcode Fuzzy Hash: 64e88a95cc42ba7287f90517dc0aa7ad91b6f4ea3144bac7362c88a4aa254beb
                          • Instruction Fuzzy Hash: 63317230E0511A9BDB10DFA5D885AAEB7B8FF04304F0045BAE515F72D1D778AE05CB99

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1237 40a748-40a79c call 404348 CreateWindowExW call 404338
                          APIs
                          • CreateWindowExW.USER32(00000000,Regedit_fast_jump,0043D9B0,?,?,?,00000005,?,?,?,?,?), ref: 0040A787
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CreateWindow
                          • String ID: Regedit fast jump V1.2$Regedit_fast_jump
                          • API String ID: 716092398-4282503210
                          • Opcode ID: 52ed684031a3f60b859464a8a3777d52d3d04c0f90a715adbf70d004a935ed74
                          • Instruction ID: a517241aa0c29f4206de9bdbe5aa9f665dbdabb8af3f7c10e9afbeb71ed45618
                          • Opcode Fuzzy Hash: 52ed684031a3f60b859464a8a3777d52d3d04c0f90a715adbf70d004a935ed74
                          • Instruction Fuzzy Hash: 1FF074B6700118AF8B44DE9DDC81DDF77ECEB8D264B054129BA08E3201D634ED1187A4

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1242 408898-4088da call 4060e4 * 2 call 406000 1249 4088e0-4088f0 call 4063e8 1242->1249 1250 408994-4089ae call 406060 1242->1250 1256 4088f2-4088f5 1249->1256 1257 4088f7-4088fc 1249->1257 1256->1257 1258 408923-408932 call 4085d4 1257->1258 1259 4088fe-408907 1257->1259 1266 408943-408960 GetUserDefaultUILanguage call 407f84 call 408700 1258->1266 1267 408934-408941 call 408700 1258->1267 1261 408909-40891c call 406bf0 1259->1261 1262 40891e-408921 1259->1262 1261->1258 1262->1258 1262->1259 1274 408962-408969 1266->1274 1275 408985-408988 1266->1275 1267->1250 1274->1275 1277 40896b-408980 GetSystemDefaultUILanguage call 407f84 call 408700 1274->1277 1275->1250 1276 40898a-40898f call 4087cc 1275->1276 1276->1250 1277->1275
                          APIs
                          • GetUserDefaultUILanguage.KERNEL32(00000000,004089AF,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00408A36,00000000,?,00000105), ref: 00408943
                          • GetSystemDefaultUILanguage.KERNEL32(00000000,004089AF,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00408A36,00000000,?,00000105), ref: 0040896B
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: DefaultLanguage$SystemUser
                          • String ID:
                          • API String ID: 384301227-0
                          • Opcode ID: 60f1217627a62caf21864717d1d1ffa422a3aae7c1e8c1ff22f971d71f3af604
                          • Instruction ID: d299ade2d0cde5e0e6b4ac4308b209071da85b2919ee7819c01997859eb2786b
                          • Opcode Fuzzy Hash: 60f1217627a62caf21864717d1d1ffa422a3aae7c1e8c1ff22f971d71f3af604
                          • Instruction Fuzzy Hash: F8314C70A002099BDB10FBA9C981BAEB7B4AB44304F60447FE481B33D1DB7CAD45CB5A

                          Control-flow Graph

                          APIs
                          • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,00408A76,?,00400000,00444C08), ref: 004089F8
                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,00408A76,?,00400000,00444C08), ref: 00408A49
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: FileLibraryLoadModuleName
                          • String ID:
                          • API String ID: 1159719554-0
                          • Opcode ID: 4b5f65d131dd44abe89ba08c5592b5a98fb8228b2147084425797af8f58d8da9
                          • Instruction ID: ff3da6a666be0d6ffa05517e973b0afc017d91cd30ce0c1a03a3bebe0d5e188f
                          • Opcode Fuzzy Hash: 4b5f65d131dd44abe89ba08c5592b5a98fb8228b2147084425797af8f58d8da9
                          • Instruction Fuzzy Hash: 03116031A4021C9BDB14EB60CD86BDD73B8DB04304F5140BBB509B22D1DA785E848AA8

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1332 40b948-40b981 GetEnvironmentVariableW GetLongPathNameW call 4068d0 1334 40b986-40b98d 1332->1334
                          APIs
                          • GetEnvironmentVariableW.KERNEL32(00000000,?,00000208,004866F8,0043D0E3,00000000,0043D13A,?,00486680,00000001,00000000,00000000,?,00437AE2,?,00000000), ref: 0040B95D
                          • GetLongPathNameW.KERNELBASE(?,?,00000208), ref: 0040B972
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: EnvironmentLongNamePathVariable
                          • String ID:
                          • API String ID: 2057972008-0
                          • Opcode ID: 15b9029d297ef0175ab10ccc5325bcd8575cfd201a7f1f65d94be1b2a52fba4c
                          • Instruction ID: dc435742a546365fcd1a1d8ae548f6de60c2f229cc9ad4274613245ab6a971ca
                          • Opcode Fuzzy Hash: 15b9029d297ef0175ab10ccc5325bcd8575cfd201a7f1f65d94be1b2a52fba4c
                          • Instruction Fuzzy Hash: DAE086FAA0030067D3409794DC89C8B77AD9BC8710F04C53A7699C2291EA3899045762
                          APIs
                          • CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0043A7D9
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CreateFile
                          • String ID:
                          • API String ID: 823142352-0
                          • Opcode ID: e6026e072492908bd2ac8bec586b219015e7024cba609ac1c8d8e6f45bb31c07
                          • Instruction ID: effb560f06ffb086691e009eb791961bbbf3811e5e89f95771296192e7b8b082
                          • Opcode Fuzzy Hash: e6026e072492908bd2ac8bec586b219015e7024cba609ac1c8d8e6f45bb31c07
                          • Instruction Fuzzy Hash: AD213A753402007FE220EB5DDC85F6B33D8EB89B20F504135FA58EB2E0DA70AD099769
                          APIs
                          • GetModuleFileNameW.KERNEL32(00400000,?,0000020A), ref: 00407762
                            • Part of subcall function 004089BC: GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,00408A76,?,00400000,00444C08), ref: 004089F8
                            • Part of subcall function 004089BC: LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,00408A76,?,00400000,00444C08), ref: 00408A49
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: FileModuleName$LibraryLoad
                          • String ID:
                          • API String ID: 4113206344-0
                          • Opcode ID: 358e5c818d4021d8e6dfb070530815b4a7e06f116bb450956073f4b4dbaad43c
                          • Instruction ID: 0c0d8af671378e37ef2f8f11867f171fa8a64e733914af962fdd6609c9811da0
                          • Opcode Fuzzy Hash: 358e5c818d4021d8e6dfb070530815b4a7e06f116bb450956073f4b4dbaad43c
                          • Instruction Fuzzy Hash: 84E0C9B1A003109BCB14EFA8CAC5A563794AB18754F0445AAED68DF386D375E910C7D6
                          APIs
                          • WSAStartup.WS2_32(00000202,0045F0B0), ref: 0042656E
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Startup
                          • String ID:
                          • API String ID: 724789610-0
                          • Opcode ID: 3edcd535bb5d69f2c68979e5168ea0cfe4d657896c45878ceb297bf3764585b6
                          • Instruction ID: 44ae0b0028eb01218a78a6d63e91cbd5235d5447584bcb4ff0911ab5febe76ad
                          • Opcode Fuzzy Hash: 3edcd535bb5d69f2c68979e5168ea0cfe4d657896c45878ceb297bf3764585b6
                          • Instruction Fuzzy Hash: C3B01232362340CED6002B711D0EB4B2E544701ED3F0C40BA7840C50F3C594C00C8B2F
                          APIs
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: InfoSystem
                          • String ID:
                          • API String ID: 31276548-0
                          • Opcode ID: 229177a228d713a9a14fcff98108d9cc5e97c52a54c35a4239ee1928f04f60af
                          • Instruction ID: 2d2288808e5448b03cee85edb9978ee3a4aa03205f7dde6b98229f7bffd1799a
                          • Opcode Fuzzy Hash: 229177a228d713a9a14fcff98108d9cc5e97c52a54c35a4239ee1928f04f60af
                          • Instruction Fuzzy Hash: CCA012104085020BC908E7294D4340F31801940118FC402247C5CA96C2E62D856442DB
                          APIs
                          • ExitProcess.KERNEL32(00000000,0043F16D,00000000,0043F406,?,00486734,00486680,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0043F560), ref: 0043D514
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: ExitProcess
                          • String ID:
                          • API String ID: 621844428-0
                          • Opcode ID: a0191236da1e67e117a1b66312cff757390ddd695378a7c2c551f2080355b048
                          • Instruction ID: 0a4ffff9a5bd2a53c67e581a33889ca5d833dc331c66d4bcfab812d2debc2eb1
                          • Opcode Fuzzy Hash: a0191236da1e67e117a1b66312cff757390ddd695378a7c2c551f2080355b048
                          • Instruction Fuzzy Hash: D7A002BC2010008F8640EB6DDC80D09B3E8AB8E20171040A5F814C7334CF70AD049F15
                          APIs
                          • VirtualAlloc.KERNEL32(00000000,0013FFF0,00001000,00000004,?,00402DBB,FFFFFFDC,00402A8C), ref: 004027BE
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: 6e83b55374e38ba348886defc969fcf363bb13e5c12b6dfeb1a80ee92d75bf7a
                          • Instruction ID: d7f275c02b8ff420755371fd827dccc32f36ce75ba3383e112499b9bd2685023
                          • Opcode Fuzzy Hash: 6e83b55374e38ba348886defc969fcf363bb13e5c12b6dfeb1a80ee92d75bf7a
                          • Instruction Fuzzy Hash: 4AF049B1B803404BEB09DF798E853027AD6A78A304F24803EE508FB7E9E6B48415CB09
                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,00416CA8,?,?), ref: 004080E5
                          • GetProcAddress.KERNEL32(00000000,GetLongPathNameW), ref: 004080F6
                          • FindFirstFileW.KERNEL32(?,?,kernel32.dll,00416CA8,?,?), ref: 004081F6
                          • FindClose.KERNEL32(?,?,?,kernel32.dll,00416CA8,?,?), ref: 00408208
                          • lstrlenW.KERNEL32(?,?,?,?,kernel32.dll,00416CA8,?,?), ref: 00408214
                          • lstrlenW.KERNEL32(?,?,?,?,?,kernel32.dll,00416CA8,?,?), ref: 00408259
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Findlstrlen$AddressCloseFileFirstHandleModuleProc
                          • String ID: GetLongPathNameW$\$kernel32.dll
                          • API String ID: 1930782624-3908791685
                          • Opcode ID: c0075b3f116daeefb17eaddd3ceca8e9c16820536a0e8076f9c9bbe445cf2216
                          • Instruction ID: 9b698579dee47a5ce6c7e6d575a683c27756de6a4c8f4362d234e3b766aaeab0
                          • Opcode Fuzzy Hash: c0075b3f116daeefb17eaddd3ceca8e9c16820536a0e8076f9c9bbe445cf2216
                          • Instruction Fuzzy Hash: 6F41B431E006189BCB10EBA9CD85ADE73B5AF44310F1445FE9944F72D4EBBCAE41CA59
                          APIs
                          • LoadLibraryW.KERNEL32(00000000,00000000,00431AB5,?,00486680,00000000,00000000,?,00437EA6,?,00000000,00437F69,?,00000000,00000000,00000000), ref: 004318A4
                          • GetModuleHandleW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004319C9
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,?), ref: 0040A4D0
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,00000000), ref: 0040A4F2
                            • Part of subcall function 0040ADB8: lstrlenW.KERNEL32(00000000,?,?,00486734,00486680,00425F2B,00000000,00426187,?,00486680,00000000,00000000,?,0043F7A0,00000000,0043FD8B), ref: 0040ADD7
                          • LoadLibraryW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00431A4D
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc$HandleModulelstrlen
                          • String ID: J{lh}lJfdyh}`kelMJ$J{lh}lM@KZlj}`fg$K`}Ke}$M^DHY@'MEE$Mlel}lFkclj}$Mlel}lMJ$M~d@zJfdyfz`}`fgLghkelm$M~dLghkelJfdyfz`}`fg$Nl}J|{zf{@gof$Nl}J|{zf{Yfz$Nl}J|{{lg}Fkclj}$Nl}M@K`}z$Nl}MJ$Zlelj}Fkclj}$nm`:;'MEE$|zl{:;'MEE
                          • API String ID: 9417994-4209024249
                          • Opcode ID: 46f01f209ac1517e14f76089b48cfb9a6098342ea4fa0bf20f801332cc3d7d5f
                          • Instruction ID: d210e15e72295cd6b726f6c75a30a71111ee1474a08510ed185e98678324d597
                          • Opcode Fuzzy Hash: 46f01f209ac1517e14f76089b48cfb9a6098342ea4fa0bf20f801332cc3d7d5f
                          • Instruction Fuzzy Hash: CB517D759113049BCB40FBA6CC828DE77ADEF48318F41993BB401B6396EA7C98144BAD
                          APIs
                          • LoadLibraryW.KERNEL32(00000000,00000000,00426187,?,00486680,00000000,00000000,?,0043F7A0,00000000,0043FD8B,?,?,00486664,00000000,00000000), ref: 00425F34
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,?), ref: 0040A4D0
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,00000000), ref: 0040A4F2
                            • Part of subcall function 0040ADB8: lstrlenW.KERNEL32(00000000,?,?,00486734,00486680,00425F2B,00000000,00426187,?,00486680,00000000,00000000,?,0043F7A0,00000000,0043FD8B), ref: 0040ADD7
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AddressProc$LibraryLoadlstrlen
                          • String ID: ^ZH@fj}e$^ZHNl}Ehz}L{{f{$^ZHZ}h{}|y$`gl}Vg}fh$`gl}Vhmm{$a}fgz$g}faz$jefzlzfjbl}$jfgglj}$nl}afz}kpghdl$nl}zfjbfy}$za|}mf~g$zfjbl}$zlelj}$zlgm$zl}zfjbfy}$~z;V:;'MEE
                          • API String ID: 1729337914-1815106237
                          • Opcode ID: 8f734a74b5820445d690829d2c52daff7a50941e13d6a135ceb200ec9b92a943
                          • Instruction ID: 5c4a131c88f9612ba7b75e74eb8d09919213aae810613ce822a12766d2a0e463
                          • Opcode Fuzzy Hash: 8f734a74b5820445d690829d2c52daff7a50941e13d6a135ceb200ec9b92a943
                          • Instruction Fuzzy Hash: A66153B56113049ACB00FBB5DC828DE77ADEF44319B81857BB401B7297DA7C98148BAE
                          APIs
                          • LoadCursorW.USER32(00000000,00007F00), ref: 00432373
                          • LoadCursorW.USER32(00000000,00007F01), ref: 00432385
                          • LoadCursorW.USER32(00000000,00007F02), ref: 00432397
                          • LoadCursorW.USER32(00000000,00007F03), ref: 004323A9
                          • LoadCursorW.USER32(00000000,00007F04), ref: 004323BB
                          • LoadCursorW.USER32(00000000,00007F80), ref: 004323CD
                          • LoadCursorW.USER32(00000000,00007F81), ref: 004323DF
                          • LoadCursorW.USER32(00000000,00007F82), ref: 004323F1
                          • LoadCursorW.USER32(00000000,00007F83), ref: 00432403
                          • LoadCursorW.USER32(00000000,00007F84), ref: 00432415
                          • LoadCursorW.USER32(00000000,00007F85), ref: 00432427
                          • LoadCursorW.USER32(00000000,00007F86), ref: 00432439
                          • LoadCursorW.USER32(00000000,00007F88), ref: 0043244B
                          • LoadCursorW.USER32(00000000,00007F89), ref: 0043245D
                          • LoadCursorW.USER32(00000000,00007F8A), ref: 0043246F
                          • LoadCursorW.USER32(00000000,00007F8B), ref: 00432481
                          • DestroyIcon.USER32(?,00000000,00007F8B,00000000,00007F8A,00000000,00007F89,00000000,00007F88,00000000,00007F86,00000000,00007F85,00000000,00007F84,00000000), ref: 00432496
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CursorLoad$DestroyIcon
                          • String ID: d
                          • API String ID: 4160882069-2564639436
                          • Opcode ID: bf7c25c0758c83dd8361d29cf79b8cbd3adabcf9f3f7ee9b71b899f0064be9ea
                          • Instruction ID: eca3b65f90c1fbf3b1966a39f07301b07b48cd0bd549073b7d2622b705562fcd
                          • Opcode Fuzzy Hash: bf7c25c0758c83dd8361d29cf79b8cbd3adabcf9f3f7ee9b71b899f0064be9ea
                          • Instruction Fuzzy Hash: 54315974A9C3016AF7507F614883BB639619B00B05F09457AFF4C6E2C7EBB914544BAB
                          APIs
                            • Part of subcall function 0040B4DC: GetModuleHandleW.KERNEL32(kernel32.dll,?,00486680,0043F20A,00000001,00000000,?,00486734,00486680,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040B4E5
                          • OutputDebugStringW.KERNEL32(00000000), ref: 004370E3
                          • Sleep.KERNEL32(000003E8,00000000), ref: 004370ED
                          • OutputDebugStringW.KERNEL32(00000000), ref: 00437113
                          • DuplicateHandle.KERNEL32(00000000), ref: 00437150
                          • Sleep.KERNEL32(0000000A,00000000), ref: 004371B6
                            • Part of subcall function 00436E28: Sleep.KERNEL32(0000000A), ref: 00436E53
                          • DuplicateHandle.KERNEL32(00000000), ref: 004371AD
                          • OutputDebugStringW.KERNEL32(00000000), ref: 00437072
                            • Part of subcall function 0040B918: CompareStringW.KERNEL32(00000400,00000001,00000000,000000FF,00000000,000000FF,00486680,?,00437D4A,?,00000000,00437DA0,?,?,?,00486680), ref: 0040B939
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: String$DebugHandleOutputSleep$Duplicate$CompareModule
                          • String ID: 4gH$BH---------------------$D$NO $OK $SysWOW64\cmd.exe$SysWOW64\conime.exe$SysWOW64\wbem\WmiPrvSE.exe$system32\cmd.exe$wbem\WmiPrvSE.exe
                          • API String ID: 1574471335-2317324235
                          • Opcode ID: 8a35ef10e14ccf33a42443dbd4394bd668ecb9194afc7e98b384c13bee5a23bd
                          • Instruction ID: f05568c7d4dfcf692034845640a9875653ac5b9122fc9bc2ab6e3659e48a1b66
                          • Opcode Fuzzy Hash: 8a35ef10e14ccf33a42443dbd4394bd668ecb9194afc7e98b384c13bee5a23bd
                          • Instruction Fuzzy Hash: BCB15F74604205AFDB10EFA9C885B9E77E8EF49304F10407AF949EB395DB38AD04DB69
                          APIs
                          • ShowWindow.USER32(?,00000001), ref: 0043DE20
                          • SetForegroundWindow.USER32(?), ref: 0043DE58
                          • SetForegroundWindow.USER32(00000000), ref: 0043DE5E
                          • SetFocus.USER32(00000000,00000000,?), ref: 0043DE64
                          • SendMessageW.USER32(00000000,00000100,00000027,00000000), ref: 0043DE78
                          • SendMessageW.USER32(00000000,00000102,?,00000000), ref: 0043DEAD
                          • SendMessageW.USER32(00000000,00000100,00000027,00000000), ref: 0043DEBE
                          • Sleep.KERNEL32(000000C8,00000000,00000100,00000027,00000000,00000000,00000000,?), ref: 0043DED2
                          • SetForegroundWindow.USER32(00000000), ref: 0043DEF1
                          • SetFocus.USER32(00000000,00000000), ref: 0043DEF7
                          • SendMessageW.USER32(00000000,00000100,00000024,00000000), ref: 0043DF06
                          • SendMessageW.USER32(00000000,00000102,?,00000000), ref: 0043DF34
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: MessageSend$Window$Foreground$Focus$ShowSleep
                          • String ID: RegEdit_RegEdit$SysListView32$SysTreeView32$regedit.exe
                          • API String ID: 2024206484-319980174
                          • Opcode ID: a6ada2b0a3f51e6a3f696ae2be7fe5d5f0b08d7e2f9d3f57d138b3c66f60823b
                          • Instruction ID: ba1137598a63224ba6c654e925c15ac110f6c28f76abf197ed28cf60a58f3b56
                          • Opcode Fuzzy Hash: a6ada2b0a3f51e6a3f696ae2be7fe5d5f0b08d7e2f9d3f57d138b3c66f60823b
                          • Instruction Fuzzy Hash: CF41A370A44301BBE221EB58DCC6F3F36E4AB99B04F10442AF584EF2D1D6B8DC40931A
                          APIs
                          • LoadLibraryW.KERNEL32(00000000,00000000,0043007B,?,00486680,00000005,00000000,00000000,?,00437EAB,?,00000000,00437F69,?,00000000,00000000), ref: 0042FED1
                          • LoadLibraryW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,0043007B,?,00486680,00000005,00000000,00000000,?,00437EAB,?), ref: 0042FF30
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,?), ref: 0040A4D0
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,00000000), ref: 0040A4F2
                            • Part of subcall function 0040ADB8: lstrlenW.KERNEL32(00000000,?,?,00486734,00486680,00425F2B,00000000,00426187,?,00486680,00000000,00000000,?,0043F7A0,00000000,0043FD8B), ref: 0040ADD7
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc$lstrlen
                          • String ID: @J@gof$@JFylg$@JJefzl$@JJfdy{lzzf{O{ll$@JNl}@gof$@JZlgmDlzzhnl$@JZlxJfdy{lzzO{hdl$@JZlxJfdy{lzzO{hdlLgm$@JZlxJfdy{lzzO{hdlZ}h{}$DZ_O^:;'MEE$H_@JHY:;'MEE$jhyJ{lh}lJhy}|{l^`gmf~^
                          • API String ID: 268393782-1352645916
                          • Opcode ID: 089b21e976e5bb31fd2e61345d4ec2166a8204ce257b80a6789a54d5fa0b185f
                          • Instruction ID: b421654733045ff7ed06dadf9d5dc222b4f2467a359c68ce7b13b02f7cc919b0
                          • Opcode Fuzzy Hash: 089b21e976e5bb31fd2e61345d4ec2166a8204ce257b80a6789a54d5fa0b185f
                          • Instruction Fuzzy Hash: AA416D75910304ABCB40FBA5DC8299E77BDEF48318F41853BB401B6296EA7C9D144BAE
                          APIs
                          • GetForegroundWindow.USER32(00000000,00428E6C), ref: 00428C51
                          • GetWindowTextW.USER32(?,?,00000200), ref: 00428C9C
                          • EnterCriticalSection.KERNEL32(00486718,[,?,[,?,[,?,[), ref: 00428D2A
                          • lstrlenW.KERNEL32(00000000,00000000,00428DB4,?,00486718,[,?,[,?,[,?,[), ref: 00428D46
                          • LeaveCriticalSection.KERNEL32(00486718,00428DBB,?,[,?,[,?,[), ref: 00428DAE
                          • lstrlenW.KERNEL32(?,00000000,00428E6C), ref: 00428DBF
                          • EnterCriticalSection.KERNEL32(00486718,?,00000000,00428E6C), ref: 00428DDB
                          • LeaveCriticalSection.KERNEL32(00486718,00428E46,00000000,00428E6C), ref: 00428E39
                            • Part of subcall function 0040BAE8: FileTimeToLocalFileTime.KERNEL32(?,?,00000000,0040BC14,?,?,?,00486680), ref: 0040BB24
                            • Part of subcall function 0040BAE8: FileTimeToSystemTime.KERNEL32(?,?,?,?,?,00486680), ref: 0040BB3A
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CriticalSectionTime$File$EnterLeaveWindowlstrlen$ForegroundLocalSystemText
                          • String ID: [$[$[$[$4gH
                          • API String ID: 3203209789-4231738031
                          • Opcode ID: 553d9157399e13fad3db8783b02503fa42ac75fcbc7655638e3930898fa68555
                          • Instruction ID: cd6cea95f2fdff4dc38500494d2ec49a0396264a133fbde8197061e77fe4df3e
                          • Opcode Fuzzy Hash: 553d9157399e13fad3db8783b02503fa42ac75fcbc7655638e3930898fa68555
                          • Instruction Fuzzy Hash: B2511975700608AFDB00DF99DC85E8EBBF9EB49304F814069F504E72A2DB38ED548B68
                          APIs
                          • CreateFontW.GDI32(0000000C,00000006,00000000,00000000,000000C8,00000000,00000000,00000000,00000086,00000000,00000000,00000000,00000000,Arial), ref: 0042BC24
                          • SendMessageW.USER32(?,00000030,?,00000000), ref: 0042BC35
                          • SendMessageW.USER32(?,00000030,?,00000000), ref: 0042BC48
                          • SendMessageW.USER32(?,00000030,?,00000000), ref: 0042BC5B
                          • DefWindowProcW.USER32(?,?,?,?), ref: 0042BD17
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: MessageSend$CreateFontProcWindow
                          • String ID: Arial$BUTTON$EDIT$sQ
                          • API String ID: 369421526-1325858889
                          • Opcode ID: 91081239d773ded964b170543547179827420fda9424dc9f98072b94967eb520
                          • Instruction ID: a2bb92f48b7c9c5c0a2ca1f4238ce0aeea9e52c4f4215f0c1d5f0f2e55f97722
                          • Opcode Fuzzy Hash: 91081239d773ded964b170543547179827420fda9424dc9f98072b94967eb520
                          • Instruction Fuzzy Hash: 185112713903147BF720AA59AC56FAB2768E700B44FA44427F700BF2D1DBB9AC01879E
                          APIs
                          • RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00409200
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: ExceptionRaise
                          • String ID: (R
                          • API String ID: 3997070919-2743311286
                          • Opcode ID: 2ff4fce7c77f293058c68d3cc450b499553666d9f0ef4978638c54b6cd64c25f
                          • Instruction ID: 102a0f0c3ce5befaca2a965e61597f0f4c621f32d06faf9af7fb97871bd771b6
                          • Opcode Fuzzy Hash: 2ff4fce7c77f293058c68d3cc450b499553666d9f0ef4978638c54b6cd64c25f
                          • Instruction Fuzzy Hash: 0CA16F759012099FDB15DFA8D8C0BAEB7B5AB88300F14453EE905B73C2DB78AD45CB58
                          APIs
                          • LoadLibraryW.KERNEL32(00000000,00000000,004286D4,?,?,00486680,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0043F2F2), ref: 004285C3
                          • LoadLibraryW.KERNEL32(00000000,00000000,00000000,004286D4,?,?,00486680,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042866C
                            • Part of subcall function 0040ADB8: lstrlenW.KERNEL32(00000000,?,?,00486734,00486680,00425F2B,00000000,00426187,?,00486680,00000000,00000000,?,0043F7A0,00000000,0043FD8B), ref: 0040ADD7
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,?), ref: 0040A4D0
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,00000000), ref: 0040A4F2
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc$lstrlen
                          • String ID: Lg|dY{fjlzzDfm|elz$Lg|dY{fjlzzlz$Nl}Dfm|elO`elGhdlLq^$Nl}Y{fjlzz@dhnlO`elGhdl^$YzHy`'MEE$^]ZLg|dl{h}lY{fjlzzlz^$^]ZO{llDldf{p$^}zhy`:;'mee
                          • API String ID: 268393782-2693748152
                          • Opcode ID: ffa61641ab19f340686b4a17e72a16458ca9a0a1770ddef71ab0c5d47f97fb7c
                          • Instruction ID: b2abc951f42fac8fa2330dbee562f4288950d046d5c14a321555204371fbe9ee
                          • Opcode Fuzzy Hash: ffa61641ab19f340686b4a17e72a16458ca9a0a1770ddef71ab0c5d47f97fb7c
                          • Instruction Fuzzy Hash: F7318075A123159BCB41FBA5DC428DE77A9EF85318B81813BB400B7682DB3C9D144BAE
                          APIs
                          • lstrcatW.KERNEL32(?, /c "), ref: 0042DD92
                          • lstrcatW.KERNEL32(?,00000000,?, /c "), ref: 0042DDA7
                          • lstrcatW.KERNEL32(?,0042DF9C,?,00000000,?, /c "), ref: 0042DDB8
                            • Part of subcall function 0042B474: lstrlenW.KERNEL32(00000000,00000000,0042B658,?,?,?,00000001), ref: 0042B4AE
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: lstrcat$lstrlen
                          • String ID: /c "$8[B$COMSPEC$D$HfH$|aH
                          • API String ID: 751011610-206186839
                          • Opcode ID: 052fad98bc2d18d6d84550cfe2fd370de0678df48a72e9a094c45fe774489eba
                          • Instruction ID: 81ed9846a7d3f65a68619d801d78e7a443c993b2260b494b6be705ed66106b92
                          • Opcode Fuzzy Hash: 052fad98bc2d18d6d84550cfe2fd370de0678df48a72e9a094c45fe774489eba
                          • Instruction Fuzzy Hash: 9AA14B70A002199FDB11DBA9DC81F9EB3F8FB48304F91417AF544EB291DB79A944CB68
                          APIs
                          • IsValidLocale.KERNEL32(?,00000001,00000000,0041AB5F,?,?,?,?,00000000,00000000), ref: 0041A897
                          • GetThreadLocale.KERNEL32(?,00000001,00000000,0041AB5F,?,?,?,?,00000000,00000000), ref: 0041A8A0
                            • Part of subcall function 0041A844: GetLocaleInfoW.KERNEL32(?,0000000F,0041A950,00000002,0000002C,?,?,?,0041A950), ref: 0041A857
                            • Part of subcall function 0041A7F8: GetLocaleInfoW.KERNEL32(?,?,?,00000100), ref: 0041A816
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Locale$Info$ThreadValid
                          • String ID: AMPM$2$:mm$:mm:ss$AMPM $m/d/yy$mmmm d, yyyy
                          • API String ID: 233154393-3379564615
                          • Opcode ID: 94823e5df3ed155d42373aeca29090d4622e880d401ed27dd137ea8507bc74b4
                          • Instruction ID: 5b46dc006f98231a26cae34b1307f24b2f5ea33c94de3b4259bcb689306f24a8
                          • Opcode Fuzzy Hash: 94823e5df3ed155d42373aeca29090d4622e880d401ed27dd137ea8507bc74b4
                          • Instruction Fuzzy Hash: C77154347011585BDB01EBA5C841BDE76BAEF48304F50807BF515AB286DB3CDEA2879E
                          APIs
                            • Part of subcall function 0040514C: GetTickCount.KERNEL32 ref: 00405183
                            • Part of subcall function 0040514C: GetTickCount.KERNEL32 ref: 0040519B
                            • Part of subcall function 0041A7F8: GetLocaleInfoW.KERNEL32(?,?,?,00000100), ref: 0041A816
                          • GetThreadLocale.KERNEL32(00000000,00000004), ref: 0041B10F
                          • EnumCalendarInfoW.KERNEL32(0041AF60,00000000,00000000,00000004), ref: 0041B11A
                          • GetThreadLocale.KERNEL32(00000000,00000003,0041AF60,00000000,00000000,00000004), ref: 0041B14A
                          • EnumCalendarInfoW.KERNEL32(0041AFEC,00000000,00000000,00000003,0041AF60,00000000,00000000,00000004), ref: 0041B155
                          • GetThreadLocale.KERNEL32(00000000,00000004), ref: 0041B1E6
                          • EnumCalendarInfoW.KERNEL32(0041AF60,00000000,00000000,00000004), ref: 0041B1F1
                          • GetThreadLocale.KERNEL32(00000000,00000003,0041AF60,00000000,00000000,00000004), ref: 0041B223
                          • EnumCalendarInfoW.KERNEL32(0041AFEC,00000000,00000000,00000003,0041AF60,00000000,00000000,00000004), ref: 0041B22E
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: InfoLocale$CalendarEnumThread$CountTick
                          • String ID: B.C.
                          • API String ID: 1601775584-621294921
                          • Opcode ID: bc8247d33fe5370433e2fd6ccc15e77975c242f0979f0cb17630a33c32e31ca2
                          • Instruction ID: d5467c5867d662d48c46f78aef8c8699bdd0855b3e6aaee3d787cd1117f7295e
                          • Opcode Fuzzy Hash: bc8247d33fe5370433e2fd6ccc15e77975c242f0979f0cb17630a33c32e31ca2
                          • Instruction Fuzzy Hash: 2B51F474A016005FD310EB29DC85BAE7766EB49318F14817AF800AB3E2C77E9D55878E
                          APIs
                            • Part of subcall function 0041B6FC: VirtualQuery.KERNEL32(?,?,0000001C,00000000,0041B8A8), ref: 0041B72F
                            • Part of subcall function 0041B6FC: GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 0041B753
                            • Part of subcall function 0041B6FC: GetModuleFileNameW.KERNEL32(MZP,?,00000105), ref: 0041B76E
                            • Part of subcall function 0041B6FC: LoadStringW.USER32(00000000,0000FFEA,?,00000100), ref: 0041B809
                          • WideCharToMultiByte.KERNEL32(00000001,00000000,?,00000000,00000000,00000000,00000000,00000000,00000400,00000000,0041BA19), ref: 0041B955
                          • WideCharToMultiByte.KERNEL32(00000001,00000000,?,00000000,?,00000000,00000000,00000000), ref: 0041B988
                          • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,00000001,00000000,?,00000000,?,00000000,00000000,00000000), ref: 0041B99A
                          • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000,00000001,00000000,?,00000000,?,00000000,00000000,00000000), ref: 0041B9A0
                          • GetStdHandle.KERNEL32(000000F4,0041BA34,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,00000001,00000000,?,00000000,?), ref: 0041B9B4
                          • WriteFile.KERNEL32(00000000,000000F4,0041BA34,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,00000001,00000000,?,00000000), ref: 0041B9BA
                          • LoadStringW.USER32(00000000,0000FFEB,?,00000040), ref: 0041B9DE
                          • MessageBoxW.USER32(00000000,?,?,00002010), ref: 0041B9F8
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: File$ByteCharHandleLoadModuleMultiNameStringWideWrite$MessageQueryVirtual
                          • String ID: @
                          • API String ID: 135118572-216407459
                          • Opcode ID: 5e5b58603649367f128015842687fb9cd620b316ebe1d037fa3627f5dde79ee1
                          • Instruction ID: f4c401843c9c291ca3b94f10bb34d76506db394776c8f349b425d2b96d247647
                          • Opcode Fuzzy Hash: 5e5b58603649367f128015842687fb9cd620b316ebe1d037fa3627f5dde79ee1
                          • Instruction Fuzzy Hash: A43170B5640204BFE710EB95CC82FDA73ACEB04704F6041BAB644F71D1DAB46E80876D
                          APIs
                          • LoadLibraryW.KERNEL32(00000000,00000000,0042D072,?,00000000,00000000,00000000,00000000,00000000,00000000,?,0042C75E,00000000,0042CB8F), ref: 0042CF4F
                            • Part of subcall function 0040ADB8: lstrlenW.KERNEL32(00000000,?,?,00486734,00486680,00425F2B,00000000,00426187,?,00486680,00000000,00000000,?,0043F7A0,00000000,0043FD8B), ref: 0040ADD7
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,?), ref: 0040A4D0
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,00000000), ref: 0040A4F2
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AddressProc$LibraryLoadlstrlen
                          • String ID: @yAeyHy`'MEE$Heefjh}lHgmNl}\myLq]hkelO{fdZ}hjb$Heefjh}lHgmNl}]jyLq]hkelO{fdZ}hjb$Nl}Lq}lgmlm\my]hkel$Nl}Lq}lgmlm]jy]hkel$Zl}]jyLg}{p
                          • API String ID: 1729337914-77311109
                          • Opcode ID: 24fcab706ba486010333c345a5a4c1ee916a8591a563e09837591bfc18d52602
                          • Instruction ID: e9226c6078ce630d9dc907993224ef77e34ecd6abfb291ef623e07e235766894
                          • Opcode Fuzzy Hash: 24fcab706ba486010333c345a5a4c1ee916a8591a563e09837591bfc18d52602
                          • Instruction Fuzzy Hash: 5C318571A102009FC780FBADED89A5E37E9EB45318F81493EB441B72A3D77C59148B6D
                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,GetLogicalProcessorInformation), ref: 00404F9A
                          • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00404FA0
                          • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 00404FB3
                          • GetLastError.KERNEL32(00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 00404FBC
                          • GetLogicalProcessorInformation.KERNEL32(?,?,00000000,00405030,?,00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 00404FE7
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: InformationLogicalProcessor$AddressErrorHandleLastModuleProc
                          • String ID: GetLogicalProcessorInformation$kernel32.dll
                          • API String ID: 1184211438-812649623
                          • Opcode ID: 35201d4d745a74f346a6d86facebae3d15b37a8ffc1e75ce2ae731f58a1f64b0
                          • Instruction ID: 54b7ebe99e7f302da2557309956b5d9292d5a3a304b6d3c4cb150c26000b97f2
                          • Opcode Fuzzy Hash: 35201d4d745a74f346a6d86facebae3d15b37a8ffc1e75ce2ae731f58a1f64b0
                          • Instruction Fuzzy Hash: 8A118471904604AEDF10EBA5CD46B5FB7ACEB44318F2040BBE504B21C2D67D9A80DE5D
                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,GetLogicalProcessorInformation), ref: 00404F9A
                          • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00404FA0
                          • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 00404FB3
                          • GetLastError.KERNEL32(00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 00404FBC
                          • GetLogicalProcessorInformation.KERNEL32(?,?,00000000,00405030,?,00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 00404FE7
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: InformationLogicalProcessor$AddressErrorHandleLastModuleProc
                          • String ID: GetLogicalProcessorInformation$kernel32.dll
                          • API String ID: 1184211438-812649623
                          • Opcode ID: bd05037c37d740ab1b4dc7fa39a3e26f1e2793f84830334b598c92dfe34fff13
                          • Instruction ID: 8199570454523d895cc0032b24ada9d2fbf36891f81a90a2ad8e621ecca28dd4
                          • Opcode Fuzzy Hash: bd05037c37d740ab1b4dc7fa39a3e26f1e2793f84830334b598c92dfe34fff13
                          • Instruction Fuzzy Hash: DC016571904604AADF10EBA18D45A5FB7ACEB04318F20407BF504F61C1D67D9A809E5D
                          APIs
                          • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000,?,?,00405E86,00404023,0040406A,00000000,?), ref: 00405CF1
                          • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000,?,?,00405E86,00404023,0040406A,00000000), ref: 00405CF7
                          • GetStdHandle.KERNEL32(000000F5,00000000,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000,?), ref: 00405D12
                          • WriteFile.KERNEL32(00000000,000000F5,00000000,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000), ref: 00405D18
                          • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00405D36
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: FileHandleWrite$Message
                          • String ID: Error$Runtime error at 00000000
                          • API String ID: 1570097196-2970929446
                          • Opcode ID: 9da2a348520ae705558052009ceb975953c61fbff1b85c89fbedfe3754430604
                          • Instruction ID: 8e6b3ae1d0950b207053b0f6b2d9b368760f02a7951139c7a1ba30855beff3be
                          • Opcode Fuzzy Hash: 9da2a348520ae705558052009ceb975953c61fbff1b85c89fbedfe3754430604
                          • Instruction Fuzzy Hash: CEF096A168578039F710B7A44D0FF5B2248AB85F19F24857FB610B40D2D6FC48D4DA2E
                          APIs
                          • Sleep.KERNEL32(00000000,?), ref: 00402EDA
                          • Sleep.KERNEL32(0000000A,00000000,?), ref: 00402EF4
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: eb1b30fa2819bb7e9c26078b3c9538032f65093cedfba747be72939952c37498
                          • Instruction ID: 3880d568d444d35d86371686d009cb09ec6d1a72a8af32c9c49ca4f9918148e7
                          • Opcode Fuzzy Hash: eb1b30fa2819bb7e9c26078b3c9538032f65093cedfba747be72939952c37498
                          • Instruction Fuzzy Hash: 1471E2716443008FD715DF29CB88B16BBE4AB86314F18817FE488AB3D2D7F89945C79A
                          APIs
                            • Part of subcall function 0040ADB8: lstrlenW.KERNEL32(00000000,?,?,00486734,00486680,00425F2B,00000000,00426187,?,00486680,00000000,00000000,?,0043F7A0,00000000,0043FD8B), ref: 0040ADD7
                          • Sleep.KERNEL32(000001F4), ref: 0043E2BF
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Sleeplstrlen
                          • String ID: D\ymh}l;'lql$HEPhj'hpl$HPHnlg}'hpl$HP]hzb'hpl$HZM\y'lql$_:E`}l'lql$_:E`}lLqy'lql
                          • API String ID: 404571708-2566769197
                          • Opcode ID: c1a7c98b22a2f22b02d8b9bb3fec9843a6aa04b2a1bf0e8831c885995607f298
                          • Instruction ID: acd5230c7a7213d7fe97c03c0ffc7f1d30c64ff60ca5bdd317cc2c1716e60a4c
                          • Opcode Fuzzy Hash: c1a7c98b22a2f22b02d8b9bb3fec9843a6aa04b2a1bf0e8831c885995607f298
                          • Instruction Fuzzy Hash: A4716134A00248DFDB00DB99C181BCDB7B5EF49308F645096E841BB382C779EE54DBAA
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ebb56015c37a3f9fb8dd09f6843bc0f113a4137dadc24ef096fcc9bb47d10006
                          • Instruction ID: d6e953f600fa62a4cb01c07aad8c81ca5a5721795a0ae764ee1700970c6b3899
                          • Opcode Fuzzy Hash: ebb56015c37a3f9fb8dd09f6843bc0f113a4137dadc24ef096fcc9bb47d10006
                          • Instruction Fuzzy Hash: DDC139727102000BD7149E7D9E8932EB7899BC5315F18827FE254EB3D6DABCCD458399
                          APIs
                          • GetProcessHeap.KERNEL32(00000002,00000002,00000000,0042CB8F,?,?,?,?,00000008,00000000,00000000), ref: 0042C7BC
                          • lstrlenW.KERNEL32(00000000,?,00000000,0042CB8F,?,?,?,?,00000008,00000000,00000000), ref: 0042C864
                          • lstrlenW.KERNEL32(00000000,?,00000000,0042CB8F,?,?,?,?,00000008,00000000,00000000), ref: 0042CA7A
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: lstrlen$HeapProcess
                          • String ID: System$TCP$UDP
                          • API String ID: 3046081391-2438800281
                          • Opcode ID: 2e587ecefdbb139cbce253a7460bddf1e7960b3cb139078374ca670e3306fb08
                          • Instruction ID: 35f293c671a670b9e6b81fc65c15e8a90b22f42eb6ca05dc6d7e89f087aa4173
                          • Opcode Fuzzy Hash: 2e587ecefdbb139cbce253a7460bddf1e7960b3cb139078374ca670e3306fb08
                          • Instruction Fuzzy Hash: 57D18F31B40219AFDB00EBA5EC86FAEBBB5AF48704F504466F510F7292D778A905CB58
                          APIs
                          • MessageBoxA.USER32(00000000,?,004024F8,00002010), ref: 00403CA0
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Message
                          • String ID: $0$@$7$\$@$$@
                          • API String ID: 2030045667-1228603798
                          • Opcode ID: ac19fcd5adda951769c91ee1a6c17dc81187d7c120c71253a4f0a3854113e247
                          • Instruction ID: e812cd3dc2fef7569f4f822b6a4b970610b3f81895bdd3cedabc248f3003e63a
                          • Opcode Fuzzy Hash: ac19fcd5adda951769c91ee1a6c17dc81187d7c120c71253a4f0a3854113e247
                          • Instruction Fuzzy Hash: 18B1CA30B042548BDB21DF2DC885B997BF8AB4A709F0441FAE449F7382CB785E85CB59
                          APIs
                          • lstrlenW.KERNEL32(00000000,00000000,0042E424,?,?,00000000,00000000), ref: 0042E0BD
                          • lstrlenW.KERNEL32(?,00000000,00000000,0042E424,?,?,00000000,00000000), ref: 0042E0C8
                          • Sleep.KERNEL32(00000001), ref: 0042E263
                            • Part of subcall function 0042DFF8: lstrlenW.KERNEL32(00000000,?,0042E25D), ref: 0042E004
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: lstrlen$Sleep
                          • String ID: *.*$.$\
                          • API String ID: 429307061-3468707253
                          • Opcode ID: 12244ae98e7790e0bcfe0dc87e16b914e91ade2e89f473010b1b4e49b66439e0
                          • Instruction ID: 874b38f9c15a16064f5124428c196f5401a35f00216acdfa7908766dcb98f518
                          • Opcode Fuzzy Hash: 12244ae98e7790e0bcfe0dc87e16b914e91ade2e89f473010b1b4e49b66439e0
                          • Instruction Fuzzy Hash: BDA193306002299FDB60EB65EC85B9D77F8EB48304F9145F6E409E32A1DB789E84CF58
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterExistsFileLeavePath
                          • String ID: " "$.exe$/Update$HfH
                          • API String ID: 3310751803-1929450815
                          • Opcode ID: aa955d9050df199ca6804f25a1b4324a74b4dc30d2bbef1dc68e39435076f8d9
                          • Instruction ID: 609c13bec061a5d4637fb112db9b101bfdfe75ff76c94aae5f827595d8871324
                          • Opcode Fuzzy Hash: aa955d9050df199ca6804f25a1b4324a74b4dc30d2bbef1dc68e39435076f8d9
                          • Instruction Fuzzy Hash: 6951A374604205AFDB10EBA9C8A2B9F73E4EB0D344F105066FA10D7391DB7DAD049B99
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000), ref: 0043CDCF
                          • LoadLibraryW.KERNEL32(00000000,00000000), ref: 0043CE1C
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: HandleLibraryLoadModule
                          • String ID: *.*$XXX_InfoW$XXX_Plugs\$XXX_Starting
                          • API String ID: 4133054770-2785245216
                          • Opcode ID: f71acd30243d42f49c7826a7ce0a7bd6944551d3629e193985cfb457d1c80ab8
                          • Instruction ID: 5c59f4733bd3e6e152ae9da63c784154abf35261a6166e2ebc2e54f53956f2ea
                          • Opcode Fuzzy Hash: f71acd30243d42f49c7826a7ce0a7bd6944551d3629e193985cfb457d1c80ab8
                          • Instruction Fuzzy Hash: 9F518471A056199FCB10EB65DC89A8EB7F5EF48304F1181FBA409F3291DB389E548F58
                          APIs
                            • Part of subcall function 004265F0: htons.WS2_32(?), ref: 00426637
                            • Part of subcall function 004265F0: gethostbyname.WS2_32(00000000), ref: 00426665
                            • Part of subcall function 004265F0: connect.WS2_32(?,00000008,00000010), ref: 00426690
                            • Part of subcall function 004265F0: WSAGetLastError.WS2_32(?,?,00000000,00000000), ref: 004266B9
                            • Part of subcall function 004265F0: Sleep.KERNEL32(00000002,?,?,00000000,00000000), ref: 004266CA
                            • Part of subcall function 004264A8: setsockopt.WS2_32(?,00000006,00000001,?,00000004), ref: 004264C7
                            • Part of subcall function 00426468: setsockopt.WS2_32(?,0000FFFF,00001001,?,00000004), ref: 0042647E
                            • Part of subcall function 0042B474: lstrlenW.KERNEL32(00000000,00000000,0042B658,?,?,?,00000001), ref: 0042B4AE
                            • Part of subcall function 0040B948: GetEnvironmentVariableW.KERNEL32(00000000,?,00000208,004866F8,0043D0E3,00000000,0043D13A,?,00486680,00000001,00000000,00000000,?,00437AE2,?,00000000), ref: 0040B95D
                            • Part of subcall function 0040B948: GetLongPathNameW.KERNELBASE(?,?,00000208), ref: 0040B972
                          • Sleep.KERNEL32(000001F4,0042E635,?,00000064,00000000,00000000,0042E65B,?,00000000,0042E67D), ref: 0042E61E
                            • Part of subcall function 0042E088: lstrlenW.KERNEL32(00000000,00000000,0042E424,?,?,00000000,00000000), ref: 0042E0BD
                            • Part of subcall function 0042E088: lstrlenW.KERNEL32(?,00000000,00000000,0042E424,?,?,00000000,00000000), ref: 0042E0C8
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: lstrlen$Sleepsetsockopt$EnvironmentErrorLastLongNamePathVariableconnectgethostbynamehtons
                          • String ID: 8[B$:$HfH$WINDIR$\$\Temp
                          • API String ID: 916843999-738507572
                          • Opcode ID: a8029911b969878f78ac764834f3b201bdd0417c20dfb5ba0b09e840580c8ea6
                          • Instruction ID: ba3bdb42cb812209f095133bc7201274ca052839750dfdcc6e646bdf85a6b18d
                          • Opcode Fuzzy Hash: a8029911b969878f78ac764834f3b201bdd0417c20dfb5ba0b09e840580c8ea6
                          • Instruction Fuzzy Hash: E2515AB4B10610AFD741EFAAEC51A5A37E5FB19308F82847AE400973E1EB789C41CB5C
                          APIs
                            • Part of subcall function 004053E8: GetCurrentThreadId.KERNEL32 ref: 004053EB
                          • GetTickCount.KERNEL32 ref: 00405183
                          • GetTickCount.KERNEL32 ref: 0040519B
                          • GetCurrentThreadId.KERNEL32 ref: 004051CB
                          • GetTickCount.KERNEL32 ref: 004051F6
                          • GetTickCount.KERNEL32 ref: 0040522D
                          • GetTickCount.KERNEL32 ref: 00405257
                          • GetCurrentThreadId.KERNEL32 ref: 004052C7
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CountTick$CurrentThread
                          • String ID:
                          • API String ID: 3968769311-0
                          • Opcode ID: f9d61921e35b482ef1f14d4eaeacaa075d63589b9816c89e841c04f0b3fb69e2
                          • Instruction ID: e96b3358484ed09efb32f7bf407c562274a0588feb759182786de9b46f441b21
                          • Opcode Fuzzy Hash: f9d61921e35b482ef1f14d4eaeacaa075d63589b9816c89e841c04f0b3fb69e2
                          • Instruction Fuzzy Hash: EF418D30608B419FD721EE78C58431FBAD1EF94354F15897EE8D89B3C1EA7898818F5A
                          APIs
                          • InternetOpenW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0040BC87
                          • InternetOpenUrlW.WININET(00000000,?,00000000,00000000,40000000,00000000), ref: 0040BCB8
                          • HttpQueryInfoW.WININET(00000000,20000005,?,00000004,?), ref: 0040BCFA
                          • InternetCloseHandle.WININET(00000000), ref: 0040BD8F
                            • Part of subcall function 0040B634: VirtualAlloc.KERNEL32(00000000,00000000,00001000,00000004,00428AA0,?,?,00486734,00486680,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040B63E
                          • InternetReadFile.WININET(00000000,?,?,?), ref: 0040BD2F
                            • Part of subcall function 0040B644: VirtualFree.KERNEL32(00000000,00000000,00008000,00428B66,?,?,00486734,00486680,00000000,00000000,00000000,00000000,00000000,00000000,?,00437E88), ref: 0040B64C
                          • InternetCloseHandle.WININET(00000000), ref: 0040BDAE
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Internet$CloseHandleOpenVirtual$AllocFileFreeHttpInfoQueryRead
                          • String ID:
                          • API String ID: 436716311-0
                          • Opcode ID: 3e7517a180f2519e9ef8862004f9ea7d21659a34cfeb77de3d18cea408e80831
                          • Instruction ID: 2d81d751fc6afc2710d3bfc5214d13ec27d882b95dc00282e94316269f0eb743
                          • Opcode Fuzzy Hash: 3e7517a180f2519e9ef8862004f9ea7d21659a34cfeb77de3d18cea408e80831
                          • Instruction Fuzzy Hash: 90417975A04208AFDB11DFA4DC95BAEB7B8EB49700F114476F505E3290DB389900CB68
                          APIs
                          • Sleep.KERNEL32(00000000,FFFFFFDC,00402A8C), ref: 00402B77
                          • Sleep.KERNEL32(0000000A,00000000,FFFFFFDC,00402A8C), ref: 00402B8D
                          • Sleep.KERNEL32(00000000,?,?,FFFFFFDC,00402A8C), ref: 00402BBB
                          • Sleep.KERNEL32(0000000A,00000000,?,?,FFFFFFDC,00402A8C), ref: 00402BD1
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: 00e817329ed30a61a1e3ce9785030074bf56165d3748735972e8587115fb55d2
                          • Instruction ID: e9b8b7081cf30ab9f8610f5ddeb7dffbd4721761cd41d76955e75723a6189a5d
                          • Opcode Fuzzy Hash: 00e817329ed30a61a1e3ce9785030074bf56165d3748735972e8587115fb55d2
                          • Instruction Fuzzy Hash: 89C149766013108FDB19CF29DB88316BBE0AB86314F18827FD444AB3D5C7B8D955CB9A
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID:
                          • String ID: $0$@$7$\$@
                          • API String ID: 0-4266993835
                          • Opcode ID: 0898838d16f207543cc06ffe88efb152eba2014c6d30357a487cafd616e18d10
                          • Instruction ID: b3e4678ffb9dae527c939fda3aba35b48a12a95a819a0055bfac3d4281ef8523
                          • Opcode Fuzzy Hash: 0898838d16f207543cc06ffe88efb152eba2014c6d30357a487cafd616e18d10
                          • Instruction Fuzzy Hash: 1881C730B042548FDB21DF2DC885B99BBF8AB4A709F0441F6E049F7382DB785A85CB59
                          APIs
                          • VirtualQuery.KERNEL32(?,?,0000001C,00000000,0041B8A8), ref: 0041B72F
                          • GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 0041B753
                          • GetModuleFileNameW.KERNEL32(MZP,?,00000105), ref: 0041B76E
                          • LoadStringW.USER32(00000000,0000FFEA,?,00000100), ref: 0041B809
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: FileModuleName$LoadQueryStringVirtual
                          • String ID: MZP
                          • API String ID: 3990497365-2889622443
                          • Opcode ID: 33485dccd570a2a0afe39b740a752237986253bc9c59ef7515bff66579f2bf26
                          • Instruction ID: c27a278696c1af428c112a5138f6c708912e0e629acd6ed950e1bdc93ff39661
                          • Opcode Fuzzy Hash: 33485dccd570a2a0afe39b740a752237986253bc9c59ef7515bff66579f2bf26
                          • Instruction Fuzzy Hash: 19411F70A002589FDB20EF65CC81BCAB7B9EB88314F0040FAE508E7281D7799E95CF59
                          APIs
                          • GetWindowTextW.USER32(?,00485D2C,00000200), ref: 0042C179
                          • IsWindowVisible.USER32(?), ref: 0042C239
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Window$TextVisible
                          • String ID: (]H$,]H$,_H
                          • API String ID: 1670992164-2296990632
                          • Opcode ID: e467966b9a8c0fefa1ccc827f78f29989ba23366127c3093c9771cb756a8b563
                          • Instruction ID: d95932ed8a37d93c08fe9a1a55fadeb8aae1f262f1f2142a84b6d5f9324e449e
                          • Opcode Fuzzy Hash: e467966b9a8c0fefa1ccc827f78f29989ba23366127c3093c9771cb756a8b563
                          • Instruction Fuzzy Hash: 7C319D31B00214AFEB01EBA1DC82EAE77B5EF48704F518477B50172191CA7D9D15972C
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,?,00465CA0,0042C023,?,00000064,00000000,00000000,0042C0D8), ref: 0042BDB6
                          • RegisterClassW.USER32(00465CD8), ref: 0042BDC6
                          • ShowWindow.USER32(?,00000001,00000000,?,00000000,00000000,0000015E,000001F4,?,?,100F0080), ref: 0042BE64
                          • SetForegroundWindow.USER32(?), ref: 0042BE6F
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Window$ClassForegroundHandleModuleRegisterShow
                          • String ID: RAT_Chat
                          • API String ID: 3776541383-1508558188
                          • Opcode ID: 3da53fab4287da6ac28a1f121945f4a6c5748e60b917b128f9c393c7511c022f
                          • Instruction ID: e3e0ff72afeb0ca95b62b861ee8d58a389ac77bdb3e2b56e9a420627b55a5118
                          • Opcode Fuzzy Hash: 3da53fab4287da6ac28a1f121945f4a6c5748e60b917b128f9c393c7511c022f
                          • Instruction Fuzzy Hash: DA211D75740B109BE710DF68EC45BA633E4EB04708F94853AF644DB3D1EBB9A804878E
                          APIs
                          • GetUserObjectInformationW.USER32(00000000,00000002,?,00000100,?,?,004328AD,?,00000000,0043294A), ref: 0040E886
                          • OpenWindowStationW.USER32(winsta0,00000000,0000037F), ref: 0040E8A8
                          • SetProcessWindowStation.USER32(00000000,?,004328AD,?,00000000,0043294A), ref: 0040E8B4
                          • OpenDesktopW.USER32(?,00000000,00000000,000001FF), ref: 0040E8CB
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: OpenStationWindow$DesktopInformationObjectProcessUser
                          • String ID: winsta0
                          • API String ID: 3539518509-3440837585
                          • Opcode ID: 159005afdda627ef5a1ff0f0402107ecf24fb7b8575005aeb33b992befac07c1
                          • Instruction ID: 07935d2aa83b5d675ff6c58e78f2920d5cf53bccb1719f4e7f0ccf1e20ed6600
                          • Opcode Fuzzy Hash: 159005afdda627ef5a1ff0f0402107ecf24fb7b8575005aeb33b992befac07c1
                          • Instruction Fuzzy Hash: 5C1124752443016FE310EBA9DC81F6B73EC6B45700F44483AB984EB3D1DAB9ED14972A
                          APIs
                            • Part of subcall function 004265CC: socket.WS2_32(00000002,00000001,00000000), ref: 004265DB
                          • htons.WS2_32(?), ref: 00426637
                          • gethostbyname.WS2_32(00000000), ref: 00426665
                          • connect.WS2_32(?,00000008,00000010), ref: 00426690
                          • WSAGetLastError.WS2_32(?,?,00000000,00000000), ref: 004266B9
                          • Sleep.KERNEL32(00000002,?,?,00000000,00000000), ref: 004266CA
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: ErrorLastSleepconnectgethostbynamehtonssocket
                          • String ID:
                          • API String ID: 2864911191-0
                          • Opcode ID: 9f28b064d525dcda550846062e3a93fcd66620e325ef5e3ebc0512ee41a5b598
                          • Instruction ID: 0dd1b41a93d19dc09989b8233b659783f6ed969359d15ac89dd0c57dc2224665
                          • Opcode Fuzzy Hash: 9f28b064d525dcda550846062e3a93fcd66620e325ef5e3ebc0512ee41a5b598
                          • Instruction Fuzzy Hash: 50319F74A002149FCB10DFA5D985A9E77B8FF48314F5284BAE904EB291D738CD44CB69
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,?,00486680,00000001,0000000F,?,00437564,00000000,00437B2F,?,00486734,00486680,00000000,00000000,?,0043F7E0), ref: 0040BA70
                          • FindResourceW.KERNEL32(00000000,00000000,0000000A,00000000,?,00486680,00000001,0000000F,?,00437564,00000000,00437B2F,?,00486734,00486680,00000000), ref: 0040BA82
                          • LoadResource.KERNEL32(00000000,00000000,00000000,0040BAD8,?,?,00486680,00000001,0000000F,?,00437564,00000000,00437B2F,?,00486734,00486680), ref: 0040BAA4
                          • LockResource.KERNEL32(00000000,?,?,00486680,00000001,0000000F,?,00437564,00000000,00437B2F,?,00486734,00486680,00000000,00000000), ref: 0040BAB1
                          • FreeResource.KERNEL32(00000000,0040BADF,00000001,0000000F,?,00437564,00000000,00437B2F,?,00486734,00486680,00000000,00000000,?,0043F7E0,00000000), ref: 0040BAD1
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Resource$FindFreeHandleLoadLockModule
                          • String ID:
                          • API String ID: 2355082082-0
                          • Opcode ID: 3f0eb233740970fe425e4189b138455d4fb9001c1d9e8dd3634329448ef4e4b8
                          • Instruction ID: 1a3ff52bf1ac6d4834992fad00352ded9c14d174eaf5e093c7de7b05a94e74d9
                          • Opcode Fuzzy Hash: 3f0eb233740970fe425e4189b138455d4fb9001c1d9e8dd3634329448ef4e4b8
                          • Instruction Fuzzy Hash: 3101F776B41304BFE701ABB9AC85B2ABBECDB89715F150436F506E3281DA799D00866C
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,?,00486680,00000001,0000000F,?,00437564,00000000,00437B2F,?,00486734,00486680,00000000,00000000,?,0043F7E0), ref: 0040BA70
                          • FindResourceW.KERNEL32(00000000,00000000,0000000A,00000000,?,00486680,00000001,0000000F,?,00437564,00000000,00437B2F,?,00486734,00486680,00000000), ref: 0040BA82
                          • LoadResource.KERNEL32(00000000,00000000,00000000,0040BAD8,?,?,00486680,00000001,0000000F,?,00437564,00000000,00437B2F,?,00486734,00486680), ref: 0040BAA4
                          • LockResource.KERNEL32(00000000,?,?,00486680,00000001,0000000F,?,00437564,00000000,00437B2F,?,00486734,00486680,00000000,00000000), ref: 0040BAB1
                          • FreeResource.KERNEL32(00000000,0040BADF,00000001,0000000F,?,00437564,00000000,00437B2F,?,00486734,00486680,00000000,00000000,?,0043F7E0,00000000), ref: 0040BAD1
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Resource$FindFreeHandleLoadLockModule
                          • String ID:
                          • API String ID: 2355082082-0
                          • Opcode ID: 42ae530f8878b1a679c5bb975ed892b2aba36b703ce15ae7888e2b82efbc6652
                          • Instruction ID: 7bba7a99e39e5116ed02c681e27dab3f3a696a6cdaaff79990abd0375f4619b6
                          • Opcode Fuzzy Hash: 42ae530f8878b1a679c5bb975ed892b2aba36b703ce15ae7888e2b82efbc6652
                          • Instruction Fuzzy Hash: 2201A2B5B41300BFE711ABB59C99B2B7AECDB49704F154436F502E3291D6B89D008A6C
                          APIs
                          • OpenFileMappingW.KERNEL32(000F001F,00000000,00000000,00000000,0042AC2E,?,?,?,00000001,0000000D,00000000,00000000,?,0042A482), ref: 0042A825
                            • Part of subcall function 0040ACA4: lstrlenW.KERNEL32(00000000,?,?,00486730,?), ref: 0040ACDD
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: FileMappingOpenlstrlen
                          • String ID: /f&TleQ $GG-Team$Hr,g:
                          • API String ID: 290263465-1553010781
                          • Opcode ID: 423f67120d0e721894976c1fa9bc8b348bc44398491a29f8b1c635831bf7f120
                          • Instruction ID: 88ff79b281bd7af9570e5b325977c4e31f3e4296546c137c43f7e8822453c311
                          • Opcode Fuzzy Hash: 423f67120d0e721894976c1fa9bc8b348bc44398491a29f8b1c635831bf7f120
                          • Instruction Fuzzy Hash: 51B1D630740629AFDB04DBA2DD41FEEB3B6FF88705F904126B500B61C1D7BC69249B9A
                          APIs
                          • lstrlenW.KERNEL32(00000000,00000000,0042716D), ref: 00426FCA
                          • CharUpperW.USER32(?,00000000,00000000,0042716D), ref: 00426FEE
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CharUpperlstrlen
                          • String ID: :$|/Is\|
                          • API String ID: 108730823-2327451341
                          • Opcode ID: ba4b3e01cebbaa481af6e6a77b06f47b08762847adc1fc8c6b2a5010666fc814
                          • Instruction ID: 93d54500de09d398291ab5124b2714aa455b2298479d6696639ba076840c05b2
                          • Opcode Fuzzy Hash: ba4b3e01cebbaa481af6e6a77b06f47b08762847adc1fc8c6b2a5010666fc814
                          • Instruction Fuzzy Hash: 24514934A041299BDB00EF99D841AEEBBB5FF48304F51807BF405B3351D7799A25CBA9
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID:
                          • String ID: ,fH
                          • API String ID: 0-2243322645
                          • Opcode ID: 444ee87d13a1e58113508bf6b43ac74097dd93d3b7794e398f154b7624a7e6a3
                          • Instruction ID: 3e325106465cb2dd41976618392b57abfc7347bc5e4f7f75e8d06feff1e239a5
                          • Opcode Fuzzy Hash: 444ee87d13a1e58113508bf6b43ac74097dd93d3b7794e398f154b7624a7e6a3
                          • Instruction Fuzzy Hash: A7414D357052409FDB01DF99C9C0FE737A4AB0A750F1801BAFE499F68AC3A898418B76
                          APIs
                          • GetCurrentThreadId.KERNEL32 ref: 00405D81
                          • FreeLibrary.KERNEL32(00400000,?,00000000,?,?,00405E86,00404023,0040406A,00000000,?,00404083,?,?,?,?,00486734), ref: 00405E22
                          • ExitProcess.KERNEL32(00000000,?,00000000,?,?,00405E86,00404023,0040406A,00000000,?,00404083,?,?,?,?,00486734), ref: 00405E5E
                            • Part of subcall function 00405CB8: GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000,?,?,00405E86,00404023,0040406A,00000000,?), ref: 00405CF1
                            • Part of subcall function 00405CB8: WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000,?,?,00405E86,00404023,0040406A,00000000), ref: 00405CF7
                            • Part of subcall function 00405CB8: GetStdHandle.KERNEL32(000000F5,00000000,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000,?), ref: 00405D12
                            • Part of subcall function 00405CB8: WriteFile.KERNEL32(00000000,000000F5,00000000,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000), ref: 00405D18
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: FileHandleWrite$CurrentExitFreeLibraryProcessThread
                          • String ID: MZP
                          • API String ID: 3490077880-2889622443
                          • Opcode ID: d90ee3a893a0dc72c3848248a1873dcb725225a210599cc20fd1a5d12a6e168f
                          • Instruction ID: e92a30f647e059f84c3662a5853805e55c155ad4ddc6fc357ea8e0081ace97c3
                          • Opcode Fuzzy Hash: d90ee3a893a0dc72c3848248a1873dcb725225a210599cc20fd1a5d12a6e168f
                          • Instruction Fuzzy Hash: 62315C34601B418BE761ABB9A48935B76E0EF45318F14483FE581A72D2D77CA884CF5E
                          APIs
                          • GetCurrentThreadId.KERNEL32 ref: 00405D81
                          • FreeLibrary.KERNEL32(00400000,?,00000000,?,?,00405E86,00404023,0040406A,00000000,?,00404083,?,?,?,?,00486734), ref: 00405E22
                          • ExitProcess.KERNEL32(00000000,?,00000000,?,?,00405E86,00404023,0040406A,00000000,?,00404083,?,?,?,?,00486734), ref: 00405E5E
                            • Part of subcall function 00405CB8: GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000,?,?,00405E86,00404023,0040406A,00000000,?), ref: 00405CF1
                            • Part of subcall function 00405CB8: WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000,?,?,00405E86,00404023,0040406A,00000000), ref: 00405CF7
                            • Part of subcall function 00405CB8: GetStdHandle.KERNEL32(000000F5,00000000,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000,?), ref: 00405D12
                            • Part of subcall function 00405CB8: WriteFile.KERNEL32(00000000,000000F5,00000000,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,00405D71,?,00000000), ref: 00405D18
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: FileHandleWrite$CurrentExitFreeLibraryProcessThread
                          • String ID: MZP
                          • API String ID: 3490077880-2889622443
                          • Opcode ID: 476567bd706faa08b2860b4bdb782b6af1774b5e27a4e3545c261a0e26a7b744
                          • Instruction ID: b38e6e20968f9dd51013dd86da7a5adcd4d42222583a8947ff30ec8df154a19c
                          • Opcode Fuzzy Hash: 476567bd706faa08b2860b4bdb782b6af1774b5e27a4e3545c261a0e26a7b744
                          • Instruction Fuzzy Hash: 7E316D34600B418BE760AB69E48971B76E4EF45318F14443FE580A73D2D77CA884CF5D
                          APIs
                          • MessageBoxW.USER32(00000000,Not Config,0040B610,?), ref: 0040B5FB
                          • MessageBoxW.USER32(00000000,Not Config,GGT,?), ref: 0040B606
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Message
                          • String ID: GGT$Not Config
                          • API String ID: 2030045667-3135470170
                          • Opcode ID: 4b8a4c59b1f7a2e123fa8cac472319ef520fd058445deb380fb68a97e84f0c4a
                          • Instruction ID: 09803daf9443879b7dc9e8754dbd7872eb60d7eb9ad1f4574c2174cc229b4f7d
                          • Opcode Fuzzy Hash: 4b8a4c59b1f7a2e123fa8cac472319ef520fd058445deb380fb68a97e84f0c4a
                          • Instruction Fuzzy Hash: 0FD0A9A112432875D4202A130C02DB32A2CCC917A03088C3BB90472182863BAC2040FF
                          APIs
                          • EnterCriticalSection.KERNEL32(0048664C,00000000,00439427,?,?,?,?,00000000,00000000), ref: 004392B4
                          • lstrlenW.KERNEL32(00000000,?,00439448,?,00439448,?,00439448,?,?,0048664C,00000000,00439427), ref: 00439396
                          • LeaveCriticalSection.KERNEL32(0048664C,00439404,00439427,?,?,?,?,00000000,00000000), ref: 004393F7
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterLeavelstrlen
                          • String ID: 4gH
                          • API String ID: 3224049430-2392367260
                          • Opcode ID: 47defe703287ea594ae1c07abb13b2d47f8dddb316f1a99fff683f0de99b3499
                          • Instruction ID: 4ccfdad5408f303f1bc6ef96d1109fe59f5890f2a7af6574d1485d49e1ed1b7c
                          • Opcode Fuzzy Hash: 47defe703287ea594ae1c07abb13b2d47f8dddb316f1a99fff683f0de99b3499
                          • Instruction Fuzzy Hash: 9541A031604208AFDB01EBA5CC42F9E77F8EB4D714F614076F500F72D1DAB9AE119A69
                          APIs
                          • VirtualAlloc.KERNEL32(00000000,00001400,00001000,00000004,00000000,0040B246,?,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040B123
                          • lstrlenW.KERNEL32(00000000,?,?,00000000,00001400,00001000,00000004,00000000,0040B246,?,?,00000000,00000000,00000000,00000000,00000000), ref: 0040B1DF
                          • VirtualFree.KERNEL32(00000000,00000000,00008000,0040B218,00001000,00000004,00000000,0040B246,?,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040B20B
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Virtual$AllocFreelstrlen
                          • String ID: 0.0.0.0
                          • API String ID: 1037993708-3771769585
                          • Opcode ID: 6564ce073df12d48193ef6cc336d6408e1dcfe9c11b139c9fa22ed32b664ca5a
                          • Instruction ID: d9e483307b11907a1b336cc8d58400cd9b3fb6a4ef8d040ba9d6bd8e813edc8e
                          • Opcode Fuzzy Hash: 6564ce073df12d48193ef6cc336d6408e1dcfe9c11b139c9fa22ed32b664ca5a
                          • Instruction Fuzzy Hash: DC419270A40209AFEB01EB95CC92B9E77B8EB48304F5044BAF101F72D1D778AE14DB99
                          APIs
                          • GetLogicalDriveStringsW.KERNEL32(00000202,?,00000000,00428009), ref: 00427F25
                          • QueryDosDeviceW.KERNEL32(00000000,?,?,00000072,00000202,?,00000000,00428009), ref: 00427F7B
                          • lstrlenW.KERNEL32(?,00000000,?,?,00000072,00000202,?,00000000,00428009), ref: 00427F87
                          • StrCmpNIW.SHLWAPI(?,?,00000000,?,00000000,?,?,00000072,00000202,?,00000000,00428009), ref: 00427F97
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: DeviceDriveLogicalQueryStringslstrlen
                          • String ID:
                          • API String ID: 243930641-0
                          • Opcode ID: a7e4fb706dae23cce2e3905365d5b76be73495882ece122b121f7eb275b18a5a
                          • Instruction ID: c93e83704bf87b4d3c7b7635578ed03522896ac4e1c9abb0733d05025df9e800
                          • Opcode Fuzzy Hash: a7e4fb706dae23cce2e3905365d5b76be73495882ece122b121f7eb275b18a5a
                          • Instruction Fuzzy Hash: 51318775A052189FDB60EB25DC49A9E73B8EB48300F5185FBF409E3251EE38DE548F58
                          APIs
                          • VirtualAlloc.KERNEL32(00000000,00001400,00001000,00000004,00000000,0040B246,?,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040B123
                          • lstrlenW.KERNEL32(00000000,?,?,00000000,00001400,00001000,00000004,00000000,0040B246,?,?,00000000,00000000,00000000,00000000,00000000), ref: 0040B1DF
                          • VirtualFree.KERNEL32(00000000,00000000,00008000,0040B218,00001000,00000004,00000000,0040B246,?,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040B20B
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Virtual$AllocFreelstrlen
                          • String ID: 0.0.0.0
                          • API String ID: 1037993708-3771769585
                          • Opcode ID: 95f96f50283596cd0208414d3cbcbce02a8cb6110614ffbb8205cf7f9e9816dc
                          • Instruction ID: 2a2c1df8ae4463708a3bec380d016629bdb2d6206de091ed7e9d638ff9ecaf91
                          • Opcode Fuzzy Hash: 95f96f50283596cd0208414d3cbcbce02a8cb6110614ffbb8205cf7f9e9816dc
                          • Instruction Fuzzy Hash: 4F217C70640204AFEB11EBA9C8A6B9E77A8EB49304F1044BAF501F76D1C7789950C699
                          APIs
                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0042BA43
                          • SendMessageW.USER32(?,0000000D,?,00465D1C), ref: 0042BA86
                          • SetWindowTextW.USER32(?,00000000), ref: 0042BACA
                          • SetFocus.USER32(?,?,00000000,?,?,0000000E,00000000,00000000,00000000,0042BAF0,?,00000000), ref: 0042BAD5
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: MessageSend$FocusTextWindow
                          • String ID:
                          • API String ID: 2333564098-0
                          • Opcode ID: a88227335cca2f77a9519455c1fe331fca11a6a158101077e538482d452faf54
                          • Instruction ID: c5c6d1f71d7d5abd3f140a9d873e570a62db933a69622a8a51123b3dec96c00d
                          • Opcode Fuzzy Hash: a88227335cca2f77a9519455c1fe331fca11a6a158101077e538482d452faf54
                          • Instruction Fuzzy Hash: 97112E74640704ABD710EB55FC5AB5A73F8E748704FA0883AF5009B2E1D7F9A950875D
                          APIs
                          • FreeLibrary.KERNEL32(00000000), ref: 004094F7
                          • LocalFree.KERNEL32(0052E328,00000000), ref: 00409511
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Free$LibraryLocal
                          • String ID: (R
                          • API String ID: 3007483513-2743311286
                          • Opcode ID: f1440c9207516d799bff01a95fb1b780083962cb9caf534dbe967da67f6cd1a4
                          • Instruction ID: 794add6f56abb578411f7ef61ae6dacc1c24b6d74e6f65c8e1d29d9f289a045b
                          • Opcode Fuzzy Hash: f1440c9207516d799bff01a95fb1b780083962cb9caf534dbe967da67f6cd1a4
                          • Instruction Fuzzy Hash: 4731A472900105ABCB14DFA6D8C19BFB3B8AF84314B14453EE904B7382DB39DD41CBA8
                          APIs
                            • Part of subcall function 0040B948: GetEnvironmentVariableW.KERNEL32(00000000,?,00000208,004866F8,0043D0E3,00000000,0043D13A,?,00486680,00000001,00000000,00000000,?,00437AE2,?,00000000), ref: 0040B95D
                            • Part of subcall function 0040B948: GetLongPathNameW.KERNELBASE(?,?,00000208), ref: 0040B972
                            • Part of subcall function 0040ACA4: lstrlenW.KERNEL32(00000000,?,?,00486730,?), ref: 0040ACDD
                          • PathFileExistsW.SHLWAPI(00000000,?,?,00000000,00000000,Temp,?,00000000,0040B377,?,?,00486680,00000000,00000000,00000000,00000000), ref: 0040B31D
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Path$EnvironmentExistsFileLongNameVariablelstrlen
                          • String ID: Temp$Temp
                          • API String ID: 2856746939-245102275
                          • Opcode ID: fc830c92589ad5342fd4e66cf01ed2c17b86b29a44920e7f029c1e3a9a43f651
                          • Instruction ID: 46c15489f3eb44522c785d134b2f827a4a98169e1fe77a71831a75c28b8f49eb
                          • Opcode Fuzzy Hash: fc830c92589ad5342fd4e66cf01ed2c17b86b29a44920e7f029c1e3a9a43f651
                          • Instruction Fuzzy Hash: 46215A70A00119AFDB01EBA1CC52DBFB7B9EF84304B61C47BB941B3690D77C9D1196A8
                          APIs
                            • Part of subcall function 0040B948: GetEnvironmentVariableW.KERNEL32(00000000,?,00000208,004866F8,0043D0E3,00000000,0043D13A,?,00486680,00000001,00000000,00000000,?,00437AE2,?,00000000), ref: 0040B95D
                            • Part of subcall function 0040B948: GetLongPathNameW.KERNELBASE(?,?,00000208), ref: 0040B972
                            • Part of subcall function 0040ACA4: lstrlenW.KERNEL32(00000000,?,?,00486730,?), ref: 0040ACDD
                          • PathFileExistsW.SHLWAPI(00000000,?,?,00000000,00000000,Temp,?,00000000,0040B498,?,?,00486680,00000000,00000000,00000000,00000000), ref: 0040B43E
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: Path$EnvironmentExistsFileLongNameVariablelstrlen
                          • String ID: Temp$Temp
                          • API String ID: 2856746939-245102275
                          • Opcode ID: 7237d7c97321785c44f2b4371a02576726028b20681e666b8d51949dfb1120e9
                          • Instruction ID: 320bcaab7f7199f54f19ef5aa5192f16669c5e948fce9d3d7dddb2f051f29b96
                          • Opcode Fuzzy Hash: 7237d7c97321785c44f2b4371a02576726028b20681e666b8d51949dfb1120e9
                          • Instruction Fuzzy Hash: 46215D70A001196FDB01EBA1CC51D6FB7B9EF84704F21C477B501B3295D77C9A1596A8
                          APIs
                            • Part of subcall function 0040ACA4: lstrlenW.KERNEL32(00000000,?,?,00486730,?), ref: 0040ACDD
                          • OpenFileMappingW.KERNEL32(000F001F,00000000,00000000,00000000,00000000,00000000,0042A3BA,?,00486734,00486680,00000000,?,00437ED9,?,00000000,00437F69), ref: 0042A356
                          • InitializeCriticalSection.KERNEL32(00465C80,?,00486734,00486680,00000000,?,00437ED9,?,00000000,00437F69,?,00000000,00000000,00000000,?,0043FD1C), ref: 0042A39F
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: CriticalFileInitializeMappingOpenSectionlstrlen
                          • String ID: _Share_GGT_
                          • API String ID: 3694923735-3867152089
                          • Opcode ID: 41f1d88d2d1c4f0c2cb4bbf11ab129d5343994423090c7a276e01615e93b37f1
                          • Instruction ID: ce4900a62e11ce9a572bac5c0a59808664cb2c3850396779e9c8bc1c065c1da5
                          • Opcode Fuzzy Hash: 41f1d88d2d1c4f0c2cb4bbf11ab129d5343994423090c7a276e01615e93b37f1
                          • Instruction Fuzzy Hash: F3118674740310AFE710EB69DC42F2A73D9EB49B18FA1443BFD01E76D1D9B85C24865A
                          APIs
                          • LoadLibraryW.KERNEL32(00000000,00000000,004274B0,?,?,00486680,00000000,00000000,?,0043F226,?,00486734,00486680,00000000,00000000,00000000), ref: 00427469
                            • Part of subcall function 0040ADB8: lstrlenW.KERNEL32(00000000,?,?,00486734,00486680,00425F2B,00000000,00426187,?,00486680,00000000,00000000,?,0043F7A0,00000000,0043FD8B), ref: 0040ADD7
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,?), ref: 0040A4D0
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProclstrlen
                          • String ID: ZAO`elFyl{h}`fg^$zalee:;'MEE
                          • API String ID: 2991167014-1447228337
                          • Opcode ID: c820523d15c9dbf95b80c6cde00e35f83b407bfca9d4687b59677f06df80f873
                          • Instruction ID: 077bc46651e9a40de25fcd03cddb1c768f49804e1acef1ba0aff0074e990fe41
                          • Opcode Fuzzy Hash: c820523d15c9dbf95b80c6cde00e35f83b407bfca9d4687b59677f06df80f873
                          • Instruction Fuzzy Hash: FAF0C231605718ABD711FBA1DC02B5DBBACEF45718FD2407AF800B7681D67CAE1046AD
                          APIs
                          • PostMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 0043042A
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: MessagePost
                          • String ID: #32770$Button
                          • API String ID: 410705778-3763930512
                          • Opcode ID: 80110679f937891faa6f7cba931e5fed77503df53b31854cfd618e18af252cd2
                          • Instruction ID: 28ed841a6425ce2d44e84357510c75fb6cb91fbfeaac2ff36796f76db45616d3
                          • Opcode Fuzzy Hash: 80110679f937891faa6f7cba931e5fed77503df53b31854cfd618e18af252cd2
                          • Instruction Fuzzy Hash: F3E086743C13026FE62097588CE6F1A63A85739B04F246176B700FB2E0CEE8EE14D61C
                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,00486680,0043F20A,00000001,00000000,?,00486734,00486680,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040B4E5
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,?), ref: 0040A4D0
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                          • API String ID: 1646373207-3689287502
                          • Opcode ID: 2dac5d5c5663db8a0450eab5fd166fe870256cbb9f231f614ab9bd4640426b9f
                          • Instruction ID: 2aacd0a7d080d4f8486dfed4c2e02e9ea53df2493b021d7d88a6b83d7c6298d6
                          • Opcode Fuzzy Hash: 2dac5d5c5663db8a0450eab5fd166fe870256cbb9f231f614ab9bd4640426b9f
                          • Instruction Fuzzy Hash: 26C0129231272439E50071F91CC6EF7028CC9453AE31004B3F900F11C2E7AC4D2011EE
                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,00486680,0043F3D6,00000000,?,00486734,00486680,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040B56D
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,?), ref: 0040A4D0
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                          • API String ID: 1646373207-1355242751
                          • Opcode ID: 95d41de4b2aaa3d5bceb4c6ece1da09edf5c32e92841572d0be30113edd33b41
                          • Instruction ID: 8249db6378fdea734a8c5b5c79ccac93c87cf519fdf57918cf521f3dbb983d50
                          • Opcode Fuzzy Hash: 95d41de4b2aaa3d5bceb4c6ece1da09edf5c32e92841572d0be30113edd33b41
                          • Instruction Fuzzy Hash: 5CC002963563243DE65172F51CC69EB528CC9557AE36408B7FD00F11C3E7AD4D2111ED
                          APIs
                          • LoadLibraryW.KERNEL32(ntdll.dll,00000000,00000000,00000000,0043E626), ref: 0043E4B0
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,?), ref: 0040A4D0
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: NtUnmapViewOfSection$ntdll.dll
                          • API String ID: 2574300362-1050664331
                          • Opcode ID: 31b82d30f3ad7dba5dbea5cdbf4706ed8ff0013fde9a1af21a2c0f08b4647315
                          • Instruction ID: 4e69b6650e6ade436c82b191c502fd32af055e20bfb3fd8e8d0f99f71a318bac
                          • Opcode Fuzzy Hash: 31b82d30f3ad7dba5dbea5cdbf4706ed8ff0013fde9a1af21a2c0f08b4647315
                          • Instruction Fuzzy Hash: 05C012523036103A911031E71C86D6B454CCCEAAB53105037B514E2182D4AC4C114179
                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,00443377,00000000,004433AE), ref: 0041D23E
                            • Part of subcall function 0040A4AC: GetProcAddress.KERNEL32(?,?), ref: 0040A4D0
                          Strings
                          Memory Dump Source
                          • Source File: 0000000F.00000002.2036220931.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000F.00000002.2036220931.000000000045F000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000486000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.0000000000489000.00000040.00000400.00020000.00000000.sdmpDownload File
                          • Associated: 0000000F.00000002.2036220931.000000000048C000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_15_2_400000_TASLogin.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: GetDiskFreeSpaceExW$kernel32.dll
                          • API String ID: 1646373207-1127948838
                          • Opcode ID: a79e509d4b5e1b93e5af0388efdb664cba8b92b54a70f921204110405e308a7a
                          • Instruction ID: 1ed0fb5f9b62a531acb68cd7a06d8274aa2f261e9248045f22735aa701152202
                          • Opcode Fuzzy Hash: a79e509d4b5e1b93e5af0388efdb664cba8b92b54a70f921204110405e308a7a
                          • Instruction Fuzzy Hash: 80D0A9F8E423604ED700EBE09DC6B823798879A308F0000BBB02057283CBBCC89C820C